Skip to main content
Top
Published in: Quantum Information Processing 8/2023

01-08-2023

Three-party authenticated lightweight quantum key distribution without pre-shared key between participants

Authors: I-Cheng Liu, Tzonelih Hwang, Hsu-Chen Wei

Published in: Quantum Information Processing | Issue 8/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper proposes a three-party authenticated lightweight quantum key distribution (TPALQKD) protocol. By utilizing a semi-honest third party (TP), the proposed protocol enables two lightweight participants to share a secret key without pre-share keys or establish any quantum channel between them. Compared with existing similar research, the proposed TPALQKD protocol reduces the quantum burden of participants, lowers the trustworthiness level required for the TP, and improves qubit efficiency. Furthermore, the proposed TPALQKD protocol has been extended to a quantum dialogue. The security analysis shows that the proposed protocol is robust against collective attacks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
1.
3.
go back to reference Grosshans, F., et al.: Quantum key distribution using gaussian-modulated coherent states. Nature 421(6920), 238–241 (2003)ADSCrossRef Grosshans, F., et al.: Quantum key distribution using gaussian-modulated coherent states. Nature 421(6920), 238–241 (2003)ADSCrossRef
5.
go back to reference Hwang, T., Hwang, C., Tsai, C.: Quantum key distribution protocol using dense coding of three-qubit W state. Eur. Phys. J. D 61, 785–790 (2011)ADSCrossRef Hwang, T., Hwang, C., Tsai, C.: Quantum key distribution protocol using dense coding of three-qubit W state. Eur. Phys. J. D 61, 785–790 (2011)ADSCrossRef
6.
go back to reference Boyer, M., D. Kenigsberg, and Mor, T.: Quantum key distribution with classical Bob. In 2007 First International Conference on Quantum, Nano, and Micro Technologies (ICQNM'07), IEEE (2007) Boyer, M., D. Kenigsberg, and Mor, T.: Quantum key distribution with classical Bob. In 2007 First International Conference on Quantum, Nano, and Micro Technologies (ICQNM'07), IEEE (2007)
8.
go back to reference Zou, X., et al.: Semiquantum-key distribution using less than four quantum states. Phys. Rev. A 79(5), 052312 (2009)ADSCrossRef Zou, X., et al.: Semiquantum-key distribution using less than four quantum states. Phys. Rev. A 79(5), 052312 (2009)ADSCrossRef
9.
go back to reference Wang, J., et al.: Semiquantum key distribution using entangled states. Chin. Phys. Lett. 28(10), 100301 (2011)ADSCrossRef Wang, J., et al.: Semiquantum key distribution using entangled states. Chin. Phys. Lett. 28(10), 100301 (2011)ADSCrossRef
10.
11.
go back to reference Shukla, C., Thapliyal, K., Pathak, A.: Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue. Quant. Inf. Process. 16, 1–19 (2017)MathSciNetCrossRefMATH Shukla, C., Thapliyal, K., Pathak, A.: Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue. Quant. Inf. Process. 16, 1–19 (2017)MathSciNetCrossRefMATH
14.
15.
go back to reference Zhao, Y., Qi, B., Lo, H.-K.: Quantum key distribution with an unknown and untrusted source. Phys. Rev. A 77(5), 052327 (2008)ADSCrossRef Zhao, Y., Qi, B., Lo, H.-K.: Quantum key distribution with an unknown and untrusted source. Phys. Rev. A 77(5), 052327 (2008)ADSCrossRef
16.
go back to reference Lin, P.H., Tsai, C.W., Hwang, T.: Mediated semi-quantum key distribution using single photons. Ann. Phys. 531(8), 1800347 (2019)MathSciNetCrossRef Lin, P.H., Tsai, C.W., Hwang, T.: Mediated semi-quantum key distribution using single photons. Ann. Phys. 531(8), 1800347 (2019)MathSciNetCrossRef
17.
go back to reference Julsgaard, B., et al.: Experimental demonstration of quantum memory for light. Nature 432(7016), 482–486 (2004)ADSCrossRef Julsgaard, B., et al.: Experimental demonstration of quantum memory for light. Nature 432(7016), 482–486 (2004)ADSCrossRef
19.
go back to reference Lo, H.-K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108(13), 130503 (2012)ADSCrossRef Lo, H.-K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108(13), 130503 (2012)ADSCrossRef
20.
go back to reference Abruzzo, S., Kampermann, H., Bruß, D.: Measurement-device-independent quantum key distribution with quantum memories. Phys. Rev. A 89(1), 012301 (2014)ADSCrossRef Abruzzo, S., Kampermann, H., Bruß, D.: Measurement-device-independent quantum key distribution with quantum memories. Phys. Rev. A 89(1), 012301 (2014)ADSCrossRef
22.
go back to reference Zeng, G., Zhang, W.: Identity verification in quantum key distribution. Phys. Rev. A 61(2), 022303 (2000)ADSCrossRef Zeng, G., Zhang, W.: Identity verification in quantum key distribution. Phys. Rev. A 61(2), 022303 (2000)ADSCrossRef
23.
go back to reference Hwang, T., Lee, K.-C., Li, C.-M.: Provably secure three-party authenticated quantum key distribution protocols. IEEE Trans. Dependable Sec. Comput. 4(1), 71–80 (2007)CrossRef Hwang, T., Lee, K.-C., Li, C.-M.: Provably secure three-party authenticated quantum key distribution protocols. IEEE Trans. Dependable Sec. Comput. 4(1), 71–80 (2007)CrossRef
24.
go back to reference Lin, C.-Y., Yang, C.-W., Hwang, T.: Authenticated quantum dialogue based on Bell states. Int. J. Theor. Phys. 54, 780–786 (2015)CrossRefMATH Lin, C.-Y., Yang, C.-W., Hwang, T.: Authenticated quantum dialogue based on Bell states. Int. J. Theor. Phys. 54, 780–786 (2015)CrossRefMATH
26.
go back to reference Liu, L., Xiao, M., Song, X.: Authenticated semiquantum dialogue with secure delegated quantum computation over a collective noise channel. Quant. Inf. Process. 17, 1–17 (2018)ADSMathSciNetCrossRefMATH Liu, L., Xiao, M., Song, X.: Authenticated semiquantum dialogue with secure delegated quantum computation over a collective noise channel. Quant. Inf. Process. 17, 1–17 (2018)ADSMathSciNetCrossRefMATH
27.
go back to reference Jefferies, N., C. Mitchell, and Walker, M.: A proposed architecture for trusted third party services. In: Cryptography: Policy and Algorithms: International Conference Brisbane, Queensland, Australia, July 3–5, 1995 Proceedings. 1996. Springer Jefferies, N., C. Mitchell, and Walker, M.: A proposed architecture for trusted third party services. In: Cryptography: Policy and Algorithms: International Conference Brisbane, Queensland, Australia, July 3–5, 1995 Proceedings. 1996. Springer
28.
go back to reference Chen, X.-B., et al.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt. Commun. 283(7), 1561–1565 (2010)ADSCrossRef Chen, X.-B., et al.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt. Commun. 283(7), 1561–1565 (2010)ADSCrossRef
29.
go back to reference Neuman, B.C., Ts’o, T.: Kerberos: an authentication service for computer networks. IEEE Commun. Mag. 32(9), 33–38 (1994)CrossRef Neuman, B.C., Ts’o, T.: Kerberos: an authentication service for computer networks. IEEE Commun. Mag. 32(9), 33–38 (1994)CrossRef
30.
go back to reference Gu, J. and T. Hwang, Lightweight authenticated quantum key distribution protocols with key recycling. arXiv preprint arXiv:2102.01878 (2021) Gu, J. and T. Hwang, Lightweight authenticated quantum key distribution protocols with key recycling. arXiv preprint arXiv:​2102.​01878 (2021)
31.
go back to reference Preneel, B., A. Bosselaers, and H. Dobbertin, The cryptographic hash function RIPEMD-160. 1997, Citeseer Preneel, B., A. Bosselaers, and H. Dobbertin, The cryptographic hash function RIPEMD-160. 1997, Citeseer
32.
go back to reference Scarani, V., et al.: The security of practical quantum key distribution. Rev. Mod. Phys. 81(3), 1301 (2009)ADSCrossRef Scarani, V., et al.: The security of practical quantum key distribution. Rev. Mod. Phys. 81(3), 1301 (2009)ADSCrossRef
33.
go back to reference Deng, F.-G., et al.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72(4), 044302 (2005)ADSCrossRef Deng, F.-G., et al.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72(4), 044302 (2005)ADSCrossRef
34.
go back to reference Cai, Q.-Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1–2), 23–25 (2006)ADSCrossRefMATH Cai, Q.-Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1–2), 23–25 (2006)ADSCrossRefMATH
35.
go back to reference Gisin, N., et al.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73(2), 022320 (2006)ADSCrossRef Gisin, N., et al.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73(2), 022320 (2006)ADSCrossRef
36.
go back to reference Deng, F.-G., et al., Robustness of two-way quantum communication protocols against Trojan horse attack. arXiv preprint quant-ph/0508168 (2005) Deng, F.-G., et al., Robustness of two-way quantum communication protocols against Trojan horse attack. arXiv preprint quant-ph/0508168 (2005)
Metadata
Title
Three-party authenticated lightweight quantum key distribution without pre-shared key between participants
Authors
I-Cheng Liu
Tzonelih Hwang
Hsu-Chen Wei
Publication date
01-08-2023
Publisher
Springer US
Published in
Quantum Information Processing / Issue 8/2023
Print ISSN: 1570-0755
Electronic ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-023-04067-1

Other articles of this Issue 8/2023

Quantum Information Processing 8/2023 Go to the issue