Skip to main content
Erschienen in: Quantum Information Processing 11/2015

01.11.2015

Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement

verfasst von: Zhen-Chao Zhu, Ai-Qun Hu, An-Min Fu

Erschienen in: Quantum Information Processing | Ausgabe 11/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In a recent study, Shukla et al. (Quantum Inf Process 13:2391–2405, 2014) proposed two quantum key agreement protocols based on Bell state and Bell measurement, and they claimed that their two protocols were secure. However, in this study, we will show that the three-party protocol they proposed is not secure. Any participant in the protocol can directly obtain other two participants’ secret keys. More seriously, two dishonest participants in the protocol can conclude to determine the shared key alone. Furthermore, we will show that there is another minor flaw in their two protocols; that is, eavesdroppers can flip any bit of the final key without introducing any error. In the end, some possible improvements are proposed to avoid these flaws.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zhou, N., Zeng, G., Xiong, J.: Quantum key agreement protocol. Electron. Lett. 40, 1149 (2004)CrossRef Zhou, N., Zeng, G., Xiong, J.: Quantum key agreement protocol. Electron. Lett. 40, 1149 (2004)CrossRef
3.
4.
Zurück zum Zitat Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system. In: Advances in Cryptology-Eurocrypt’94, pp. 275–286. Springer, Berlin (1994) Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system. In: Advances in Cryptology-Eurocrypt’94, pp. 275–286. Springer, Berlin (1994)
5.
Zurück zum Zitat Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE Trans. Parallel Distrib. Syst. 11, 769–780 (2000)CrossRef Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE Trans. Parallel Distrib. Syst. 11, 769–780 (2000)CrossRef
6.
Zurück zum Zitat Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols. In: Proceedings of the 30th Annual Symposium on the Theory of Computing, pp. 419–428. ACM, New York (1998) Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols. In: Proceedings of the 30th Annual Symposium on the Theory of Computing, pp. 419–428. ACM, New York (1998)
7.
Zurück zum Zitat Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Advances in Cryptology-Eurocrypt’00, pp. 139–155. Springer, Berlin (2000) Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Advances in Cryptology-Eurocrypt’00, pp. 139–155. Springer, Berlin (2000)
8.
Zurück zum Zitat Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Advances in Cryptology-Crypto’93, pp. 232-249. Springer, Berlin (1993) Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Advances in Cryptology-Crypto’93, pp. 232-249. Springer, Berlin (1993)
9.
Zurück zum Zitat Bellare, M., Rogaway, P.: Provably secure session key distribution-the three party case. In: Proceedings of the 27th Annual ACM Symposium on Theory of Computing, pp. 57–66. ACM, New York (1995) Bellare, M., Rogaway, P.: Provably secure session key distribution-the three party case. In: Proceedings of the 27th Annual ACM Symposium on Theory of Computing, pp. 57–66. ACM, New York (1995)
10.
Zurück zum Zitat Blake-Wilson, S., Johnson, D., Menezes, A.: Key agreement protocols and their security analysis. In: Proceedings of 6th IMA International Conference on Cryptography and Coding, pp. 30–45. Springer, Berlin (1997) Blake-Wilson, S., Johnson, D., Menezes, A.: Key agreement protocols and their security analysis. In: Proceedings of 6th IMA International Conference on Cryptography and Coding, pp. 30–45. Springer, Berlin (1997)
11.
Zurück zum Zitat Kudla, C.: Paterson, K.G.: Modular security proofs for key agreement protocols. In: Advances in Cryptology-Asiacrypt’05, pp. 549–565. Springer, Berlin (2005) Kudla, C.: Paterson, K.G.: Modular security proofs for key agreement protocols. In: Advances in Cryptology-Asiacrypt’05, pp. 549–565. Springer, Berlin (2005)
12.
Zurück zum Zitat Chong, S.K., Hwang, T.: Quantum key agreement protocol based on BB84. Opt. Commun. 283, 1192 (2010)CrossRefADS Chong, S.K., Hwang, T.: Quantum key agreement protocol based on BB84. Opt. Commun. 283, 1192 (2010)CrossRefADS
13.
14.
15.
Zurück zum Zitat Yin, X.R., Ma, W.P., Liu, W.Y.: Three-party quantum key agreement with two-photon entanglement. Int. J. Theor. Phys. 52, 3915 (2013)MATHMathSciNetCrossRef Yin, X.R., Ma, W.P., Liu, W.Y.: Three-party quantum key agreement with two-photon entanglement. Int. J. Theor. Phys. 52, 3915 (2013)MATHMathSciNetCrossRef
16.
Zurück zum Zitat Huang, W., Wen, Q.Y., Liu, B., Gao, F., Sun, Y.: Quantum key agreement with EPR pairs and single-particle measurements. Quantum Inf. Process. 13, 649 (2014)MATHMathSciNetCrossRef Huang, W., Wen, Q.Y., Liu, B., Gao, F., Sun, Y.: Quantum key agreement with EPR pairs and single-particle measurements. Quantum Inf. Process. 13, 649 (2014)MATHMathSciNetCrossRef
17.
Zurück zum Zitat Huang, W., Su, Q., Wu, X., Li, Y.B., Sun, Y.: Quantum key agreement against collective decoherence. Int. J. Theor. Phys. 53, 2891 (2014)MATHCrossRef Huang, W., Su, Q., Wu, X., Li, Y.B., Sun, Y.: Quantum key agreement against collective decoherence. Int. J. Theor. Phys. 53, 2891 (2014)MATHCrossRef
18.
Zurück zum Zitat Xu, G.B., Wen, Q.Y., Gao, F., Qin, S.J.: Novel multiparty quantum key agreement protocol with GHZ states. Quantum Inf. Process. 13, 2587 (2014)MATHMathSciNetCrossRefADS Xu, G.B., Wen, Q.Y., Gao, F., Qin, S.J.: Novel multiparty quantum key agreement protocol with GHZ states. Quantum Inf. Process. 13, 2587 (2014)MATHMathSciNetCrossRefADS
19.
Zurück zum Zitat Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84, 022344 (2011)CrossRefADS Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84, 022344 (2011)CrossRefADS
20.
Zurück zum Zitat Zhang, Y.S., Li, C.F., Guo, G.C.: Comment on “quantum key distribution without alternative measurements” [Phys. Rev. A 61, 052312 (2000)]. Phys. Rev. A 63, 036301 (2001)MathSciNetCrossRefADS Zhang, Y.S., Li, C.F., Guo, G.C.: Comment on “quantum key distribution without alternative measurements” [Phys. Rev. A 61, 052312 (2000)]. Phys. Rev. A 63, 036301 (2001)MathSciNetCrossRefADS
21.
Zurück zum Zitat Wójcik, A.: Eavesdropping on the “ping-pong” quantum communication protocol. Phys. Rev. Lett. 90, 157901 (2003)CrossRefADS Wójcik, A.: Eavesdropping on the “ping-pong” quantum communication protocol. Phys. Rev. Lett. 90, 157901 (2003)CrossRefADS
22.
Zurück zum Zitat Cai, Q.Y.: The “ping-pong” protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91, 109801 (2003)CrossRefADS Cai, Q.Y.: The “ping-pong” protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91, 109801 (2003)CrossRefADS
23.
Zurück zum Zitat Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302 (2005)CrossRefADS Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302 (2005)CrossRefADS
24.
Zurück zum Zitat Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: A simple participant attack on the brádler-dušek protocol. Quantum Inf. Comput. 7, 329 (2007)MATHMathSciNet Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: A simple participant attack on the brádler-dušek protocol. Quantum Inf. Comput. 7, 329 (2007)MATHMathSciNet
25.
Zurück zum Zitat Qin, S.J., Gao, F., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of the Hillery–Bužek–Berthiaume quantum secret-sharing protocol. Phys. Rev. A 76, 062324 (2007)CrossRefADS Qin, S.J., Gao, F., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of the Hillery–Bužek–Berthiaume quantum secret-sharing protocol. Phys. Rev. A 76, 062324 (2007)CrossRefADS
26.
Zurück zum Zitat Gao, F., Wen, Q.Y., Zhu, F.C.: Comment on: “quantum exam” [Phys. Lett. A 350 (2006) 174]. Phys. Lett. A 360, 748 (2007)CrossRefADS Gao, F., Wen, Q.Y., Zhu, F.C.: Comment on: “quantum exam” [Phys. Lett. A 350 (2006) 174]. Phys. Lett. A 360, 748 (2007)CrossRefADS
27.
Zurück zum Zitat Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on “experimental demonstration of a quantum protocol for Byzantine agreement and Liar detection”. Phys. Rev. Lett. 101, 208901 (2008)CrossRefADS Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on “experimental demonstration of a quantum protocol for Byzantine agreement and Liar detection”. Phys. Rev. Lett. 101, 208901 (2008)CrossRefADS
28.
Zurück zum Zitat Song, T.T., Zhang, J., Gao, F., Wen, Q.Y., Zhu, F.C.: Participant attack on quantum secret sharing based on entanglement swapping. Chin. Phys. B 18, 1333 (2009)CrossRefADS Song, T.T., Zhang, J., Gao, F., Wen, Q.Y., Zhu, F.C.: Participant attack on quantum secret sharing based on entanglement swapping. Chin. Phys. B 18, 1333 (2009)CrossRefADS
29.
Zurück zum Zitat Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state. Opt. Commun. 283, 192 (2010)CrossRefADS Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state. Opt. Commun. 283, 192 (2010)CrossRefADS
30.
Zurück zum Zitat Guo, F.Z., Qin, S.J., Gao, F., Lin, S., Wen, Q.Y., Zhu, F.C.: Participant attack on a kind of MQSS schemes based on entanglement swapping. Eur. Phys. J. D 56, 445 (2010)CrossRefADS Guo, F.Z., Qin, S.J., Gao, F., Lin, S., Wen, Q.Y., Zhu, F.C.: Participant attack on a kind of MQSS schemes based on entanglement swapping. Eur. Phys. J. D 56, 445 (2010)CrossRefADS
31.
Zurück zum Zitat Shukla, C., Alam, N., Pathak, A.: Protocols of quantum key agreement solely using Bell states and Bell measurement. Quantum Inf. Process. 13, 2391 (2014)MATHMathSciNetCrossRef Shukla, C., Alam, N., Pathak, A.: Protocols of quantum key agreement solely using Bell states and Bell measurement. Quantum Inf. Process. 13, 2391 (2014)MATHMathSciNetCrossRef
32.
Zurück zum Zitat Sun, Z.W., Zhang, C., Wang, B.H., Li, Q., Long, D.Y.: Improvements on “multiparty quantum key agreement with single particles”. Quantum Inf. Process. 12, 3411 (2013)MATHMathSciNetCrossRefADS Sun, Z.W., Zhang, C., Wang, B.H., Li, Q., Long, D.Y.: Improvements on “multiparty quantum key agreement with single particles”. Quantum Inf. Process. 12, 3411 (2013)MATHMathSciNetCrossRefADS
33.
Zurück zum Zitat Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pp. 175-179. IEEE, New York (1984) [Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. Theor. Comput. Sci. 560, 7 (2014)] Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pp. 175-179. IEEE, New York (1984) [Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. Theor. Comput. Sci. 560, 7 (2014)]
34.
Zurück zum Zitat Gottesman, D., Lo, H.K.: Proof of security of quantum key distribution with two-way classical communications. IEEE Trans. Inf. Theory 49, 457–475 (2003)MATHMathSciNetCrossRef Gottesman, D., Lo, H.K.: Proof of security of quantum key distribution with two-way classical communications. IEEE Trans. Inf. Theory 49, 457–475 (2003)MATHMathSciNetCrossRef
35.
Zurück zum Zitat Shukla, C., Pathak, A., Srikanth, R.: Beyond the Goldenberg–Vaidman protocol: secure and efficient quantum communication using arbitrary, orthogonal, multi-particle quantum states. Int. J. Quantum Inf. 10, 1241009 (2012)MathSciNetCrossRef Shukla, C., Pathak, A., Srikanth, R.: Beyond the Goldenberg–Vaidman protocol: secure and efficient quantum communication using arbitrary, orthogonal, multi-particle quantum states. Int. J. Quantum Inf. 10, 1241009 (2012)MathSciNetCrossRef
36.
Zurück zum Zitat Yadav, P., Srikanth, R., Pathak, A.: Two-step orthogonal-state-based protocol of quantum secure direct communication with the help of order-rearrangement technique. Quantum Inf. Process. 13, 2731 (2014)MATHMathSciNetCrossRefADS Yadav, P., Srikanth, R., Pathak, A.: Two-step orthogonal-state-based protocol of quantum secure direct communication with the help of order-rearrangement technique. Quantum Inf. Process. 13, 2731 (2014)MATHMathSciNetCrossRefADS
Metadaten
Titel
Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement
verfasst von
Zhen-Chao Zhu
Ai-Qun Hu
An-Min Fu
Publikationsdatum
01.11.2015
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 11/2015
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-015-1110-1

Weitere Artikel der Ausgabe 11/2015

Quantum Information Processing 11/2015 Zur Ausgabe

Neuer Inhalt