Quantum Key Agreement Via Non-maximally Entangled Cluster States
- PDF / 460,061 Bytes
- 16 Pages / 439.37 x 666.142 pts Page_size
- 66 Downloads / 220 Views
Quantum Key Agreement Via Non-maximally Entangled Cluster States Taichao Li 1 & Xu Wang 1 & Min Jiang 1,2 Received: 1 June 2020 / Accepted: 27 August 2020/ # Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract
In this paper, we present a quantum key agreement (QKA) protocol with non-maximally entangled four-qubit cluster states. In our scheme, each participant carries out two unitary operations on the same photons of each cluster state according to its own encryption key. Then, all participants generate identical four-bit shared keys by positive operator-valued measurement (POVM). Since POVM is probabilistic, it is necessary to prepare a longer raw key, and we only select sub-keys in public locations of qubit sequences where all participants succeed in POVMs as the final negotiation key. The advantage of our protocol is that non-maximally entangled cluster states are firstly utilized as the carrier of quantum information in quantum key agreement protocol. It also ensures that the shared key is decided by all participants, not by someone alone. In addition, it is proved that our protocol can resist external attacks and participant attacks, which demonstrates a high security. Keywords Quantum key agreement . Four-particle cluster state . Positive operator-valued measurement . Quantum communication
1 Introduction Due to the development of quantum computing, classical cryptographic systems are facing huge challenges. In this circumstance, quantum cryptography [1–4] was presented and has been developing rapidly in the past decades. Because of its complete security guaranteed by the principle of quantum mechanics, quantum cryptography has become a hot research area, which includes quantum key distribution (QKD) [5–7], quantum key agreement (QKA)
* Min Jiang [email protected]
1
School of Electronics & Information Engineering, Soochow University, Suzhou 215006, People’s Republic of China
2
Key Laboratory of System Control and Information Processing, Ministry of Education, Shanghai 200240, People’s Republic of China
International Journal of Theoretical Physics
[8–15], quantum secret direct communication (QSDC) [16, 17], deterministic secure quantum communication (DSQC) [18–20], quantum secret sharing (QSS) [21–24] and quantum signature (QS) [25–28], etc. Quantum key distribution allows participants to share public keys through unsafe channels and requires the ability to prevent from external attacks. In QKD, only one participant determines a private key and distributes it to other participants. Compared to QKD, each participant in a QKA protocol should equally contribute to a shared key, so the generated key cannot be determined by any non-trivial part of participants. In addition, a QKA protocol should have the ability to resist participant attacks besides external attacks. The first QKA protocol based on quantum teleportation was proposed by Zhou et al. [8] in 2004. However, the protocol was pointed out by Tsai et al. [9] that partial participants could determine the agreement key w
Data Loading...