| Literature DB >> 28332610 |
Hao Cao1,2, Wenping Ma1.
Abstract
Quantum key agreement is an important topic that the shared key must be negotiated equally by all participants, and any nontrivial subset of participants cannot fully determine the shared key. To date, the embed modes of subkey in all the previously proposed quantum key agreement protocols are based on either BB84 or entangled states. The research of the quantum key agreement protocol based on quantum search algorithms is still blank. In this paper, on the basis of investigating the properties of quantum search algorithms, we propose the first quantum key agreement protocol whose embed mode of subkey is based on a quantum search algorithm known as Grover's algorithm. A novel example of protocols with 5 - party is presented. The efficiency analysis shows that our protocol is prior to existing MQKA protocols. Furthermore it is secure against both external attack and internal attacks.Entities:
Year: 2017 PMID: 28332610 PMCID: PMC5362919 DOI: 10.1038/srep45046
Source DB: PubMed Journal: Sci Rep ISSN: 2045-2322 Impact factor: 4.379
The Values of with Different w, w 2 and w 1.
| { | ||
|---|---|---|
| |+ +〉/00 | {00, 01} | |− +〉/01 |
| |+ +〉/00 | {00, 10} | |+ −〉/10 |
| |+ +〉/00 | {00, 11} | |− −〉/11 |
| |+ −〉/10 | {00, 01} | |− −〉/11 or −|− −〉/11 |
| |+ −〉/10 | {00, 10} | |+ +〉/00 or −|+ +〉/00 |
| |+ −〉/10 | {00, 11} | |− +〉/01 or −|− +〉/01 |
| |− +〉/01 | {00, 01} | |+ +〉/00 or −|+ +〉/00 |
| |− +〉/01 | {00, 10} | |− −〉/11 or −|− −〉/11 |
| |− +〉/01 | {00, 11} | |+ −〉/10 or −|+ −〉/10 |
| |− −〉/11 | {00, 01} | |+ −〉/10 or −|+ −〉/10 |
| |− −〉/11 | {00, 10} | |− +〉/01 or −|− +〉/01 |
| |− −〉/11 | {00, 11} | |+ +〉/00 or −|+ +〉/00 |
Figure 1The performance of the proposed MQKA without considering eavesdropping checking.
Each participant P sends a random two-particle state sequence from the solid circle to the next participant, and with solid diamond as the end. After encoded by all other participants, the sequence is transmitted back to P.
Comparison between the existed five MQKA protocols with our protocol.
| Number of Measurements | Number of Unitary Operations | Security against Internal Attack | ||
|---|---|---|---|---|
| LGHW protocol | 2( | 0 | Secure | |
| SZ protocol | ( | 0 | Insecure | |
| SZWYZL protocol | (2 | Secure | ||
| SYW protocol | ( | ( | Secure | |
| SZWLL protocol | 2( | ( | Insecure | |
| Our protocol | 2( | ( | Secure |