Skip to main content
Log in

Advancing multi-party quantum key agreement protocols: the power of a two-layer approach

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

Quantum key agreement holds great promise for enabling secure and efficient data transfer in the era of advanced technologies. This paper proposes a novel approach to address the key generation problem by introducing a two-layer multiparty quantum key agreement (TMQKA) protocol based on non-maximally entangled states. The TMQKA protocol generates two layers of keys among multiple users by employing the properties of non-maximally entangled states and local operations. The first layer of keys is established among all users to achieve secure multiparty communication. The second layer of keys is between two neighboring users to ensure point-to-point communication between them. In addition, the analysis demonstrates that the proposed TMQKA protocol satisfies the requirements of correctness, security, and fairness. The unique two-layer structure of TMQKA makes it have a high efficiency. Our work lays the foundation for the establishment of two-layer quantum networks in the future.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

Data availability

Data sharing is not applicable to this article as no data sets were generated or analyzed during the current study.

References

  1. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. arXiv preprint arXiv:2003.06557 (2020)

  2. Gao, F., Qin, S.-J., Guo, F.-Z., Wen, Q.-Y.: Dense-coding attack on three-party quantum key distribution protocols. IEEE J. Quant. Electron. 47(5), 630–635 (2011)

    ADS  Google Scholar 

  3. Lo, H.-K., Ma, X., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005). https://doi.org/10.1103/PhysRevLett.94.230504

    Article  ADS  Google Scholar 

  4. Dutta, A., Pathak, A.: New protocols for quantum key distribution with explicit upper and lower bound on secret-key rate. arXiv preprint arXiv:2212.13089 (2022)

  5. Wei, C.-Y., Cai, X.-Q., Wang, T.-Y., Qin, S.-J., Gao, F., Wen, Q.-Y.: Error tolerance bound in QKD-based quantum private query. IEEE J. Sel. Areas Commun. 38(3), 517–527 (2020)

    Google Scholar 

  6. Gao, F., Qin, S., Huang, W., Wen, Q.: Quantum private query: a new kind of practical quantum cryptographic protocol. Sci. China Phys. Mech. Astron. 62, 1–12 (2019)

    Google Scholar 

  7. Wei, C.-Y., Cai, X.-Q., Liu, B., Wang, T.-Y., Gao, F.: A generic construction of quantum-oblivious-key-transfer-based private query with ideal database security and zero failure. IEEE Trans. Comput. 67(1), 2–8 (2017)

    MathSciNet  Google Scholar 

  8. Zhou, N., Zeng, G., Xiong, J.: Quantum key agreement protocol. Electron. Lett. 40(18), 1 (2004)

    Google Scholar 

  9. Chong, S.-K., Hwang, T.: Quantum key agreement protocol based on BB84. Opt. Commun. 283(6), 1192–1195 (2010)

    ADS  Google Scholar 

  10. Dutta, A., Pathak, A.: Collective attack free controlled quantum key agreement without quantum memory. arXiv preprint arXiv:2308.05470 (2023)

  11. He, Y.-F., Pang, Y., Di, M.: Mutual authentication quantum key agreement protocol based on bell states. Quant. Inf. Process. 21(8), 290 (2022)

    ADS  MathSciNet  Google Scholar 

  12. Shi, R.-H., Zhong, H.: Multi-party quantum key agreement with bell states and bell measurements. Quant. Inf. Process. 12, 921–932 (2013)

    ADS  MathSciNet  Google Scholar 

  13. Liu, B., Gao, F., Huang, W., Wen, Q.-Y.: Multiparty quantum key agreement with single particles. Quant. Inf. Process. 12, 1797–1805 (2013)

    ADS  MathSciNet  Google Scholar 

  14. Liu, B., Xiao, D., Jia, H.-Y., Liu, R.-Z.: Collusive attacks to “circle-type” multi-party quantum key agreement protocols. Quant. Inf. Process. 15, 2113–2124 (2016)

  15. Zhu, Z.-C., Hu, A.-Q., Fu, A.-M.: Improving the security of protocols of quantum key agreement solely using bell states and bell measurement. Quant. Inf. Process. 14, 4245–4254 (2015)

    ADS  MathSciNet  Google Scholar 

  16. Huang, W., Su, Q., Xu, B., Liu, B., Fan, F., Jia, H., Yang, Y.: Improved multiparty quantum key agreement in travelling mode. Sci. China Phys. Mech. Astron. 59, 1–10 (2016)

    Google Scholar 

  17. Huang, W., Su, Q., Liu, B., He, Y.-H., Fan, F., Xu, B.-J.: Efficient multiparty quantum key agreement with collective detection. Sci. Rep. 7(1), 15264 (2017)

    ADS  Google Scholar 

  18. Sun, Z., Wu, C., Zheng, S., Zhang, C.: Efficient multiparty quantum key agreement with a single \( d \)-level quantum system secure against collusive attack. IEEE Access 7, 102377–102385 (2019)

    Google Scholar 

  19. Lin, S., Zhang, X., Guo, G.-D., Wang, L.-L., Liu, X.-F.: Multiparty quantum key agreement. Phys. Rev. A 104(4), 042421 (2021)

    ADS  MathSciNet  Google Scholar 

  20. Wei, C.-Y., Cai, X.-Q., Huang, S.-L., Lang, X.-L., Wang, T.-Y.: Loss-tolerant quantum multi-party key agreement without quantum storage. Opt. Express 30(22), 40569–40583 (2022)

    ADS  Google Scholar 

  21. Yang, Y.-G., Li, B.-R., Kang, S.-Y., Chen, X.-B., Zhou, Y.-H., Shi, W.-M.: New quantum key agreement protocols based on cluster states. Quant. Inf. Process. 18, 1–17 (2019)

    MathSciNet  Google Scholar 

  22. Yang, Y.-G., Lv, X.-L., Gao, S., Zhou, Y.-H., Shi, W.-M.: Detector-device-independent quantum key agreement based on single-photon bell state measurement. Int. J. Theor. Phys. 61(2), 50 (2022)

    MathSciNet  Google Scholar 

  23. Yang, Y.-G., Gao, S., Li, D., Zhou, Y.-H., Shi, W.-M.: Two-party quantum key agreement over a collective noisy channel. Quant. Inf. Process. 18, 1–17 (2019)

    MathSciNet  Google Scholar 

  24. Sun, Z., Zhang, C., Wang, P., Yu, J., Zhang, Y., Long, D.: Multi-party quantum key agreement by an entangled six-qubit state. Int. J. Theor. Phys. 55, 1920–1929 (2016)

    Google Scholar 

  25. Huang, W.-C., Yang, Y.-K., Jiang, D., Chen, L.-J.: Efficient travelling-mode quantum key agreement against participant’s attacks. Sci. Rep. 9(1), 16421 (2019)

    ADS  Google Scholar 

  26. Shukla, C., Alam, N., Pathak, A.: Protocols of quantum key agreement solely using bell states and bell measurement. Quant. Inf. Process. 13(11), 2391–2405 (2014)

    ADS  MathSciNet  Google Scholar 

  27. Xu, G.-B., Wen, Q.-Y., Gao, F., Qin, S.-J.: Novel multiparty quantum key agreement protocol with GHZ states. Quant. Inf. Process. 13, 2587–2594 (2014)

    ADS  MathSciNet  Google Scholar 

  28. Gu, J., Hwang, T.: Improvement of “novel multiparty quantum key agreement protocol with GHZ states.” Int. J. Theor. Phys. 56, 3108–3116 (2017)

  29. Cai, B., Guo, G., Lin, S., Zuo, H., Yu, C.: Multipartite quantum key agreement over collective noise channels. IEEE Photonics J. 10(1), 1–11 (2018)

    Google Scholar 

  30. Chen, G., Wang, Y., Jian, L., Zhou, Y., Liu, S., Luo, J., Yang, K.: Quantum identity authentication protocol based on flexible quantum homomorphic encryption with qubit rotation. J. Appl. Phys. 133(6) (2023)

  31. Dutta, A., Pathak, A.: A short review on quantum identity authentication protocols: how would bob know that he is talking with alice? Quant. Inf. Process. 21(11), 369 (2022)

    ADS  MathSciNet  Google Scholar 

  32. Gao, S., Yang, Y.-G.: A novel quantum recommender system. Phys. Scr. 98(1), 010001 (2022)

    Google Scholar 

  33. Yang, Y.-G., Teng, Y.-W., Chai, H.-P., Wen, Q.-Y.: Fault-tolerant quantum secret sharing against collective noise. Phys. Scr. 83(2), 025003 (2011)

    ADS  Google Scholar 

  34. Huang, W., Su, Q., Li, Y.-B., Sun, Y.: Fault-tolerant quantum cryptographic protocols with collective detection over the collective amplitude damping channel. Phys. Scr. 89(7), 075102 (2014)

    ADS  Google Scholar 

  35. Yang, Y.-G., Yang, P.-Z., Xu, G.-B., Zhou, Y.-H., Shi, W.-M.: Quantum private information retrieval over a collective noisy channel. Mod. Phys. Lett. A 38(01), 2350001 (2023)

    ADS  MathSciNet  Google Scholar 

  36. Wang, J., Xu, G.-B., Jiang, D.-H.: Quantum voting scheme with Greenberger-Horne-Zeilinger states. Int. J. Theor. Phys. 59, 2599–2605 (2020)

    MathSciNet  Google Scholar 

  37. Li, X., Zhang, K., Zhang, L., Zhao, X.: A new quantum multiparty simultaneous identity authentication protocol with the classical third-party. Entropy 24(4), 483 (2022)

    ADS  MathSciNet  Google Scholar 

  38. Kilinc, H.H., Yanik, T.: A survey of sip authentication and key agreement schemes. IEEE Commun. Surv. Tutor. 16(2), 1005–1023 (2013)

    Google Scholar 

  39. Chang, C.-C., Kuo, J.-Y.: An efficient multi-server password authenticated key agreement scheme using smart cards with access control. In: 19th International Conference on Advanced Information Networking and Applications (AINA’05) Volume 1 (AINA Papers), vol. 2, pp. 257–260 (2005). IEEE

  40. Lee, J.-S., Wei, K.-J., Chen, Y.-C., Sun, Y.-H.: Provable secure brand-new multi-auction mechanism with dynamic identity. KSII Trans. Internet Inf. Syst. (TIIS) 10(12), 5616–5642 (2016)

    Google Scholar 

  41. Sharma, R.D., Thapliyal, K., Pathak, A.: Quantum sealed-bid auction using a modified scheme for multiparty circular quantum key agreement. Quant. Inf. Process. 16, 1–16 (2017)

    Google Scholar 

  42. Ke, W., Shi, R.-H., Yu, H., Xu, X.: A receipt-free quantum voting protocol based on quantum public key encryption and quantum key agreement. Phys. Scr. 98(6), 065112 (2023)

    ADS  Google Scholar 

  43. Shimizu, K., Tamaki, K., Fukasaka, H.: Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair. Phys. Rev. A 80(2), 022323 (2009)

    ADS  MathSciNet  Google Scholar 

  44. Shi, R., Su, Q., Guo, Y., Huang, D.: The dining cryptographer problem-based anonymous quantum communication via non-maximally entanglement state analysis. Int. J. Theor. Phys. 52(2), 376–384 (2013)

    MathSciNet  Google Scholar 

  45. Bennett, C.H., DiVincenzo, D.P., Smolin, J.A., Wootters, W.K.: Mixed-state entanglement and quantum error correction. Phys. Rev. A 54(5), 3824 (1996)

    ADS  MathSciNet  Google Scholar 

  46. Hill, S.A., Wootters, W.K.: Entanglement of a pair of quantum bits. Phys. Rev. Lett. 78(26), 5022 (1997)

    ADS  Google Scholar 

  47. Dutta, A., Pathak, A.: Controlled secure direct quantum communication inspired scheme for quantum identity authentication. Quant. Inf. Process. 22(1), 13 (2022)

    ADS  MathSciNet  Google Scholar 

  48. Lucamarini, M., Mancini, S.: Secure deterministic communication without entanglement. Phys. Rev. Lett. 94(14), 140501 (2005)

    ADS  Google Scholar 

  49. Chefles, A., Barnett, S.M.: Optimum unambiguous discrimination between linearly independent symmetric states. Phys. Lett. A 250(4–6), 223–229 (1998)

    ADS  Google Scholar 

  50. Helstrom, C.W.: Quantum detection and estimation theory. J. Stat. Phys. 1, 231–252 (1969)

    ADS  MathSciNet  Google Scholar 

  51. Zhang, S., Ying, M.: Set discrimination of quantum states. Phys. Rev. A 65(6), 062322 (2002)

    ADS  MathSciNet  Google Scholar 

  52. Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85(26), 5635 (2000)

    ADS  Google Scholar 

Download references

Acknowledgements

We would like to thank the anonymous referees for their helpful comments. This research was supported by the Key Lab of Information Network Security, Ministry of Public Security (C21605).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Qingle Wang or Wenqi Sun.

Ethics declarations

Conflict of interest

We declare that we have no financial or personal relationships with any individuals or organizations that could inappropriately influence our work. We have no professional or personal interests, of any nature or kind, in any products, services, and/or companies that could influence the positions presented or the review process in the manuscript.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix A: The efficiency calculations

Appendix A: The efficiency calculations

In the following, we consider that the MQKA protocol combined with QKD accomplishes the same task. It is well known that BB84 is a relatively efficient and practical QKD scheme. The protocols in Refs. [13, 19, 24, 25] are some of the typical and efficient MQKA protocols. These MQKA protocols utilize different quantum resources such as single photons, Bell states, and six-particle entangled states. We will use the MQKA protocol and BB84 from Ref. [19] as an example to calculate the efficiency of the method.

1.1 A.1 The combined method

The goal of the users is to obtain the two-layer keys. All users obtain a 0.5l-bit first layer key by executing an MQKA protocol. Any two neighboring users obtain a l-bit second layer key based on the BB84 protocol.

The first layer key. All users execute MQKA in Ref. [19] to get a 0.5l-bit first layer key. Based on Ref. [19], n users need to consume \(n(l+\delta )\) qubits in this process.

The second layer key. The method of negotiating a second layer key between two neighboring users based on QKD is as follows.

(1) Any two neighboring users \(U_{i}\) and \(U_{i{\tilde{\oplus }}1}\) generate two l-bit secret keys \(R_i^{\prime }=\{r^{\prime }_{i,1},r^{\prime }_{i,2},...,r^{\prime }_{i,l}\}\) and \(R_{i{\tilde{\oplus }}1}^{\prime }=\{r^{\prime }_{i{\tilde{\oplus }}1,1},r^{\prime }_{i{\tilde{\oplus }}1,2},...,r^{\prime }_{i{\tilde{\oplus }}1,l}\}\), respectively. \(U_{i}\) prepares a particle sequence \(A_{i}=\{a_{i,1},a_{i,2},...,a_{i,l}\}\). Here, if \(r^{\prime }_{i,j}=0~(1)\), \(a_{i,j}\) is in state \(|0\rangle ~(|1\rangle )\). Similarly, \(U_{i{\tilde{\oplus }}1}\) prepares a particle sequence \(A_{i{\tilde{\oplus }}1}\). They insert \(\delta \) decoy particles into the particle sequences \(A_{i}\) and \(A_{i{\tilde{\oplus }}1}\), respectively, where each decoy particle is randomly in one of the four states in \(\{|0\rangle , |1\rangle , |+\rangle ,|-\rangle \}\). They then send the processed particle sequences to each other.

(2) After \(U_{i}\) and \(U_{i{\tilde{\oplus }}1}\) receive the particle sequences, they detect the channel security. More specifically, they announce the corresponding bases of the decoy particles and measure them, respectively. Then, they announce the positions and the measurement results and compare these results with the initial states.

(3) If there are no errors, they measure the remaining particles in \(\{|0\rangle , |1\rangle \}\) basis. \(U_{i}\) and \(U_{i{\tilde{\oplus }}1}\) obtain the keys \(R_{i{\tilde{\oplus }}1}^{\prime }\) and \(R_i^{\prime }\), respectively.

(4) \(U_{i}\) and \(U_{i{\tilde{\oplus }}1}\) get a l-bit second layer key by computing \(R_i=R_i^{\prime } \oplus R_{i{\tilde{\oplus }}1}^{\prime }\). The second layer key is influenced equally by two neighboring users.

Table 2 Efficiency calculation of BB84 protocol combined with MQKA protocol

In total, they consume \(2(l+\delta )\) qubits. In addition, every two neighboring users need to establish a l-bit second layer key. In total, all users need to consume \(2n(l+\delta )\) qubits.

1.2 A.2 The efficiency calculations

Based on the above analysis, let’s calculate the efficiency of this method. In total, it needs to consume \(2n(l+\delta )+n(l+\delta )=3n(l+\delta )\) qubits, i.e., \(q=3n(l+\delta )\). At the end of the protocol, each user gets a 0.5l-bit second layer key and two l-bit second layer keys, i.e., \(b=2.5l\). Therefore, we have

$$\begin{aligned} \begin{aligned} \eta _1=\frac{2.5l}{3n(l+\delta )}=\frac{2.5}{3n(1+\nu )}. \end{aligned} \end{aligned}$$
(A1)

Based on the same calculation method and Refs. [13, 19, 24, 25], we can calculate the efficiencies of some typical MQKA protocols combined with QKD protocols to accomplish the same tasks as TMQKA, as shown in Table 2.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, J., Wang, Q., Mu, Q. et al. Advancing multi-party quantum key agreement protocols: the power of a two-layer approach. Quantum Inf Process 23, 97 (2024). https://doi.org/10.1007/s11128-024-04302-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-024-04302-3

Keywords

Navigation