| Literature DB >> 31748651 |
Zhiwei Sun1,2, Rong Cheng1, Chunhui Wu3, Cai Zhang4,5.
Abstract
Fairness is an important standard needed to be considered in a secure quantum key agreement (QKA) protocol. However, it found that most of the quantum key agreement protocols in the travelling model are not fair, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. Thus, how to construct a fair and secure key agreement protocol has obtained much attention. In this paper, a new fair multiparty QKA protocol that can resist the collusive attack is proposed. More specifically, we show that in a client-server scenario, it is possible for the clients to share a key and reveal nothing about what key has been agreed upon to the server. The server prepares quantum states for clients to encode messages to avoid the participants' collusive attack. This construction improves on previous work, which requires either preparing multiple quantum resources by clients or two-way quantum communication. It is proven that the protocol does not reveal to any eavesdropper, including the server, what key has been agreed upon, and the dishonest participants can be prevented from collaborating to predetermine the final key.Entities:
Year: 2019 PMID: 31748651 PMCID: PMC6868178 DOI: 10.1038/s41598-019-53524-4
Source DB: PubMed Journal: Sci Rep ISSN: 2045-2322 Impact factor: 4.379
Efficiency comparison. For easier comparison, let the key length is m, the number of participants is N, the detection rate κ = 1, the dishonest participants t = N − 1.
| QKA protocol | participants prepare message states | TP | Collusive Attacks | |
|---|---|---|---|---|
| LGHW protocol | No | Secure | ||
| HSX protocol | No | Secure | ||
| WSH protocol | No | Secure | ||
| Ours | 0 | Yes | Secure |
Figure 1Efficiency comparison of the different protocols, where κ = 1 and N = 2, 3, …, 10.