| Literature DB >> 35808492 |
Hung-Wen Wang1, Chia-Wei Tsai2, Jason Lin3, Chun-Wei Yang1.
Abstract
In 2019, Wen et al. proposed authenticated semi-quantum key distribution (ASQKD) for identity and message using the teleportation of W states and GHZ-like states without pre-shared keys. However, the ASQKD protocol presents a vital issue in the teleportation of W states owing to its inappropriate design. Bob recovers the teleported W states without obtaining the position of the corresponding photons and then returns the recovered photons back to Alice. Hence, the teleportation of W states in Wen et al.'s ASQKD protocol was malfunctioning. Moreover, Wen et al.'s ASQKD protocol requires quantum memory, which strongly disobeys the definition of semi-quantum proposed by Boyer et al. Therefore, in this study, we discover the flaws of Wen et al.'s ASQKD protocol and propose an authenticated semi-quantum key distribution protocol. When compared to Wen et al.'s ASQKD protocol, the proposed ASQKD protocol has the following advantages: legal semi-quantum environment (i.e., does not require quantum memory), reduced quantum hardware requirement (i.e., based only on W states), does not involve classical cryptography (i.e., the hash function), and provided 1.6 times higher qubit efficiency.Entities:
Keywords: authentication; quantum cryptography; semi-quantum key distribution; w state
Mesh:
Year: 2022 PMID: 35808492 PMCID: PMC9269753 DOI: 10.3390/s22134998
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Coding rule of generating .
|
|
|
|
|
|---|---|---|---|
|
|
|
|
|
Coding rule of generating .
|
|
| |
|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Figure 1Proposed ASQKD protocol.
Comparison of [59,60,63,64,65,66] and the proposed ASQKD protocol.
| Yu et al.’s | Li et al.’s | Zebboudj et al.’s | Chang et al.’s | Wang et al.’s | Wen et al.’s | The Proposed ASQKD Protocol | |
|---|---|---|---|---|---|---|---|
| Quantum resource | Bell states | Bell states, | Single photons | Single photons | Single photons | GHZ-like states | W states |
| Qubit efficiency | 10% | 11% | 14% | 17% | 14% |
|
|
| Required pre-shared keys (in bits) | 6n | 4n | 3n | 3n | 3n | 4n | 5n |
| Classical participant’s quantum capabilities | Generate | Generate | Generate | Generate | Generate | Generate | Generate |
| Classical participant does not require quantum memory | Yes | Yes | Yes | Yes | Yes | No | Yes |
| Legal semi-quantum environment | Yes | Yes | Yes | Yes | Yes | No | Yes |
| The protocol does not require the hash function | Yes | No | No | No | No | No | Yes |
| Runnable protocol | Yes | Yes | Yes | Yes | Yes | No | Yes |
| Required classical channel | Yes | Yes | Yes | Yes | No | Yes | Yes |
| Robustness of the reflecting attack | Yes | Yes | Yes | No | Yes | Yes | Yes |