| Literature DB >> 33171748 |
Zishuai Zhou1, Qisheng Guang1, Chaohui Gao1, Dong Jiang1,2, Lijun Chen1.
Abstract
We present an innovative method for quantum two-party cryptography. Our protocol introduces joint measurement and error estimation to improve the security of two-party cryptographic protocols. Our protocol removes the assumption of the attacker's limited power and catches the attacking actions through highly estimated bit error rate. Our protocol is formally proved to be secure against both eavesdroppers and dishonest communication parties. We also utilize our designed protocol to construct two specific two-party cryptographic applications: Quantum bit commitment and quantum password identification.Entities:
Keywords: measurement-device-independent; quantum; two-party cryptography
Year: 2020 PMID: 33171748 PMCID: PMC7664419 DOI: 10.3390/s20216351
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The basic setup of a measurement-device-independent QKD (MDI-QKD) protocol is in Ref. [19]. Alice and Bob use three devices to prepare their photons, and the third party will make a joint measurement and announce measurement output.
Alice or Bob flip their key based on the outcomes of measurement and announced prepared basis [19].
| Alice & Bob Basis | Relay Output | Relay Output |
|---|---|---|
| + | Bit flip | Bit flip |
| × | Bit flip | No bit flip |
Figure 2Mesurement setup used in phase-matching QKD (PM-QKD).
Figure 3The ideal functionality of weak string erasure (WSE).
Figure 4The ideal functionality of 1-2 random oblivious transfer (ROT). Bob has input c, Alice gets , and Bob gets outputs with and .