Next Article in Journal
Design of Triple-Band (DSRC, 5G, 6G) Antenna for Autonomous Vehicle Telematics
Next Article in Special Issue
Warm Starting Variational Quantum Algorithms with Near Clifford Circuits
Previous Article in Journal
Contouring Control of a Five-Axis Machine Tool with Equivalent Errors
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Double C-NOT Attack on a Single-State Semi-Quantum Key Distribution Protocol and Its Improvement

1
College of Media Engineering, Communication University of Zhejiang, Hangzhou 310018, China
2
Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan 70101, Taiwan
*
Authors to whom correspondence should be addressed.
Electronics 2022, 11(16), 2522; https://doi.org/10.3390/electronics11162522
Submission received: 4 June 2022 / Revised: 8 August 2022 / Accepted: 8 August 2022 / Published: 12 August 2022
(This article belongs to the Special Issue Quantum Information, Computation and Cryptography)

Abstract

:
Recently, Zhang et al. proposed a single-state semi-quantum key distribution protocol to help a quantum participant share a secret key with a classical participant. However, this study shows that an eavesdropper can use a double C-NOT attack to obtain parts of the final shared key without being detected by the participants. To avoid this problem, a modification is proposed here.

1. Introduction

The quantum key distribution (QKD) protocol [1] is designed to help participants share a secret key without being eavesdropped. However, in most of the existing QKD protocols [2,3,4], all the participants need to have lots of quantum capabilities, such as quantum register, quantum joint measurement, and so on. To help the participants who only have restricted quantum capacities be involved in the QKD, the semi-quantum key distribution (SQKD) protocol is proposed.
In 2007, an SQKD protocol was proposed by Boyer et al. [5]. With their protocol, a classical participant with restricted quantum capacities can share a secret key with a quantum participant who has unrestricted quantum capacities. According to Boyer et al.’s definition, the classical participants are restricted to performing parts of the following quantum operations: (1) generate qubits in Z-basis { | 0 , | 1 } , (2) measure qubits with the Z-basis, (3) reorder the qubits via different quantum delay lines, and (4) send or reflect the qubits. Compared with most quantum cryptography protocols [6,7,8], the SQKD protocol proposed by Boyer et al. is more realistic and easier to implement. Hence, these definitions of ‘semi-quantum’ have been widely used in the subsequent designing of semi-quantum cryptography protocols, such as semi-quantum key distribution protocols [9,10,11,12,13,14], semi-quantum key agreement protocols [15,16,17,18], semi-quantum secret sharing protocols [19,20,21,22,23,24], and so on.
Recently, Zhang et al. [25] proposed a single-state semi-quantum key distribution protocol. They claimed that the proposed SQKD protocol could ensure that a quantum participant and a classical participant could share a secret key without being eavesdropped. However, this study shows that Zhang et al.’s SQKD protocol suffers from a double C-NOT attack, which can reveal parts of the final shared key to an eavesdropper. The proposed attack proves that Zhang et al.’s SQKD protocol cannot be used as a secure one anymore. Moreover, to solve this problem, a modification is proposed.
The rest of this paper is organized as follows. Section 2 briefly reviews Zhang et al.’s SQKD protocol. Section 3 shows that an eavesdropper can obtain parts of the final shared key by a double C-NOT attack and then proposes an improvement to avoid it. Finally, the conclusions are given in Section 4.

2. A Brief Review of Zhang et al.’s SQKD

In Zhang et al.’s protocol [25], four kinds of single photons, { | 0 , | 1 , | + =   1 2 ( | 0 + | 1 ) , | = 1 2 ( | 0 | 1 ) }, are used. Assume that Bob is a classical participant who just has the above quantum capacities {(1), (2), (4)} and that Alice is a quantum participant with unrestricted quantum capacities. Then, Zhang et al.’s SQKD protocol can be described as follows:
Step 1: Alice generates n single photons in | + and sends these single photons to Bob one by one.
Step 2: Bob generates a random bit sequence K B = { k B 1 , k B 2 , , k B n } . For the ith ( 1 i n ) particle received, Bob chooses one of the two following cases, according to k B i :
Case (a). If k B i = 0 , Bob reflects this particle to Alice directly.
Case (b). If k B i = 1 , Bob measures this particle with Z-basis and then sends a single photon in the state | 0 back to Alice instead.
Step 3: For each particle sent back, Alice randomly uses Z-basis { | 0 , | 1 } or X-basis { | + , | } to measure it. Then, she generates a value sequence K A = { k A 1 , k A 2 , , k A n } according to the measurement results. That is, for the ith ( 1 i n ) particle, k A i is decided as follows.
(1)
If the measurement result is | 1 , k A i = 0 .
(2)
If the measurement result is | , k A i = 1 .
(3)
Otherwise, k A i = 1 .
Step 4: Alice announces all the positions where k A i = 1 and discards these values in K A to obtain K A . Then, Bob discards the corresponding bits in K B to derive K B .
Step 5: To check the eavesdropping, Bob randomly chooses half bits in K B and announces their positions and values. Subsequently, Alice checks whether the announced positions and values are the same as K A or not. If the error rate exceeds a predetermined value, this protocol will be aborted. Otherwise, Alice and Bob discard the announced bits in K A and K B to obtain the final shared key K A B , respectively.

3. Double C-NOT Attack and Counterattack on Zhang et al.’s Protocol

Zhang et al. claimed that the above SQKD protocol could ensure that the final shared key is secure. However, this section points out that Zhang et al.’s SQKD protocol suffers from a double C-NOT attack. That is, an eavesdropper Eve who has unlimited quantum capabilities can use a double C-NOT attack to obtain parts of the final shared key without being detected. Additionally, Section 3.2 analyzes the leakage rate of the final shared raw key in Zhang et al.’s SQKD protocol. Finally, to avoid this loophole, a simple modification is proposed here.

3.1. The Double C-NOT Attack on Zhang et al.’s SQKD Protocol

The processes of the double C-NOT attack on Zhang et al.’s protocol can be simply described as follows. For each particle sent from Alice to Bob, Eve performs a C-NOT operation ( C N O T = | 00 00 | + | 01 01 | + | 10 11 | + | 11 10 | ) on both the transmitted particle and a target particle generated by herself. Then, Eve sends the transmitted particle to Bob. After Bob sends a particle back in Step 2, Eve performs a C-NOT operation on this particle and the corresponding target particle again. Subsequently, Eve uses the target particle to judge whether the particle sent back from Bob is the original one or not. According to this, Eve can obtain parts of K A B .
For example, as is shown in Table 1, assume that q c is the particle sent from Alice to Bob. Eve generates a target particle q t in the state | 0 and performs the 1st-time C-NOT operation on { q c , q t } to obtain two qubits { q c 1 , q t 1 } . Eve stores q t 1 and sends q c 1 to Bob. Afterward, in Step 2, Bob performs the case (a) or (b) on q c 1 according to K B . If Bob performs the case (b) on q c 1 , the measurement result is named q c 2 , and then Bob sends a qubit q c 3 = | 0 back to Alice. Otherwise, Bob directly reflects the qubit q c 1 to Alice, and here we also use q c 3 to represent this qubit for further discussion. For q c 3 sent back, Eve performs the 2nd-time C-NOT operation on { q c 3 , q t 1 } to obtain { q c 4 , q t 2 } and sends q c 4 to Alice. Subsequently, Eve measures q t 2 with Z-basis. If the measurement result is | 1 , this means that the corresponding bit in K B must be ‘1′. Moreover, according to Table 1, we can find that no matter which operation is chosen by Bob in Step 2, q c 4 always matches the case result. That is, if Bob chooses the case (a), q c 4 is in | + , which is the expected result of the case (a) in the original protocol. Similarly, if Bob chooses the case (b), q c 4 will be in | 0 , which is the same as what is expected. Hence, this attack cannot be detected by the participants during the eavesdropping detection process. This means that Eve can use this attack to obtain parts of K A B without being detected.

3.2. Raw Key Leakage Rate Analysis

By using the above strategy, parts of the final shared key K A B will be obtained by Eve without being detected. If we assume that n single photons | + are generated in Step 1, the final share raw key K A B is m bits, and the expected leakage bits of K A B are l , then the relationships among n , m , and l can be described as l = 1 4 m = 1 32 n (as shown in Figure 1). Hence, the raw key leakage rate is l m = 1 4 .

3.3. A Solution to Avoid Double C-NOT Attack on Zhang et al.’s SQKD Protocol

As mentioned in Section 3.1, because Eve can distinguish parts of the particles measured by Bob where the measurement result of q c 1 is | 1 , she can obtain parts of K A B . Hence, if Bob and Alice discard all the bits in K A B where the corresponding measurement result of q c 1 is | 1 , then this problem can be solved. The improved protocol is then described as follows.
Step 1′–3′ are the same as Step 1–3 in Section 2.
Step 4′: Alice announces all the positions where k A i = 1 , and Bob announces all the positions where the measurement results are | 1 in Step 2. Subsequently, Alice and Bob discard all the bits in the above positions in K A and K B to obtain K A and K B , respectively.
Step 5′ is the same as Step 5 in Section 2.

4. Conclusions

This paper points out a double C-NOT attack on Zhang et al.’s SQKD protocol. With this attack, an eavesdropper can obtain parts of the final shared key without being detected. To solve this problem, a modification, where the involved classical participant does not need to have any extra quantum capacities, is proposed.

Author Contributions

Conceptualization, J.G. and T.H.; Formal analysis, J.G.; Funding acquisition, J.G. and T.H.; Methodology, J.G.; Project administration, T.H.; Supervision, T.H.; Writing–original draft, J.G.; Writing–review & editing, T.H.. All authors have read and agreed to the published version of the manuscript.

Funding

This research is partially supported by the Ministry of Science and Technology of the Republic of China (No. MOST 109-2221-E-006-168-), the Scientific Research Fund of Zhejiang Provincial Education Department (No. Y202146864), and the Open Fund of Key Lab of Film and TV Media Technology of Zhejiang Province (No. 2020E10015).

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Bennet, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 9–12 December 1984; pp. 175–179. [Google Scholar]
  2. Grosshans, F.; van Assche, G.; Wenger, J.; Brouri, R.; Cerf, N.J.; Grangier, P. Quantum key distribution using gaussian-modulated coherent states. Nature 2003, 421, 238–241. [Google Scholar] [CrossRef] [PubMed]
  3. Lo, H.-K.; Ma, X.; Chen, K. Decoy state quantum key distribution. Phys. Rev. Lett. 2005, 94, 230504. [Google Scholar] [CrossRef]
  4. Lim, C.C.W.; Portmann, C.; Tomamichel, M.; Renner, R.; Gisin, N. Device-independent quantum key distribution with local Bell test. Phys. Rev. X 2013, 3, 031006. [Google Scholar] [CrossRef]
  5. Boyer, M.; Kenigsberg, D.; Mor, T. Quantum key distribution with classical Bob. Phys. Rev. Lett. 2007, 99, 140501. [Google Scholar] [CrossRef] [PubMed]
  6. Zhang, Z.-J. Multiparty secret sharing of quantum information via cavity QED. Opt. Commun. 2006, 261, 199–202. [Google Scholar] [CrossRef]
  7. Zhang, Z.-J. Robust multiparty quantum secret key sharing over two collective-noise channels. Phys. A Stat. Mech. Its Appl. 2006, 361, 233–238. [Google Scholar] [CrossRef]
  8. Jun, L.; Yi-Min, L.; Yan, X.; Zhan-Jun, Z. Revisiting controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding. Commun. Theor. Phys. 2008, 49, 887. [Google Scholar] [CrossRef]
  9. Zou, X.; Qiu, D.; Li, L.; Wu, L.; Li, L. Semiquantum-key distribution using less than four quantum states. Phys. Rev. A 2009, 79, 052312. [Google Scholar] [CrossRef]
  10. Zhu, K.-N.; Zhou, N.-R.; Wang, Y.-Q.; Wen, X.-J. Semi-quantum key distribution protocols with GHZ states. Int. J. Theor. Phys. 2018, 57, 3621–3631. [Google Scholar] [CrossRef]
  11. Zhou, N.R.; Zhu, K.N.; Zou, X.F. Multi-Party Semi-Quantum Key Distribution Protocol With Four-Particle Cluster States. Ann. Der Phys. 2019, 531, 1800520. [Google Scholar] [CrossRef]
  12. Wang, J.; Zhang, S.; Zhang, Q.; Tang, C.-J. Semiquantum key distribution using entangled states. Chin. Phys. Lett. 2011, 28, 100301. [Google Scholar] [CrossRef]
  13. Krawec, W.O. Security proof of a semi-quantum key distribution protocol. In Proceedings of the 2015 IEEE International Symposium on Information Theory (ISIT), Hong Kong, China, 14–19 June 2015; pp. 686–690. [Google Scholar]
  14. Boyer, M.; Mor, T. Comment on “Semiquantum-key distribution using less than four quantum states”. Phys. Rev. A 2011, 83, 046301. [Google Scholar] [CrossRef]
  15. Yan, L.; Zhang, S.; Chang, Y.; Sheng, Z.; Sun, Y. Semi-quantum key agreement and private comparison protocols using Bell states. Int. J. Theor. Phys. 2019, 58, 3852–3862. [Google Scholar] [CrossRef]
  16. Shukla, C.; Thapliyal, K.; Pathak, A. Semi-quantum communication: Protocols for key agreement, controlled secure direct communication and dialogue. Quantum Inf. Processing 2017, 16, 1–19. [Google Scholar] [CrossRef]
  17. Liu, W.-J.; Chen, Z.-Y.; Ji, S.; Wang, H.-B.; Zhang, J. Multi-party semi-quantum key agreement with delegating quantum computation. Int. J. Theor. Phys. 2017, 56, 3164–3174. [Google Scholar] [CrossRef]
  18. Li, H.-H.; Gong, L.-H.; Zhou, N.-R. New semi-quantum key agreement protocol based on high-dimensional single-particle states. Chin. Phys. B 2020, 29, 110304. [Google Scholar] [CrossRef]
  19. Yu, K.-F.; Gu, J.; Hwang, T.; Gope, P. Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing. Quantum Inf. Processing 2017, 16, 194. [Google Scholar] [CrossRef]
  20. Xie, C.; Li, L.; Qiu, D. A novel semi-quantum secret sharing scheme of specific bits. Int. J. Theor. Phys. 2015, 54, 3819–3824. [Google Scholar] [CrossRef]
  21. Tian, Y.; Li, J.; Chen, X.-B.; Ye, C.-Q.; Li, H.-J. An efficient semi-quantum secret sharing protocol of specific bits. Quantum Inf. Processing 2021, 20, 217. [Google Scholar] [CrossRef]
  22. Li, Z.; Li, Q.; Liu, C.; Peng, Y.; Chan, W.H.; Li, L. Limited resource semiquantum secret sharing. Quantum Inf. Processing 2018, 17, 285. [Google Scholar] [CrossRef]
  23. Li, L.; Qiu, D.; Mateus, P. Quantum secret sharing with classical Bobs. J. Phys. A Math. Theor. 2013, 46, 045304. [Google Scholar] [CrossRef]
  24. Gao, X.; Zhang, S.; Chang, Y. Cryptanalysis and improvement of the semi-quantum secret sharing protocol. Int. J. Theor. Phys. 2017, 56, 2512–2520. [Google Scholar] [CrossRef]
  25. Zhang, W.; Qiu, D.; Mateus, P. Single-state semi-quantum key distribution protocol and its security proof. Int. J. Quantum Inf. 2020, 18, 2050013. [Google Scholar] [CrossRef]
Figure 1. The relationships among n , m , and l .
Figure 1. The relationships among n , m , and l .
Electronics 11 02522 g001
Table 1. States transformation during the double C-NOT attack.
Table 1. States transformation during the double C-NOT attack.
Initial1st C-NOT K B Bob’s OperationParticle Sent Back2nd C-NOT
q c , q t q c 1 , q t 1 q c 2 , q t 1 q c 3 , q t 1 q c 4 , q t 1
| + 0 q c q t | Φ + q c 1 q t 1 0 Reflect   | Φ + q c 2 q t 1 | Φ + q c 3 q t 1 | + 0 q c 4 q t 1
1 measure | 00 q c 2 q t 1 | 00 q c 3 q t 1 | 00 q c 4 q t 1
measure | 11 q c 2 q t 1 | 01 q c 3 q t 1 | 01 q c 4 q t 1
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Gu, J.; Hwang, T. Double C-NOT Attack on a Single-State Semi-Quantum Key Distribution Protocol and Its Improvement. Electronics 2022, 11, 2522. https://doi.org/10.3390/electronics11162522

AMA Style

Gu J, Hwang T. Double C-NOT Attack on a Single-State Semi-Quantum Key Distribution Protocol and Its Improvement. Electronics. 2022; 11(16):2522. https://doi.org/10.3390/electronics11162522

Chicago/Turabian Style

Gu, Jun, and Tzonelih Hwang. 2022. "Double C-NOT Attack on a Single-State Semi-Quantum Key Distribution Protocol and Its Improvement" Electronics 11, no. 16: 2522. https://doi.org/10.3390/electronics11162522

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop