Skip to main content
Erschienen in: Quantum Information Processing 1/2016

01.01.2016

Quantum entanglement establishment between two strangers

verfasst von: Tzonelih Hwang, Tzu-Han Lin, Shih-Hung Kao

Erschienen in: Quantum Information Processing | Ausgabe 1/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper presents the first quantum entanglement establishment scheme for strangers who neither pre-share any secret nor have any authenticated classical channel between them. The proposed protocol requires only the help of two almost dishonest third parties (TPs) to achieve the goal. The security analyses indicate that the proposed protocol is secure against not only an external eavesdropper’s attack, but also the TP’s attack.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
2.
Zurück zum Zitat Bennett, C.H., Brassard, G., Crépeau, C., Jozsa, R., Peres, A., Wootters, W.K.: Teleporting an unknown quantum state via dual classical and einstein-podolsky-rosen channels. Phys. Rev. Lett. 70(13), 1895–1899 (1993)MathSciNetCrossRefADSMATH Bennett, C.H., Brassard, G., Crépeau, C., Jozsa, R., Peres, A., Wootters, W.K.: Teleporting an unknown quantum state via dual classical and einstein-podolsky-rosen channels. Phys. Rev. Lett. 70(13), 1895–1899 (1993)MathSciNetCrossRefADSMATH
3.
Zurück zum Zitat Broadbent, A., Fitzsimons, J., Kashefi, E.: Universal blind quantum computation. In: Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science, Oct 2009, pp. 517–526 Broadbent, A., Fitzsimons, J., Kashefi, E.: Universal blind quantum computation. In: Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science, Oct 2009, pp. 517–526
5.
Zurück zum Zitat Deng, F.-G., Li, X.-H., Li, C.-Y., Zhou, P., Zhou, H.-Y.: Multiparty quantum-state sharing of an arbitrary two-particle state with einstein-podolsky-rosen pairs. Phys. Rev. A 72, 044301 (2005)CrossRefADS Deng, F.-G., Li, X.-H., Li, C.-Y., Zhou, P., Zhou, H.-Y.: Multiparty quantum-state sharing of an arbitrary two-particle state with einstein-podolsky-rosen pairs. Phys. Rev. A 72, 044301 (2005)CrossRefADS
6.
Zurück zum Zitat Bennett, C., Hayden, P., Leung, D., Shor, P., Winter, A.: Remote preparation of quantum states. IEEE Trans. Inf. Theory 51(1), 56–74 (2005)MathSciNetCrossRefMATH Bennett, C., Hayden, P., Leung, D., Shor, P., Winter, A.: Remote preparation of quantum states. IEEE Trans. Inf. Theory 51(1), 56–74 (2005)MathSciNetCrossRefMATH
7.
Zurück zum Zitat Qi, S., Zheng, H., Qiaoyan, W., Wenmin, L.: Quantum blind signature based on two-state vector formalism. Opt. Commun. 283(21), 4408–4410 (2010)CrossRefADS Qi, S., Zheng, H., Qiaoyan, W., Wenmin, L.: Quantum blind signature based on two-state vector formalism. Opt. Commun. 283(21), 4408–4410 (2010)CrossRefADS
8.
Zurück zum Zitat Chen, X.-B., Xu, G., Niu, X.-X., Wen, Q.-Y., Yang, Y.-X.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt. Commun. 283(7), 1561–1565 (2010)CrossRefADS Chen, X.-B., Xu, G., Niu, X.-X., Wen, Q.-Y., Yang, Y.-X.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt. Commun. 283(7), 1561–1565 (2010)CrossRefADS
9.
Zurück zum Zitat Jia, H.-Y., Wen, Q.-Y., Song, T.-T., Gao, F.: Quantum protocol for millionaire problem. Opt. Commun. 284(1), 545–549 (2011)CrossRefADS Jia, H.-Y., Wen, Q.-Y., Song, T.-T., Gao, F.: Quantum protocol for millionaire problem. Opt. Commun. 284(1), 545–549 (2011)CrossRefADS
10.
Zurück zum Zitat Zhang, W.-W., Zhang, K.-J.: Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party. Quantum Inf. Process. 12(5), 1981–1990 (2013)MathSciNetCrossRefADS Zhang, W.-W., Zhang, K.-J.: Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party. Quantum Inf. Process. 12(5), 1981–1990 (2013)MathSciNetCrossRefADS
11.
Zurück zum Zitat Lin, J., Tseng, H.-Y., Hwang, T.: Intercept-resend attacks on chen et al’.s quantum private comparison protocol and the improvements. Opt. Commun. 284(9), 2412–2414 (2011)CrossRefADS Lin, J., Tseng, H.-Y., Hwang, T.: Intercept-resend attacks on chen et al’.s quantum private comparison protocol and the improvements. Opt. Commun. 284(9), 2412–2414 (2011)CrossRefADS
12.
Zurück zum Zitat Xiu, X.-M., Dong, L., Gao, Y.-J.: Secure four-site distribution and quantum communication of [chi]-type entangled states. Opt. Commun. 284(7), 2065–2069 (2011)CrossRefADS Xiu, X.-M., Dong, L., Gao, Y.-J.: Secure four-site distribution and quantum communication of [chi]-type entangled states. Opt. Commun. 284(7), 2065–2069 (2011)CrossRefADS
13.
Zurück zum Zitat Gao, F., Lin, S., Wen, Q.-Y., Zhu, F.-C.: A special eavesdropping on one-sender versus n-receiver qsdc protocol. Chin. Phys. Lett. 25(5), 1561 (2008)CrossRefADS Gao, F., Lin, S., Wen, Q.-Y., Zhu, F.-C.: A special eavesdropping on one-sender versus n-receiver qsdc protocol. Chin. Phys. Lett. 25(5), 1561 (2008)CrossRefADS
14.
Zurück zum Zitat Qin, S.-J., Wen, Q.-Y., Zhu, F.-C.: An external attack on the brádler–dušek protocol. J. Phys. B At. Mol. Opt. Phys. 40(24), 4661 (2007)CrossRefADS Qin, S.-J., Wen, Q.-Y., Zhu, F.-C.: An external attack on the brádler–dušek protocol. J. Phys. B At. Mol. Opt. Phys. 40(24), 4661 (2007)CrossRefADS
15.
Zurück zum Zitat Qin, S.-J., Gao, F., Wen, Q.-Y., Meng, L.-M., Zhu, F.-C.: Cryptanalysis and improvement of a secure quantum sealed-bid auction. Opt. Commun. 282(19), 4014–4016 (2009)CrossRefADS Qin, S.-J., Gao, F., Wen, Q.-Y., Meng, L.-M., Zhu, F.-C.: Cryptanalysis and improvement of a secure quantum sealed-bid auction. Opt. Commun. 282(19), 4014–4016 (2009)CrossRefADS
16.
Zurück zum Zitat Gao, F., Qin, S.-J., Wen, Q.-Y., Zhu, F.-C.: Cryptanalysis of multiparty controlled quantum secure direct communication using greenberger-horne-zeilinger state. Opt. Commun. 283(1), 192–195 (2010)CrossRefADS Gao, F., Qin, S.-J., Wen, Q.-Y., Zhu, F.-C.: Cryptanalysis of multiparty controlled quantum secure direct communication using greenberger-horne-zeilinger state. Opt. Commun. 283(1), 192–195 (2010)CrossRefADS
17.
Zurück zum Zitat Hwang, T., Lee, K.-C., Li, C.-M.: Provably secure three-party authenticated quantum key distribution protocols. IEEE Trans. Dependable Secur. Comput. 4(1), 71–80 (2007)MathSciNetCrossRef Hwang, T., Lee, K.-C., Li, C.-M.: Provably secure three-party authenticated quantum key distribution protocols. IEEE Trans. Dependable Secur. Comput. 4(1), 71–80 (2007)MathSciNetCrossRef
18.
Zurück zum Zitat Shih, H.-C., Lee, K.-C., Hwang, T.: New efficient three-party quantum key distribution protocols. IEEE J. Sel. Top. Quantum Electron. 15(6), 1602–1606 (2009)CrossRef Shih, H.-C., Lee, K.-C., Hwang, T.: New efficient three-party quantum key distribution protocols. IEEE J. Sel. Top. Quantum Electron. 15(6), 1602–1606 (2009)CrossRef
19.
Zurück zum Zitat Yang, Y.-G., Wen, Q.-Y.: Economical multiparty simultaneous quantum identity authentication based on greenberger-horne-zeilinger states. Chin. Phys. B 18(8), 3233–3237 (2009) Yang, Y.-G., Wen, Q.-Y.: Economical multiparty simultaneous quantum identity authentication based on greenberger-horne-zeilinger states. Chin. Phys. B 18(8), 3233–3237 (2009)
20.
Zurück zum Zitat Huang, S.-L., Hwang, T., Gope, P.: Multi-party quantum private comparison with an almost-dishonest third party. Quantum Inf. Process. 14(11), 4225–4235 (2015)MathSciNetCrossRefADS Huang, S.-L., Hwang, T., Gope, P.: Multi-party quantum private comparison with an almost-dishonest third party. Quantum Inf. Process. 14(11), 4225–4235 (2015)MathSciNetCrossRefADS
21.
Zurück zum Zitat Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299(5886), 802–803 (1982)CrossRefADS Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299(5886), 802–803 (1982)CrossRefADS
22.
Zurück zum Zitat Li, C.-Y., et al.: Secure quantum key distribution network with bell states and local unitary operations. Chin. Phys. Lett. 22(5), 1049 (2005)CrossRefADS Li, C.-Y., et al.: Secure quantum key distribution network with bell states and local unitary operations. Chin. Phys. Lett. 22(5), 1049 (2005)CrossRefADS
23.
Zurück zum Zitat Li, C.-Y., Li, X.-H., Deng, F.-G., Zhou, P., Liang, Y.-J., Zhou, H.-Y.: Efficient quantum cryptography network without entanglement and quantum memory. Chin. Phys. Lett. 23(11), 2896 (2006)CrossRefADS Li, C.-Y., Li, X.-H., Deng, F.-G., Zhou, P., Liang, Y.-J., Zhou, H.-Y.: Efficient quantum cryptography network without entanglement and quantum memory. Chin. Phys. Lett. 23(11), 2896 (2006)CrossRefADS
24.
Zurück zum Zitat Deng, F.-G., Li, X.-H., Zhou, H.-Y., Zhang, Z.-J.: Improving the security of multiparty quantum secret sharing against Trojan Horse attack. Phys. Rev. A 72(4), 044302 (2005)CrossRefADS Deng, F.-G., Li, X.-H., Zhou, H.-Y., Zhang, Z.-J.: Improving the security of multiparty quantum secret sharing against Trojan Horse attack. Phys. Rev. A 72(4), 044302 (2005)CrossRefADS
25.
Zurück zum Zitat Cai, Q.-Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1–2), 23–25 (2006)CrossRefADSMATH Cai, Q.-Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1–2), 23–25 (2006)CrossRefADSMATH
26.
Zurück zum Zitat Li, X.-H., Deng, F.-G., Zhou, H.-Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74(5), 054302 (2006)CrossRefADS Li, X.-H., Deng, F.-G., Zhou, H.-Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74(5), 054302 (2006)CrossRefADS
27.
Zurück zum Zitat Chong, S.-K., Luo, Y.-P., Hwang, T.: On arbitrated quantum signature of classical messages against collective amplitude damping noise. Opt. Commun. 284(3), 893–895 (2011)CrossRefADS Chong, S.-K., Luo, Y.-P., Hwang, T.: On arbitrated quantum signature of classical messages against collective amplitude damping noise. Opt. Commun. 284(3), 893–895 (2011)CrossRefADS
28.
Zurück zum Zitat Deng, F.-G., Long, G.L., Liu, X.-S.: Two-step quantum direct communication protocol using the einstein-podolsky-rosen pair block. Phys. Rev. A 68(4), 042317 (2003)CrossRefADS Deng, F.-G., Long, G.L., Liu, X.-S.: Two-step quantum direct communication protocol using the einstein-podolsky-rosen pair block. Phys. Rev. A 68(4), 042317 (2003)CrossRefADS
29.
Zurück zum Zitat Gao, F., Guo, F., Wen, Q., Zhu, F.: Comparing the efficiencies of different detect strategies in the ping-pong protocol. Sci. China Ser. G Phys. Mech. Astron. 51(12), 1853–1860 (2008)CrossRefADS Gao, F., Guo, F., Wen, Q., Zhu, F.: Comparing the efficiencies of different detect strategies in the ping-pong protocol. Sci. China Ser. G Phys. Mech. Astron. 51(12), 1853–1860 (2008)CrossRefADS
30.
Zurück zum Zitat Wang, T.-Y., Wen, Q.-Y., Zhu, F.-C.: Secure authentication of classical messages with single photons. Chin. Phys. B 18(8), 3189 (2009)CrossRefADS Wang, T.-Y., Wen, Q.-Y., Zhu, F.-C.: Secure authentication of classical messages with single photons. Chin. Phys. B 18(8), 3189 (2009)CrossRefADS
31.
Zurück zum Zitat Fei, G., Su-Juan, Q., Fen-Zhuo, G., Qiao-Yan, W.: Dense-coding attack on three-party quantum key distribution protocols. IEEE J. Quantum Electron. 47(5), 630–635 (2011)CrossRefADS Fei, G., Su-Juan, Q., Fen-Zhuo, G., Qiao-Yan, W.: Dense-coding attack on three-party quantum key distribution protocols. IEEE J. Quantum Electron. 47(5), 630–635 (2011)CrossRefADS
32.
Zurück zum Zitat Yang, C.-W., Hwang, T., Lin, T.-H.: Modification attack on qsdc with authentication and the improvement. Int. J. Theor. Phys. 52(7), 2230–2234 (2013)MathSciNetCrossRef Yang, C.-W., Hwang, T., Lin, T.-H.: Modification attack on qsdc with authentication and the improvement. Int. J. Theor. Phys. 52(7), 2230–2234 (2013)MathSciNetCrossRef
33.
Zurück zum Zitat Lin, T.-H., Yang, C.-W., Hwang, T.: Attacks and improvement on quantum direct communication with mutual authentication. Int. J. Theor. Phys. 53(2), 597–602 (2014)MathSciNetCrossRefMATH Lin, T.-H., Yang, C.-W., Hwang, T.: Attacks and improvement on quantum direct communication with mutual authentication. Int. J. Theor. Phys. 53(2), 597–602 (2014)MathSciNetCrossRefMATH
Metadaten
Titel
Quantum entanglement establishment between two strangers
verfasst von
Tzonelih Hwang
Tzu-Han Lin
Shih-Hung Kao
Publikationsdatum
01.01.2016
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 1/2016
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-015-1166-y

Weitere Artikel der Ausgabe 1/2016

Quantum Information Processing 1/2016 Zur Ausgabe

Neuer Inhalt