Skip to main content
Erschienen in: Quantum Information Processing 11/2014

01.11.2014

Restricted attacks on semi-quantum key distribution protocols

verfasst von: Walter O. Krawec

Erschienen in: Quantum Information Processing | Ausgabe 11/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we investigate single-state, semi-quantum key distribution protocols. These are protocols whereby one party is limited to measuring only in the computational basis, while the other, though capable of measuring in both computational and Hadamard bases, is limited to preparing and sending only a single, publicly known qubit state. Such protocols rely necessarily on a two-way quantum communication channel making their security analysis difficult. However, we will show that, for single-state protocols, we need only consider a restricted attack operation by Eve. We will also describe a new single-state protocol that permits “reflections” to carry information and use our results concerning restricted attacks to show its robustness.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, vol. 175. New York (1984) Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, vol. 175. New York (1984)
2.
Zurück zum Zitat Acin, A., Gisin, N., Scarani, V.: Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks. Phys. Rev. A 69, 012309 (2004)CrossRefADS Acin, A., Gisin, N., Scarani, V.: Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks. Phys. Rev. A 69, 012309 (2004)CrossRefADS
3.
Zurück zum Zitat Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Dušek, M., Lütkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301–1350 (2009)CrossRefADS Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Dušek, M., Lütkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301–1350 (2009)CrossRefADS
4.
Zurück zum Zitat Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical bob. In: First International Conference on Quantum, Nano, and Micro Technologies, 2007. ICQNM ’07, pp. 10–10 (2007) Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical bob. In: First International Conference on Quantum, Nano, and Micro Technologies, 2007. ICQNM ’07, pp. 10–10 (2007)
6.
Zurück zum Zitat Lu, H., Fung, C.-H.F., Ma, X., Cai, Q.-Y.: Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channel. Phys. Rev. A 84, 042344 (2011)CrossRefADS Lu, H., Fung, C.-H.F., Ma, X., Cai, Q.-Y.: Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channel. Phys. Rev. A 84, 042344 (2011)CrossRefADS
7.
Zurück zum Zitat Beaudry, N.J., Lucamarini, M., Mancini, S., Renner, R.: Security of two-way quantum key distribution. arXiv preprint arXiv:1301.3138 (2013) Beaudry, N.J., Lucamarini, M., Mancini, S., Renner, R.: Security of two-way quantum key distribution. arXiv preprint arXiv:​1301.​3138 (2013)
8.
Zurück zum Zitat Lu, H., Cai, Q.-Y.: Quantum key distribution with classical Alice. Int. J. Quantum Inf. 6(06), 1195–1202 (2008)CrossRefMATH Lu, H., Cai, Q.-Y.: Quantum key distribution with classical Alice. Int. J. Quantum Inf. 6(06), 1195–1202 (2008)CrossRefMATH
9.
Zurück zum Zitat Jian, W., Sheng, Z., Quan, Z., Chao-Jing, T.: Semiquantum key distribution using entangled states. Chin. Phys. Lett. 28(10), 100301 (2011)CrossRef Jian, W., Sheng, Z., Quan, Z., Chao-Jing, T.: Semiquantum key distribution using entangled states. Chin. Phys. Lett. 28(10), 100301 (2011)CrossRef
10.
Zurück zum Zitat Sun, Z.-W., Du, R.-G., Long, D.-Y.: Quantum key distribution with limited classical bob. Int. J. Quantum Inf. 11(01), 1350005 (2013) Sun, Z.-W., Du, R.-G., Long, D.-Y.: Quantum key distribution with limited classical bob. Int. J. Quantum Inf. 11(01), 1350005 (2013)
11.
Zurück zum Zitat Yu, K.-F., Yang, C.-W., Liao, C.-H., Hwang, T.: Authenticated semi-quantum key distribution protocol using bell states. Quantum Inf. Process. 13(6), 1457–1465 (2014)MathSciNetCrossRefADS Yu, K.-F., Yang, C.-W., Liao, C.-H., Hwang, T.: Authenticated semi-quantum key distribution protocol using bell states. Quantum Inf. Process. 13(6), 1457–1465 (2014)MathSciNetCrossRefADS
12.
Zurück zum Zitat Xian-Zhou, Z., Wei-Gui, G., Yong-Gang, T., Zhen-Zhong, R., Xiao-Tian, G.: Quantum key distribution series network protocol with m-classical bobs. Chin. Phys. B 18(6), 2143 (2009)CrossRefADS Xian-Zhou, Z., Wei-Gui, G., Yong-Gang, T., Zhen-Zhong, R., Xiao-Tian, G.: Quantum key distribution series network protocol with m-classical bobs. Chin. Phys. B 18(6), 2143 (2009)CrossRefADS
13.
Zurück zum Zitat Li, Q., Chan, W.H., Long, D.-Y.: Semiquantum secret sharing using entangled states. Phys. Rev. A 82, 022303 (2010)CrossRefADS Li, Q., Chan, W.H., Long, D.-Y.: Semiquantum secret sharing using entangled states. Phys. Rev. A 82, 022303 (2010)CrossRefADS
14.
15.
Zurück zum Zitat Wang, J., Zhang, S., Zhang, Q., Tang, C.-J.: Semiquantum secret sharing using two-particle entangled state. Int. J. Quantum Inf. 10(05), 1250050 (2012) Wang, J., Zhang, S., Zhang, Q., Tang, C.-J.: Semiquantum secret sharing using two-particle entangled state. Int. J. Quantum Inf. 10(05), 1250050 (2012)
16.
Zurück zum Zitat Yang, C-W, Hwang, T: Efficient key construction on semi-quantum secret sharing protocols. Int. J. Quantum Inf. 11(05), 1350052 (2013) Yang, C-W, Hwang, T: Efficient key construction on semi-quantum secret sharing protocols. Int. J. Quantum Inf. 11(05), 1350052 (2013)
17.
Zurück zum Zitat Zou, X., Qiu, D., Li, L., Li, L.: Semiquantum-key distribution using less than four quantum states. Phys. Rev. A 79, 052312 (2009)CrossRefADS Zou, X., Qiu, D., Li, L., Li, L.: Semiquantum-key distribution using less than four quantum states. Phys. Rev. A 79, 052312 (2009)CrossRefADS
18.
Zurück zum Zitat Boyer, M., Mor, T.: Comment on semiquantum-key distribution using less than four quantum states. Phys. Rev. A 83(4), 046301 (2011)CrossRefADS Boyer, M., Mor, T.: Comment on semiquantum-key distribution using less than four quantum states. Phys. Rev. A 83(4), 046301 (2011)CrossRefADS
19.
Zurück zum Zitat Miyadera, T.: Relation between information and disturbance in quantum key distribution protocol with classical alice. Int. J. Quantum Inf. 9(6), 1427–1435 (2011) Miyadera, T.: Relation between information and disturbance in quantum key distribution protocol with classical alice. Int. J. Quantum Inf. 9(6), 1427–1435 (2011)
20.
Zurück zum Zitat Kraus, B., Gisin, N., Renner, R.: Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication. Phys. Rev. Lett. 95, 080501 (2005)CrossRefADS Kraus, B., Gisin, N., Renner, R.: Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication. Phys. Rev. Lett. 95, 080501 (2005)CrossRefADS
23.
24.
Zurück zum Zitat Christandl, M., Konig, R., Renner, R.: Postselection technique for quantum channels with applications to quantum cryptography. Phys. Rev. Lett. 102, 020504 (2009)CrossRefADS Christandl, M., Konig, R., Renner, R.: Postselection technique for quantum channels with applications to quantum cryptography. Phys. Rev. Lett. 102, 020504 (2009)CrossRefADS
25.
Zurück zum Zitat Renner, R.: Symmetry of large physical systems implies independence of subsystems. Nat. Phys. 3(9), 645–649 (2007)CrossRef Renner, R.: Symmetry of large physical systems implies independence of subsystems. Nat. Phys. 3(9), 645–649 (2007)CrossRef
26.
Zurück zum Zitat Renner, R., Gisin, N., Kraus, B.: Information-theoretic security proof for quantum-key-distribution protocols. Phys. Rev. A 72, 012332 (2005)CrossRefADS Renner, R., Gisin, N., Kraus, B.: Information-theoretic security proof for quantum-key-distribution protocols. Phys. Rev. A 72, 012332 (2005)CrossRefADS
Metadaten
Titel
Restricted attacks on semi-quantum key distribution protocols
verfasst von
Walter O. Krawec
Publikationsdatum
01.11.2014
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 11/2014
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-014-0802-2

Weitere Artikel der Ausgabe 11/2014

Quantum Information Processing 11/2014 Zur Ausgabe