首页 | 本学科首页   官方微博 | 高级检索  
     


Designing Secure Quantum Key Agreement Protocols Against Dishonest Participants
Authors:Huang  Wei-cong  Yang   Yong-kai  Jiang   Dong  Gao   Chao-hui  Chen   Li-jun
Affiliation:1.State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, 210046, People’s Republic of China
;
Abstract:

Quantum key agreement (QKA) aims to negotiate a secure and consistent key among several participants. In this paper, we find that a type of QKA protocol is not secure when a participant is dishonest. He can make the honest participants obtain wrong final keys, which may lead to serious consequences. To resist such attacks, we design a defense strategy by introducing a trusted third party. The theoretical analysis results show that our defense strategy not only can detect the dishonest participant’s attacks, but also can identify who is dishonest. Finally we design an optical platform for participants, and show that both our attack and defense strategies are feasible with current technologies.

Keywords:
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号