Utilizing the advantage of quantum entanglement swapping, a multi-party quantum key agreement protocol with authentication is proposed. In this protocol, a semi-trusted third party is introduced, who prepares Bell states, and sends one particle to multiple participants respectively. After that the participants can share a Greenberger-Horne-Zeilinger state by entanglement swapping. Finally, these participants measure the particles in their hands and obtain an agreement key. Here, classical hash function and Hadamard operation are utilized to authenticate the identity of participants. The correlations of GHZ states ensure the security of the proposed protocol. To illustrated it detailly, the security of this protocol against common attacks is analyzed, which shows that the proposed protocol is secure in theory.
相似文献BB84-state is the non-orthogonal single-photon state which has the advantage of easy implementation compared with the quantum multi-photon entanglement states. In this paper, based on BB84-state, by introducing a trusted third-party voting center, a quantum voting scheme is proposed. In this scheme, by performing corresponding unitary operation on BB84-state, all voters send their voting information to the tallyman Charlie, then Charlie counts all votes under the supervision of voting management center Bob, which ensures that the protocol can resist inside attacks. Moreover, by utilizing the decoy particles, our scheme can efficiently prevent outside attacks. Compared with other related quantum voting protocols, our protocol has higher qubit efficiency and fewer interactive times.
相似文献Based on heralded single-photon source (HSPS), a decoy-state measurement-device-independent quantum key distribution (MDI-QKD) protocol is proposed in this paper. The MDI-QKD protocol mainly uses orbital angular momentum (OAM) states and pulse position modulation (PPM) technology to realize the coding of the signal states in heralded single-photon source. The three-intensity decoy states are used to avoid the attacks against the light source. Moreover, the formula of key generation rate is given by computing the lower bound of the yield of single-photon pairs and the upper bound of the error rate of single-photon pairs. Numerical simulation shows that the new MDI-QKD protocol has high key generation rate and low error rate. Moreover, the secure communication distance can be up to 450 km.
相似文献The most typical case of applying technology and communication technology to life may be the popular smart home series. Users can remotely control smart devices through mobile phones, which is convenient and fast, greatly changing people’s way of life. However, the safe login of smart devices has become a thorny problem. With the emergence of quantum computer, the common encryption method cannot prevent quantum attacks. In addition, a family often has multiple smart devices and multiple family members. Each user can log in to multiple smart devices, and each device can also be logged in by multiple users. Therefore, in view of the above situation, we propose a multi-party quantum session key agreement protocol based on Bell states and single particles, which can be used for multiple participants to negotiate session keys together, and improve the efficiency of users logging in and using smart devices. Moreover, our protocol ensures that each party has an equal opportunity to decide the final shared key, no party can determine the final key individually. Furthermore, security and efficiency analysis show that our protocol can achieve ideal results under the existing quantum technology.
相似文献In this paper, a controlled quantum dialogue protocol is designed based on five-qubit entangled states. One five-qubit entangled state can be used to exchange one communicant’s two private bits with the other communicant’s two private bits under the control of an honest supervisor. Security analysis turns out that it can overcome the information leakage problem and can resist the active attacks from an outside attacker. The designed protocol only needs single-particle measurements and Bell state measurements, both of which can be realized with current technologies.
相似文献A multiparty quantum key agreement protocol based on three-photon entangled states is proposed. In this scheme, the quantum channel between all parties is that of a closed loop, in which the qubit transmission is one-way. Each party can obtain the sum of the other parties’ secret key values through the coding rules instead of extracting their private keys. The shared secret key cannot be determined by any subset of all the participants except the universal set and each party makes an equal contribution to the final key. Moreover, the security analysis shows our protocol can resist both outside attacks and inside attacks.
相似文献The operational inclusion of the subclass of entangled states in a quantum key distribution protocol based on biphoton-ququarts is analyzed. Four Bell states are proposed to be used as test states to estimate the error level, leaving the subclass of 12 factorized polarization states of biphotons as information states. The elementary analysis of two strategies for an attack on a quantum communication channel, as well as of the key generation rate, has been performed.
相似文献Recently, a multiparty quantum direct secret sharing protocol with Bell states was presented (Song et al., Int. J Theor. Phys. 57, 1559, 2018). In this protocol, the secret message of the dealer is directly encoding into the transmitted particles. All agents obtain their pieces of secret by making Bell state measurement on their receiving particles, then cooperate to recover the dealer’s secret. However, as we show, this protocol is insecure, because an outside attacker or two special dishonest agents can eavesdrop the secret fully. Furthermore, an improved version of this protocol is proposed, which can stand against the presented attacks.
相似文献A quantum protocol for millionaire problem based on commutative encryption is proposed. In our protocol, Alice and Bob don’t have to use the entangled character, joint measurement of quantum states. They encrypt their private information and privately get the result of their private information with the help of a third party (TP). Correctness analysis shows that the proposed protocol can be used to get the result of their private information correctly. The proposed protocol can also resist various attacks and overcomes the problem of information leakage with acceptable efficiency. In theory, our protocol can be used to build complex secure protocols for other multiparty computation problems and also have lots of other important applications in distributed networks.
相似文献In this paper, a quantum sealed-bid protocol based on semi-quantum bidders is proposed. The protocol uses Bell states to encrypt message and realizes the process that bidders can directly transmit bidding information to the auction center safely. Its essence is a semi-quantum secure direct communication protocol using Bell states. Unlike most similar protocols, our scheme eliminates the trusted third-party Trent and sets the auction center Charlie as completely honest. Considering that the auction involves human activities, too many quantum servers are not only costly, but also unrealistic. Therefore, we set the bidders as semi-quantum users and implement the Vickrey auction. In addition, the security analysis shows that our scheme has high security and is completely feasible.
相似文献We investigate that the average fidelity of the standard quantum teleportation communication protocol when the quantum channel is affected by different local collective noise environments frequently encountered in real quantum communication protocol. We show that the quantum teleportation efficiency can be enhanced when the noise is unavoidable by choose the fit Bell state as the quantum channel, especially we can get perfect quantum teleportation efficiency under the local collective Pauli σy noise environment. Our work can shed some light on the application of practical standard quantum teleportation communication protocol.
相似文献