| Literature DB >> 34853361 |
Chia-Wei Tsai1, Chun-Wei Yang2,3.
Abstract
The mediated semi-quantum key distribution (MSQKD) protocol is an important research issue that lets two classical participants share secret keys securely between each other with the help of a third party (TP). However, in the existing MSQKD protocols, there are two improvable issues, namely (1) the classical participants must be equipped with expensive detectors to avoid Trojan horse attacks and (2) the trustworthiness level of TP must be honest. To the best of our knowledge, none of the existing MSQKD protocols can resolve both these issues. Therefore, this study takes Bell states as the quantum resource to propose a MSQKD protocol, in which the classical participants do not need a Trojan horse detector and the TP is dishonest. Furthermore, the proposed protocol is shown to be secure against well-known attacks and the classical participants only need two quantum capabilities. Therefore, in comparison to the existing MSQKD protocols, the proposed protocol is better practical.Entities:
Year: 2021 PMID: 34853361 PMCID: PMC8636616 DOI: 10.1038/s41598-021-02614-3
Source DB: PubMed Journal: Sci Rep ISSN: 2045-2322 Impact factor: 4.379
Summary of semi-quantum environment.
| Environment | Capabilities of classical user |
|---|---|
| Measure-resend environment | Generating Z-basis qubits Z-basis measurement Reflecting photons without disturbance |
| Randomization-based environment | Z-basis measurement Reordering photons using different delay lines Reflecting photons without disturbance |
| Measurement-free environment | Generating Z-basis qubits Reordering photons using different delay lines Reflecting photons without disturbance |
| Unitary operation based environment | Z-basis measurement Generating Z-basis qubits Performing unitary operations |
Trustworthiness levels of TP.
| Trustworthiness level | Definition |
|---|---|
| Honest TP | The TP has to follow the procedure of the protocol honestly and the participants can completely trust it. Therefore, the participants can share their secret information with the TP. However, the assumption of a trustworthy TP may be impractical |
| Semi-honest TP | The TP has to execute the protocol loyally, but it may try to obtain the participants’ secret information passively using the records of all intermediate transmissions and computations by the participants |
| Almost dishonest TP | To extract the participants’ secret information, the TP may perform any possible attacks except collaborating with other participants. This assumption is only suitable for some applications such as a quantum private comparison protocol |
| Untrusted/dishonest TP | The TP may perform any possible attacks |
Summary of assumptions and limitations.
| Assumption and limitation | Description |
|---|---|
| Capacities of classical users | (1). Performing H operation (2). Measuring qubit using Z-basis |
| Capabilities of TP | Generating Bell states |
| Trueness of TP | Dishonest |
| Quantum channel | (1). TP and Alice have an one-way quantum channel, TP → Alice (2). TP and Bob have an one-way quantum channel, TP → Bob |
| Classical channel | (1) Alice ↹ Bob is an authenticated classical channel (2). TP ↹ Alice and TP ↹ Bob are the authenticated classical channels |
Figure 1Processes of the proposed LMSQKD protocol.
Relationship between Bell states and Hadamard operations.
| Initial state | Alice’s operation | Bob’s operation | Qubit state | Relationship of measurement result |
|---|---|---|---|---|
| I | I | |||
| I | H | Uncertain | ||
| H | I | Uncertain | ||
| H | H |
Figure 2The secret key rate under the different QBER values.
Figure 3Time of maintaining qubits.
Comparison to the existing MSQKD protocols.
| Krawec’s[ | Liu et al.’s[ | Lin et al.’s[ | Tsai et al.’s[ | Our protocol | |
|---|---|---|---|---|---|
| Semi-quantum environment | Measure-resend | Measurement-free | Measure-resend | Lightweight unitary operation | Lightweight unitary operation |
| Quantum capability of classical participant | (1) Generation (2) Measurement (3) Reflection | (1) Generation (2) Reflection (3) Reorder | (1) Generation (2) Measurement (3) Reflection | (1) Measurement (2) Operation | (1) Measurement (2) Operation |
| Quantum resources | (1) Single photon (2) Bell state | (1) Single photon (2) Bell state | Single photon | Single photon | Bell state |
| Trustworthiness level of TP | Dishonest | Dishonest | Dishonest | Honest | Dishonest |
| Qubit efficiency | 1/24 | 1/8 | 1/24 | 1/32 | 1/8 |
| Time for maintaining qubits | 2t | 2t + r | 2t | t | t |
| Equipping with detectors or not | Yes | Yes | Yes | No | No |