Literature DB >> 35808492

Authenticated Semi-Quantum Key Distribution Protocol Based on W States.

Hung-Wen Wang1, Chia-Wei Tsai2, Jason Lin3, Chun-Wei Yang1.   

Abstract

In 2019, Wen et al. proposed authenticated semi-quantum key distribution (ASQKD) for identity and message using the teleportation of W states and GHZ-like states without pre-shared keys. However, the ASQKD protocol presents a vital issue in the teleportation of W states owing to its inappropriate design. Bob recovers the teleported W states without obtaining the position of the corresponding photons and then returns the recovered photons back to Alice. Hence, the teleportation of W states in Wen et al.'s ASQKD protocol was malfunctioning. Moreover, Wen et al.'s ASQKD protocol requires quantum memory, which strongly disobeys the definition of semi-quantum proposed by Boyer et al. Therefore, in this study, we discover the flaws of Wen et al.'s ASQKD protocol and propose an authenticated semi-quantum key distribution protocol. When compared to Wen et al.'s ASQKD protocol, the proposed ASQKD protocol has the following advantages: legal semi-quantum environment (i.e., does not require quantum memory), reduced quantum hardware requirement (i.e., based only on W states), does not involve classical cryptography (i.e., the hash function), and provided 1.6 times higher qubit efficiency.

Entities:  

Keywords:  authentication; quantum cryptography; semi-quantum key distribution; w state

Mesh:

Year:  2022        PMID: 35808492      PMCID: PMC9269753          DOI: 10.3390/s22134998

Source DB:  PubMed          Journal:  Sensors (Basel)        ISSN: 1424-8220            Impact factor:   3.847


1. Introduction

To ensure security, applications perform encryption techniques to secure data. Mainstream encryption based on prime factorization mostly relies on public-key cryptography to distribute secured keys. However, in 1994, Shor [1] proposed a quantum algorithm for determining the prime factors of an integer in polynomial time, which revealed the insecurity of popular public-key cryptography (PKC) systems, such as RSA encryption. This revelational breakthrough indicated the unsafe cryptography of classical computers and led to the research on quantum cryptography. Thus, the design of a protocol that can withstand quantum computer attacks has become an important topic in quantum cryptography. In 1984, Bennett and Brassard proposed the first quantum key distribution (QKD) protocol based on single photons [2]. The QKD protocols distribute keys between two participants based on quantum mechanics. Participants can detect eavesdropping during transmission by using quantum states. Eventually, a secret key is shared using quantum and authenticated classical channels. QKD protocols have been adapted to various versions based on different security and environmental issues. Since then, researchers conducted research on quantum cryptography (i.e., quantum secure direct communication [3,4,5,6,7] and quantum secret sharing [8,9,10,11,12]). However, QKD protocols assume an authenticated classical channel between Alice and Bob (i.e., the transmitted classical messages can be eavesdropped upon but not modified). If an authenticated classical channel does not exist between Alice and Bob, then QKD protocols can suffer from an impersonation attack. Mutual identity authentication is required to prevent impersonation attacks in QKD protocols. Therefore, authenticated QKD (AQKD) protocols [13,14,15] have been proposed to circumvent these security problems. However, the AQKD protocols [13,14,15] mentioned above typically assume that both participants possess full quantum capabilities. Quantum hardware, which is prohibitively expensive, is still in the development phase. Hence, assuming that all participants have full quantum capabilities is not practical. In light of this, in 2007, Boyer et al. [16] proposed the semi-quantum key distribution (SQKD) protocol. Boyer et al. [17] defined an environment that involves two types of users: suppose one user (Alice) obtains full quantum capabilities, and another user (Bob) retains classical capabilities with limited quantum capabilities. Bob can perform three operations by the following abilities: (1) measuring qubits in Z-basis (i.e., ); (2) preparing Z-basis qubits; (3) using delay line to reorder qubits; and (4) reflecting qubits without any disturbance. Boyer et al. [17] defined two schemes for SQKD protocols: randomization-based and measure-resend. In the randomization SQKD protocol, Bob can perform (1) Z-basis measurement, (3) reordering qubits through delay lines, and (4) reflecting qubits without any disturbance. In the measure-resend SQKD protocol, Bob can perform (1) Z-basis measurements, (2) prepare Z-basis qubits, and (4) reflect qubits without any disturbance. After the proposal, miscellaneous protocols have been applied within a “semi” environment. For example, SQKD protocols [18,19,20,21,22,23,24,25,26,27,28], semi-quantum secret sharing protocols [29,30,31,32,33,34,35,36,37,38,39], semi-quantum secure direct communication [40,41,42,43,44,45,46,47,48,49], semi-quantum key agreement [50,51,52,53], and semi-quantum private comparison [54,55,56,57,58]. In 2014, Yu et al. [59] presented the first authenticated semi-quantum key distribution (ASQKD) protocol that does not require authenticated classical channels. By pre-sharing a master secret key between two communicants, a sender with advanced quantum devices can transmit a working key to a receiver who can only perform classical operations. The concept of ASQKD enables the establishment of a key hierarchy in security systems that also eases key management problems. In 2016, Li et al. [60] presented two advanced ASQKD protocols. When compared with Yu et al.’s [59] ASQKD protocols, the proposed protocols ensure better qubit efficiency and require fewer pre-shared keys. In 2016, Meslouhi and Hassouni [61] identified a vulnerability that allows a malicious person to recover a partial master key and launch a successful man-in-the-middle attack. In 2020, Tsai and Yang [62] proposed a lightweight authenticated semi-quantum key distribution (LASQKD) protocol. By pre-sharing a master key and adopting a one-way communication strategy, the proposed protocol allows a quantum user and classical user to share secret keys without using an authenticated classical channel or a Trojan horse detection device. In 2020, Zwbboudj et al. [63] presented a new ASQKD protocol without entanglement, which can realize higher security than the schemes of Yu et al. [59] and Li et al. [60]. The proposed scheme is also simpler and demands less advanced quantum devices than ASQKD schemes that use entanglement. In 2021, Chang et al. [64] proposed a new measure-resend ASQKD protocol. The proposed ASQKD protocol uses only single photons, requires fewer pre-shared keys, and provides better qubit efficiency than state-of-the-art ASQKD protocols. However, an eavesdropper can launch a reflective attack to forge the receiver’s identity without being detected. In addition, Chang et al.’s ASQKD protocol assumes an authenticated classical channel between the sender and the receiver. It is considered illogical to have an authenticated channel in the ASQKD protocol. Therefore, in 2022, Wang et al. [65] proposed an efficient and secure ASQKD protocol to circumvent these problems using only single photons. In 2019, Wen et al. [66] proposed a authenticated semi-quantum key distribution for message and identity based on W state and GHZ-like state. Wen et al.’s ASQKD protocol exhibits the following advantages when compared to other related protocols: It reduces the quantum hardware equipment when compared to other ASQKD protocols. It does not require pre-share keys. Wen et al. demonstrated that the proposed ASQKD protocol is robust against typical attacks. It is highly efficient than some of the existing ASQKD protocols. Although Wen et al.’s ASQKD protocol is highly efficient and secure, in this study, we discover the design flaws of Wen et al.’s ASQKD protocol as follows: (1.) Wen et al.’s ASQKD protocol is impossible to execute. In Wen et al.’s ASQKD protocol, Bob recovers the teleportation of W states without obtaining the positions of the corresponding qubits. Theoretically, Alice and Bob cannot perform a security check on the transmission qubits because Bob is unable to perform teleportation of the W state appropriately. (2.) Wen et al.’s ASQKD protocol requires quantum memory, which strongly disobeys the semi-quantum definition of Boyer et al. [17]. Hence, in this study, we propose an ASQKD protocol based only on the W states. When compared to Wen et al.’s ASQKD protocol [66], the proposed ASQKD protocol has several advantages. The proposed ASQKD protocol ensures the procedure is functional. The proposed ASQKD protocol does not require quantum memory and legally fulfills a semi-quantum environment [17]. The proposed ASQKD protocol, based on W states, only reduces the quantum hardware requirements. The qubit efficiency of the proposed ASQKD protocol is 1.6 times higher than that of Wen et al.’s ASQKD protocol. The proposed ASQKD protocol does not require classical cryptography (i.e., the hash function), which does not show the potential menace of the advance quantum computing. The remainder of this paper is organized as follows. Section 2 provides a review of Wen et al.’s ASQKD protocol. Section 3 describes the security issues associated with Wen et al.’s ASQKD protocol. Section 4 describes the proposed measure-resend ASQKD protocol. Section 5 presents security analysis. Section 6 presents efficiency analysis. Finally, conclusions of the study are stated in Section 7.

2. Review of Wen et al.’s ASQKD Protocol

Wen et al.’s ASQKD protocol, based on W states and GHZ-like states, allows quantum user Alice and classical user Bob to authenticate messages and identities mutually within the semi-quantum environment. In Wen et al.’s ASQKD protocol, Alice possesses all quantum capabilities, whereas Bob is treated as a classical user who can only perform measurements on a Z-basis, preparing Z-basis qubits, and reflecting qubits without disturbing. To initiate the protocol, Alice and Bob must pre-share a secret specific bases set,. Alice and Bob mark these four bases. When Alice measures the qubits, she announces the notation () as opposed to the quantum basis to Bob. Alice and Bob determine the notation. They notify each other of the changes according to one binary string. The binary string includes nine numbers. The first number denotes the order of change, sequential or reverse. The remaining numbers indicate the notation and corresponding bases. The corresponding notation changes after each successful authentication process. Eventually, Alice will send the state string , and the authentication information to Bob. will be conveyed by teleportation of W state. Wen et al.’s ASQKD protocol is as follows: Alice prepares n GHZ-like states as shown in Equation (1) and divides these states into three sequences: . Every photon in represents all the first particles in GHZ-like states, and and represent all the second and third particles in GHZ-like states. Then, she inserts random decoy states into and obtains as follows: Alice prepares W states, as in Equation (2), and divides these states into three sequences: ,,. Photons in include all the first particles in the W state. Similarly, and include all the second and third particles in the W state. Suppose one of the four W bases is selected as follows: These bases are utilized to measure W states’ first and second particles ( and a single particle m,. Then, the measurement result is as follows: Eventually, Alice sends and to Bob. Alice encodes state string according to the specific coding rule (see also Table 1), generates a binary message string , then recodes the binary string according to the following rules: binary message {0,1} recodes into the Z-basis . Eventually, Alice obtains the new particle string | = {}. Alice performs W-basis measurement on and and performs Bell measurement on Then, Alice can obtain the measurement results respectively. Alice informs Bob of the measurement results via a classical channel. It should be noted that is presented in notation format
Table 1

Coding rule of generating .

|Y=|0 |Y=|1 |Y=|+ |Y=|
L=00 L=01 L=10 L=11
Bob receives the measurement results, from Alice. He can perform the unitary operation on to recover the states based on the measurement result . Bob measures in using a Z-basis. Then, he records the measurement results as . According to the notation and the measurement result of , Bob applies the corresponding coding rule and obtains as shown in Table 2 below.
Table 2

Coding rule of generating .

m3=0 m3=1
κ+ m3=0 m3=1
κ m3=0 m3=1
γ+ m3=1 m3=0
γ m3=1 m3=0
Bob obtains   and returns based on If or , then he measures in the Z-basis, prepares the same photon as , and resends it back to Alice. If or , then Bob returns as directly to Alice. Furthermore, Alice checks the received decoy states using the correct corresponding basis. Alice measures on the correct basis and checks if equals to the original Alice then announces the position of and decoy photons in to Bob via the classical channel. According to this announcement, Bob removes the decoy state in and recovers sequence Then, Bob measures on the Z-basis to check its correlation with . Based on the measurement results of , Bob generates binary string according to the following coding rules: if the measurement result is , then he encodes . Furthermore, while the measurement result is , he encodes . Bob hashes to obtain the hash value H(). Bob then sends H() to Alice. Alice calculates H() and checks if H() equals H().

3. Security Issues in Wen et al.’s ASQKD Protocol

Wen et al.’s ASQKD protocol proved security analysis under popular attacks. However, the protocol suffers from vital flaws in the procedure. Hence, it can be considered as a malfunctioning protocol. Moreover, the protocol requires classical Bob to equip quantum memory, which strongly disobeys the principle of the semi-quantum environment as stated by Boyer et al. [17]. The issues in the teleportation of W states and quantum environment are described as follows.

3.1. Teleportation of W States in Wen et al.’s ASQKD Protocol

In Wen et al.’s ASQKD protocol, teleportation of W states between Alice and Bob is a vital procedure flaw. In Step W1, Bob receives and from Alice. In Step W3, Bob recovers corresponding photons in into based on and the measurement result of . In Step W4, Bob returns to Alice. It should be noted that Alice announces the position of in Step W5, and it is inferred that Bob does not obtain any position of in line with in Step W3. This implies that the insufficient information on the corresponding position of cannot allow Bob to distinguish between . Thus, Bob cannot perform any recovery in Step W3, which eventually leads to the failure of the teleportation of W states. Hence, Wen et al.’s ASQKD protocol teleportation of W states cannot be performed under all circumstances.

3.2. Quantum Environment Issue in Wen et al.’s ASQKD Protocol

In Wen et al.’s ASQKD protocol, Alice sends photons ( and ) to Bob in Step W1, and Bob obtains all received photons. Then, Bob receives the measurement results from Alice in Step W2. In Step W4, Bob performs corresponding unitary operations on each photon in , recovers into based on and the measurement result of , respectively. Eventually, Bob returns to Alice. The interval between receiving the photons (Step W1), measuring the photon sequence, calculating and performing the recovery based on notations and measurement results (Step W3), and returning based on (Step W4) obviously requires quantum memory to store the photons for performing all the procedures until resending back to Alice. Hence, the classical Bob in Wen et al.’s ASQKD protocol is equipped with quantum memory, which strongly disobeys the definition of a semi-quantum environment [17].

4. Proposed Measure-Resend ASQKD Protocol

The proposed ASQKD protocol ensures that the quantum environment fulfills the definition of semi-quantum, which was defined by Boyer et al. [17] by using W states only. Assume that Alice is a quantum user and Bob is a classical user with limited quantum capabilities. Alice and Bob pre-share three binary keys, . Specifically, determines the initial state of the prepared W state and represents measure-resending or reflecting photons. determines the photon to be the check sequence or key sequence. Figure 1 illustrates the proposed scheme. The steps involved in the proposed ASQKD protocol are as follows:
Figure 1

Proposed ASQKD protocol.

Alice prepares the initial W states based on If , then Alice prepares , and while , she prepares . Alice then divides the W states into three sequences: , and   represents all the first particles of W states. Similarly, and represent all the second and third particles of W states, respectively. Alice sends and to Bob one photon at a time. For every received photon, Bob performs measure-resending or reflects photons based on . If , then Bob measures the received photon on a Z-basis, prepares the same photon as the measurement result, and resends it to Alice. For the measured sequence at , if , then Bob records the measurement results to the check sequence ; if , then Bob records the measurement results to the key sequence . If , then Bob measures the received photon on a Z-basis, prepares the same photon as the measurement result, and resends it to Alice. If , then Bob reflects the received photon back to Alice without any influence. Alice receives and from Bob. She performs Z-basis or W-basis measurements based on . If , then Alice performs a Z-basis measurement and classifies it into two measured sequences based on . If , then Alice records the measurement results as a check sequence , whereas if , Alice records the measurement results to the key sequence . If , then Alice performs a W-basis measurement to check the entanglement correlation of the W states. Hence, according to the uncertainty principle, if the initial state is or , then the measured states should collapse into } or }. Otherwise, if the states remain the same as the initial state, then it is inferred that Bob does not measure the photons and Alice will detect that the protocol may suffer from the reflecting attack. If , then Alice performs a W-basis measurement for the eavesdropping check. Alice compares the measurement results with the initial states. This implies that if the states remain the same as the original states, neither Bob nor Eve measure the photons, proving the security of the transmission. After the eavesdropping check, Alice announces to Bob. Bob checks if to secure the channel. Eventually, Alice and Bob share a raw key as the measurement result of (i.e., if one measures , represents classical bits “00”, “01”, “10”, “11”, respectively.). Then, they perform a privacy amplification process [67,68] on the raw key to distill the private key.

5. Security Analysis

In this section, the security of the proposed ASQKD protocol is analyzed with respect to the five main attacks.

5.1. Impersonation Attack

5.1.1. Assume Eve Essayed to Impersonate Alice

Suppose Eve attempts to impersonate Alice. In Step 1, Eve may generate photon sequences, , to impersonate the photons sent by Alice, Bob receives , performs the measure-resend mode or the reflected mode based on , obtains . In Step 4, Alice announces the check sequence . After Bob receives it, he verifies Alice by collating the check sequence with MR. Bob detects eavesdropping because Eve cannot impersonate any check sequence MR because it was generated based on , which was previously pre-shared privately. Hence, Eve cannot successfully impersonate Alice in the proposed ASQKD protocol.

5.1.2. Assume Eve Essayed to Impersonate Bob

Suppose that Eve attempts to impersonate Bob. Eve may generate photons to impersonate . In Step 3, Alice performs an eavesdropping check. She measured to check the entanglement of the W states. According to the uncertainty principle, if , then the measure-resend photons should collapse into } or }; if , then the reflected state should be the same as the initial state. Thus, if the states are not related to the correct procedure based on , then Alice detects impersonation of Eve.

5.2. Reflecting Attack

If Eve tries to perform the reflecting attack, then Eve may intercept the photon sequences in Step 1 and subsequently resend the same photons back to Alice (i.e., ). For every received photon in , Alice performs an eavesdropping check in Step 3 based on . If Bob measure-resends , then the state should collapse into } or } according to the uncertainty principle. As mentioned, the photon sequence is reflected by Eve and not measured by Bob, which does not collapse into , } or ,}. From the perspective of Alice, if the state remains in the same state as the initial state, then she can infer that Bob does not measure any photons and Alice detects that the protocol is suffering from the reflecting attack.

5.3. Man-in-the-Middle Attack

Assume that Eve attempts to perform a man-in-the-middle attack on the transmitted photon between Alice and Bob. In Step 1, Eve may intercept , in which the initial states of W states are }. Then, Eve measures to obtain the information, and eventually, Eve generates photon sequences based on the measurement results and sends them to Bob. It should be noted that the photon sequence collapses into the random state } or }. In Step 2, Bob measure-resends or reflects based on , namely . After receiving Alice proceeds with an eavesdropping check. If Eve can pass the eavesdropping check in Step 3, then she is able to successfully perform a man-in-the-middle attack. However, without knowing the pre-shared key , Eve cannot compute the check sequence for the reflected photons. Once Eve measures , it can successfully pass the eavesdropping check with a probability of 1/2. Hence, the probability of Eve being detected in the proposed ASQKD protocol is . While n is large enough, the detection probability is approximately 100%. Thus, in Step 3, Alice detects that the ASQKD protocol is attacked by Eve in Step 3.

5.4. Collective Attack

This section proves the proposed ASQKD protocol is immune to collective attack and does not show leakage if there is no error detected. In the attack scheme, let Eve obtains all quantum abilities and gains the control of quantum channels. Eve may try to eavesdrop on private information from Alice and Bob through the collective attack. To initiate the attack, Eve prepares a probe qubit and operates a unitary operation on the joint state , the qubits which transmit through the quantum channel. Eve performs the operation in Step 1, Eve entangles the probe qubits with the traveling qubit which sent by Alice. Then, Eve performs the operation in Step 2 and entangles the probe qubits with the transmitting qubit which is resent by Bob. Eve can operate the collective attack to eavesdrop on private information without being detected. To initiate the attack, Eve performs the first unitary operation operation on the qubits sent by Alice. Then, Eve performs the second unitary operation operation on the qubits which are resent by Bob. However, no operation can provide Eve to deduce the private information without being detected. Assume Eve operates a unitary operator to eavesdrop on the qubit sent from Alice in Step 1 by , the possibilities are presented as follows: The initial state of Eve’s probe qubit denotes . are distinguished by Bob, where To demonstrate the attack clearly, assume Alice chooses as the initial state. It should be noted that the choice of initial state does not affect the security analysis. Suppose Eve performs the U1 operation, the possibilities are described as follows: Bob performs Z-basis measurement on the received qubits and saves the measurement results based on . If the qubits are modified, will be altered and detected by Bob. Hence, the attack is assumed not to modify the value of the Z-basis qubits to pass the eavesdropping check. The restriction limits the possibilities of as follows: Then, Eve performs the second unitary operation on the qubits that are resent by Bob. The possibilities are described as follows: Alice receives the photons which are resent by Bob and performs the eavesdropping check. If the quantum state is not equal to W states, Alice will detect the attack. To pass the eavesdropping check, suppose . Hence, it is assumed that the attack cannot modify the value of the Z-basis photons. With the restriction mentioned above, limits possibilities as follows: Suppose Eve wants to pass the eavesdropping check, Eve must set all the measurement result of probe qubits to be equal (i.e., ). Without altering , Eve can pass the eavesdropping check. In contrast, Eve cannot distinguish the corresponding measurement result of . Hence, Eve cannot deduce any useful information. On the other hand, suppose Eve wants to deduce the information from the measurement result of probe qubits , Eve must set all the measurement results of probe qubits not to be equal, so Eve can distinguish the corresponding result. In contrast, Eve will get detected by the eavesdropping check because the value of is altered. Thus, the proposed ASQKD protocol is proven to be immune to the collective attack. □

5.5. Key Leakage Problem

Assume Eve tries to eavesdrop on the raw key from the traveling qubits. Eve may perform Z-basis measurement on the photon sequence sent by Alice, and . Eve obtains the measurement results of and (i.e., , which implies the raw key (i.e., “00”, “01”, “10”, “11”). Suppose Shannon entropy is defined as , where denotes probability distribution. The entropy can be computed as bits. However, the protocol provides an eavesdropping check, which limits the possibility of the measurement results of and being used as the raw key, hence the probability is (i.e., Bob receives and and performs measure-resend or reflect based on . If , Bob records the measurement results as or . If 2, Bob measure-resend or reflect for eavesdropping check. Assume Alice and Bob consume half of the transmitted photons as eavesdropping check, hence and 2 consume each half of the measurement results. While in , the measurement results of denote as check bit, denote as key bit, thus half of the measurement results are used as sharing raw key. Eventually, the probability of Eve eavesdrops the raw key from the measurement results of and is ). Hence, the entire entropy denotes bit. Even though Eve can obtain 0.5 bit by performing eavesdropping, eventually the attack will be detected by an eavesdropping check. Even if Eve passes the eavesdropping check, one can still perform the privacy amplification process [67,68] on the transmitted information to distill the private key, avoiding the key leakage problem. Thus, Eve cannot obtain any private key under an eavesdropping attack.

6. Efficiency Analysis

Table 3 provides a comparison of the Yu et al. [59], Li et al. [60], Zebboudj et al. [63], Chang et al. [64], and Wang et al. [65], and Wen et al.’s [66] measure-resend ASQKD protocols with the proposed ASQKD protocol. The efficiency of the protocol is calculated using the following equation: , where denotes the number of shared classical bits and denotes the sum of consumed qubits. We assume that Alice generates a binary string of length n as the secret key. The length of the hash, decoy photon, and checking bit m is assumed to equal that of the secret key (i.e., n = m).
Table 3

Comparison of [59,60,63,64,65,66] and the proposed ASQKD protocol.

Yu et al.’s ASQKD Protocol [59]Li et al.’s ASQKD Protocol [60]Zebboudj et al.’s ASQKD Protocol [63]Chang et al.’s ASQKD Protocol [64]Wang et al.’s ASQKD Protocol [65]Wen et al.’s ASQKD Protocol [66]The Proposed ASQKD Protocol
Quantum resourceBell statesBell states, Single photonsSingle photonsSingle photonsSingle photonsGHZ-like states W statesW states
Qubit efficiency10%11%14%17%14% 7% 11%
Required pre-shared keys (in bits)6n4n3n3n3n4n5n
Classical participant’s quantum capabilitiesGenerate Reflect MeasureGenerate Reflect MeasureGenerate Reflect MeasureGenerate Reflect MeasureGenerate Reflect MeasureGenerate Reflect Measure Quantum memoryGenerate Reflect Measure
Classical participant does not require quantum memoryYesYesYesYesYesNoYes
Legal semi-quantum environmentYesYesYesYesYesNoYes
The protocol does not require the hash functionYesNoNoNoNoNoYes
Runnable protocolYesYesYesYesYesNoYes
Required classical channelYesYesYesYesNoYesYes
Robustness of the reflecting attackYesYesYesNoYesYesYes
The efficiency analysis of Yu et al., Li et al., Zebboudj et al., Chang et al., and Wang et al.’s ASQKD protocol have been discussed in Wang et al.’s study [65]. For clarity and readability, this study is briefly summarized as follows: the efficiency of Yu et al., Li et al., Zebboudj et al., Chang et al., and Wang et al.’s ASQKD protocol is 10%, 11%, 14%, 17%, 14%, respectively. In Wen et al.’s ASQKD protocol, Alice generated n GHZ-like states (i.e., 3n qubits) and n decoy states. She then generates 3n W states (i.e., 9n qubits) for teleportation of the state and decoy state . Bob measures and generates (i.e., n qubits). Thus, the efficiency of the ASQKD protocol proposed by Wen et al. is . In the proposed ASQKD protocol, Alice prepares four pairs of W states (i.e., 12n qubits), Bob measures the second and third W states and generates three pairs of two single photons (i.e., based on generates 2n + 2n qubits, generates 2n qubits). Eventually, Alice and Bob share a secret key of 2n bits. Hence, the efficiency of the proposed ASQKD protocol is . The proposed ASQKD protocol improves the malfunction issue in the ASQKD protocol of Wen et al. [66]. As mentioned in Section 3.1, in Wen et al.’s ASQKD protocol, Bob cannot perform the teleportation due to the insufficient information on the corresponding position of and . The proposed ASQKD protocol pre-shares keys for the information of the photon’s position privately, ensuring that the unfunctional situation with Bob will not occur under all circumstances. As mentioned in Section 3.2, in Wen et al.’s ASQKD protocol [66], Bob must preserve all photons sent by Alice in Step W1 for the measurements and calculations to perform the teleportation of W states later. This implies that Bob must possess quantum memory, which strongly disobeys the definition of semi-quantum environment [17]. In the proposed ASQKD protocol, Alice sends the photons individually to Bob, and Bob performs measurements or reflects the photons as he receives them. The proposed ASQKD protocol ensures that Bob does not need to equip quantum memory, which is a legal semi-quantum environment. From the perspective of entangle states applying ASQKD protocols, the proposed ASQKD protocol provided higher qubit efficiency compared to Yu et al. [59] and Li et al. [60]. Although Chang et al. [64] have higher qubit efficiency, their protocol suffers from the reflecting attack [65], the protocol must apply more qubits to secure the channel. Thus, Chang et al. [64] provided lower qubit efficiency than the proposed ASQKD protocol. Zebboudj et al. [63] and Wang [65] take advantages in qubit efficiency, however, the security of those protocols is based on classical cryptography, the mathematics of the hash function. With the advance of quantum computing, powerful quantum computing may be a potential menace to classical cryptography. The proposed protocol does not require the hash function, thus is secured even in the future. From the perspective of quantum hardware, in Wen et al.’s ASQKD protocol [66], Alice generates GHZ-like states and W states, and Bob equips quantum memory, which requires advanced quantum mechanics. In the proposed ASQKD protocol, Alice generates only W states, and Bob does not require quantum memory, which is more practical. Moreover, the proposed ASQKD protocol has higher efficiency than Wen et al.’s ASQKD protocol. By combining all the benefits mentioned above, the proposed ASQKD protocol reduces the quantum hardware requirement and elevates the efficiency significantly when equipped with a secure legal semi-quantum environment. When compared to Wen et al.’s ASQKD protocol [66], the proposed ASQKD protocol has several advantages. The proposed ASQKD protocol ensures the procedure is functional. The proposed ASQKD protocol does not require quantum memory and legally fulfills a semi-quantum environment [17]. The proposed ASQKD protocol, based on W states, only reduces the quantum hardware requirements. The qubit efficiency of the proposed ASQKD protocol is 1.6 times higher than that of Wen et al.’s ASQKD protocol. The proposed ASQKD protocol does not require classical cryptography (i.e., the hash function), which does not show the potential menace of the advance quantum computing.

7. Conclusions

In this study, several important issues in Wen et al.’s ASQKD protocol were addressed and an improvement was proposed. In 2019, Wen et al. proposed an ASQKD protocol for identity and messages using the teleportation of W states and GHZ-like states without pre-shared keys. However, Wen et al.’s ASQKD protocol exhibits significant design flaws. The teleportation of W states in Wen et al.’s ASQKD protocol was malfunctioning. Moreover, Wen et al.’s ASQKD protocol requires the classical user to equip quantum memory, which strongly disobeys the definition of the semi-quantum environment defined by Boyer et al. Therefore, in this study, we proposed an ASQKD protocol based only on the W states. When compared with Wen et al.’s ASQKD protocol, the proposed ASQKD protocol circumvented the aforementioned flaws and obtained the following advantages: runnable ASQKD protocol, legal semi-quantum environment (i.e., does not require quantum memory), reduced quantum hardware requirement (i.e., based only on W states), does not involve classical cryptography (i.e., the hash function) and provided 1.6 times higher qubit efficiency, which significantly elevated security and efficiency. To obtain a higher efficiency in the ASQKD protocol, further research is required.
  4 in total

1.  Deterministic secure direct communication using entanglement.

Authors:  Kim Boström; Timo Felbinger
Journal:  Phys Rev Lett       Date:  2002-10-11       Impact factor: 9.161

2.  Quantum key distribution with classical Bob.

Authors:  Michel Boyer; Dan Kenigsberg; Tal Mor
Journal:  Phys Rev Lett       Date:  2007-10-05       Impact factor: 9.161

3.  Lightweight mediated semi-quantum key distribution protocol with a dishonest third party based on Bell states.

Authors:  Chia-Wei Tsai; Chun-Wei Yang
Journal:  Sci Rep       Date:  2021-12-01       Impact factor: 4.379

4.  Semiquantum key distribution with secure delegated quantum computation.

Authors:  Qin Li; Wai Hong Chan; Shengyu Zhang
Journal:  Sci Rep       Date:  2016-01-27       Impact factor: 4.379

  4 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.