Abstract
Quantum key agreement holds great promise for enabling secure and efficient data transfer in the era of advanced technologies. This paper proposes a novel approach to address the key generation problem by introducing a two-layer multiparty quantum key agreement (TMQKA) protocol based on non-maximally entangled states. The TMQKA protocol generates two layers of keys among multiple users by employing the properties of non-maximally entangled states and local operations. The first layer of keys is established among all users to achieve secure multiparty communication. The second layer of keys is between two neighboring users to ensure point-to-point communication between them. In addition, the analysis demonstrates that the proposed TMQKA protocol satisfies the requirements of correctness, security, and fairness. The unique two-layer structure of TMQKA makes it have a high efficiency. Our work lays the foundation for the establishment of two-layer quantum networks in the future.


Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.Data availability
Data sharing is not applicable to this article as no data sets were generated or analyzed during the current study.
References
Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. arXiv preprint arXiv:2003.06557 (2020)
Gao, F., Qin, S.-J., Guo, F.-Z., Wen, Q.-Y.: Dense-coding attack on three-party quantum key distribution protocols. IEEE J. Quant. Electron. 47(5), 630–635 (2011)
Lo, H.-K., Ma, X., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005). https://doi.org/10.1103/PhysRevLett.94.230504
Dutta, A., Pathak, A.: New protocols for quantum key distribution with explicit upper and lower bound on secret-key rate. arXiv preprint arXiv:2212.13089 (2022)
Wei, C.-Y., Cai, X.-Q., Wang, T.-Y., Qin, S.-J., Gao, F., Wen, Q.-Y.: Error tolerance bound in QKD-based quantum private query. IEEE J. Sel. Areas Commun. 38(3), 517–527 (2020)
Gao, F., Qin, S., Huang, W., Wen, Q.: Quantum private query: a new kind of practical quantum cryptographic protocol. Sci. China Phys. Mech. Astron. 62, 1–12 (2019)
Wei, C.-Y., Cai, X.-Q., Liu, B., Wang, T.-Y., Gao, F.: A generic construction of quantum-oblivious-key-transfer-based private query with ideal database security and zero failure. IEEE Trans. Comput. 67(1), 2–8 (2017)
Zhou, N., Zeng, G., Xiong, J.: Quantum key agreement protocol. Electron. Lett. 40(18), 1 (2004)
Chong, S.-K., Hwang, T.: Quantum key agreement protocol based on BB84. Opt. Commun. 283(6), 1192–1195 (2010)
Dutta, A., Pathak, A.: Collective attack free controlled quantum key agreement without quantum memory. arXiv preprint arXiv:2308.05470 (2023)
He, Y.-F., Pang, Y., Di, M.: Mutual authentication quantum key agreement protocol based on bell states. Quant. Inf. Process. 21(8), 290 (2022)
Shi, R.-H., Zhong, H.: Multi-party quantum key agreement with bell states and bell measurements. Quant. Inf. Process. 12, 921–932 (2013)
Liu, B., Gao, F., Huang, W., Wen, Q.-Y.: Multiparty quantum key agreement with single particles. Quant. Inf. Process. 12, 1797–1805 (2013)
Liu, B., Xiao, D., Jia, H.-Y., Liu, R.-Z.: Collusive attacks to “circle-type” multi-party quantum key agreement protocols. Quant. Inf. Process. 15, 2113–2124 (2016)
Zhu, Z.-C., Hu, A.-Q., Fu, A.-M.: Improving the security of protocols of quantum key agreement solely using bell states and bell measurement. Quant. Inf. Process. 14, 4245–4254 (2015)
Huang, W., Su, Q., Xu, B., Liu, B., Fan, F., Jia, H., Yang, Y.: Improved multiparty quantum key agreement in travelling mode. Sci. China Phys. Mech. Astron. 59, 1–10 (2016)
Huang, W., Su, Q., Liu, B., He, Y.-H., Fan, F., Xu, B.-J.: Efficient multiparty quantum key agreement with collective detection. Sci. Rep. 7(1), 15264 (2017)
Sun, Z., Wu, C., Zheng, S., Zhang, C.: Efficient multiparty quantum key agreement with a single \( d \)-level quantum system secure against collusive attack. IEEE Access 7, 102377–102385 (2019)
Lin, S., Zhang, X., Guo, G.-D., Wang, L.-L., Liu, X.-F.: Multiparty quantum key agreement. Phys. Rev. A 104(4), 042421 (2021)
Wei, C.-Y., Cai, X.-Q., Huang, S.-L., Lang, X.-L., Wang, T.-Y.: Loss-tolerant quantum multi-party key agreement without quantum storage. Opt. Express 30(22), 40569–40583 (2022)
Yang, Y.-G., Li, B.-R., Kang, S.-Y., Chen, X.-B., Zhou, Y.-H., Shi, W.-M.: New quantum key agreement protocols based on cluster states. Quant. Inf. Process. 18, 1–17 (2019)
Yang, Y.-G., Lv, X.-L., Gao, S., Zhou, Y.-H., Shi, W.-M.: Detector-device-independent quantum key agreement based on single-photon bell state measurement. Int. J. Theor. Phys. 61(2), 50 (2022)
Yang, Y.-G., Gao, S., Li, D., Zhou, Y.-H., Shi, W.-M.: Two-party quantum key agreement over a collective noisy channel. Quant. Inf. Process. 18, 1–17 (2019)
Sun, Z., Zhang, C., Wang, P., Yu, J., Zhang, Y., Long, D.: Multi-party quantum key agreement by an entangled six-qubit state. Int. J. Theor. Phys. 55, 1920–1929 (2016)
Huang, W.-C., Yang, Y.-K., Jiang, D., Chen, L.-J.: Efficient travelling-mode quantum key agreement against participant’s attacks. Sci. Rep. 9(1), 16421 (2019)
Shukla, C., Alam, N., Pathak, A.: Protocols of quantum key agreement solely using bell states and bell measurement. Quant. Inf. Process. 13(11), 2391–2405 (2014)
Xu, G.-B., Wen, Q.-Y., Gao, F., Qin, S.-J.: Novel multiparty quantum key agreement protocol with GHZ states. Quant. Inf. Process. 13, 2587–2594 (2014)
Gu, J., Hwang, T.: Improvement of “novel multiparty quantum key agreement protocol with GHZ states.” Int. J. Theor. Phys. 56, 3108–3116 (2017)
Cai, B., Guo, G., Lin, S., Zuo, H., Yu, C.: Multipartite quantum key agreement over collective noise channels. IEEE Photonics J. 10(1), 1–11 (2018)
Chen, G., Wang, Y., Jian, L., Zhou, Y., Liu, S., Luo, J., Yang, K.: Quantum identity authentication protocol based on flexible quantum homomorphic encryption with qubit rotation. J. Appl. Phys. 133(6) (2023)
Dutta, A., Pathak, A.: A short review on quantum identity authentication protocols: how would bob know that he is talking with alice? Quant. Inf. Process. 21(11), 369 (2022)
Gao, S., Yang, Y.-G.: A novel quantum recommender system. Phys. Scr. 98(1), 010001 (2022)
Yang, Y.-G., Teng, Y.-W., Chai, H.-P., Wen, Q.-Y.: Fault-tolerant quantum secret sharing against collective noise. Phys. Scr. 83(2), 025003 (2011)
Huang, W., Su, Q., Li, Y.-B., Sun, Y.: Fault-tolerant quantum cryptographic protocols with collective detection over the collective amplitude damping channel. Phys. Scr. 89(7), 075102 (2014)
Yang, Y.-G., Yang, P.-Z., Xu, G.-B., Zhou, Y.-H., Shi, W.-M.: Quantum private information retrieval over a collective noisy channel. Mod. Phys. Lett. A 38(01), 2350001 (2023)
Wang, J., Xu, G.-B., Jiang, D.-H.: Quantum voting scheme with Greenberger-Horne-Zeilinger states. Int. J. Theor. Phys. 59, 2599–2605 (2020)
Li, X., Zhang, K., Zhang, L., Zhao, X.: A new quantum multiparty simultaneous identity authentication protocol with the classical third-party. Entropy 24(4), 483 (2022)
Kilinc, H.H., Yanik, T.: A survey of sip authentication and key agreement schemes. IEEE Commun. Surv. Tutor. 16(2), 1005–1023 (2013)
Chang, C.-C., Kuo, J.-Y.: An efficient multi-server password authenticated key agreement scheme using smart cards with access control. In: 19th International Conference on Advanced Information Networking and Applications (AINA’05) Volume 1 (AINA Papers), vol. 2, pp. 257–260 (2005). IEEE
Lee, J.-S., Wei, K.-J., Chen, Y.-C., Sun, Y.-H.: Provable secure brand-new multi-auction mechanism with dynamic identity. KSII Trans. Internet Inf. Syst. (TIIS) 10(12), 5616–5642 (2016)
Sharma, R.D., Thapliyal, K., Pathak, A.: Quantum sealed-bid auction using a modified scheme for multiparty circular quantum key agreement. Quant. Inf. Process. 16, 1–16 (2017)
Ke, W., Shi, R.-H., Yu, H., Xu, X.: A receipt-free quantum voting protocol based on quantum public key encryption and quantum key agreement. Phys. Scr. 98(6), 065112 (2023)
Shimizu, K., Tamaki, K., Fukasaka, H.: Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair. Phys. Rev. A 80(2), 022323 (2009)
Shi, R., Su, Q., Guo, Y., Huang, D.: The dining cryptographer problem-based anonymous quantum communication via non-maximally entanglement state analysis. Int. J. Theor. Phys. 52(2), 376–384 (2013)
Bennett, C.H., DiVincenzo, D.P., Smolin, J.A., Wootters, W.K.: Mixed-state entanglement and quantum error correction. Phys. Rev. A 54(5), 3824 (1996)
Hill, S.A., Wootters, W.K.: Entanglement of a pair of quantum bits. Phys. Rev. Lett. 78(26), 5022 (1997)
Dutta, A., Pathak, A.: Controlled secure direct quantum communication inspired scheme for quantum identity authentication. Quant. Inf. Process. 22(1), 13 (2022)
Lucamarini, M., Mancini, S.: Secure deterministic communication without entanglement. Phys. Rev. Lett. 94(14), 140501 (2005)
Chefles, A., Barnett, S.M.: Optimum unambiguous discrimination between linearly independent symmetric states. Phys. Lett. A 250(4–6), 223–229 (1998)
Helstrom, C.W.: Quantum detection and estimation theory. J. Stat. Phys. 1, 231–252 (1969)
Zhang, S., Ying, M.: Set discrimination of quantum states. Phys. Rev. A 65(6), 062322 (2002)
Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85(26), 5635 (2000)
Acknowledgements
We would like to thank the anonymous referees for their helpful comments. This research was supported by the Key Lab of Information Network Security, Ministry of Public Security (C21605).
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
Conflict of interest
We declare that we have no financial or personal relationships with any individuals or organizations that could inappropriately influence our work. We have no professional or personal interests, of any nature or kind, in any products, services, and/or companies that could influence the positions presented or the review process in the manuscript.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix A: The efficiency calculations
Appendix A: The efficiency calculations
In the following, we consider that the MQKA protocol combined with QKD accomplishes the same task. It is well known that BB84 is a relatively efficient and practical QKD scheme. The protocols in Refs. [13, 19, 24, 25] are some of the typical and efficient MQKA protocols. These MQKA protocols utilize different quantum resources such as single photons, Bell states, and six-particle entangled states. We will use the MQKA protocol and BB84 from Ref. [19] as an example to calculate the efficiency of the method.
1.1 A.1 The combined method
The goal of the users is to obtain the two-layer keys. All users obtain a 0.5l-bit first layer key by executing an MQKA protocol. Any two neighboring users obtain a l-bit second layer key based on the BB84 protocol.
The first layer key. All users execute MQKA in Ref. [19] to get a 0.5l-bit first layer key. Based on Ref. [19], n users need to consume \(n(l+\delta )\) qubits in this process.
The second layer key. The method of negotiating a second layer key between two neighboring users based on QKD is as follows.
(1) Any two neighboring users \(U_{i}\) and \(U_{i{\tilde{\oplus }}1}\) generate two l-bit secret keys \(R_i^{\prime }=\{r^{\prime }_{i,1},r^{\prime }_{i,2},...,r^{\prime }_{i,l}\}\) and \(R_{i{\tilde{\oplus }}1}^{\prime }=\{r^{\prime }_{i{\tilde{\oplus }}1,1},r^{\prime }_{i{\tilde{\oplus }}1,2},...,r^{\prime }_{i{\tilde{\oplus }}1,l}\}\), respectively. \(U_{i}\) prepares a particle sequence \(A_{i}=\{a_{i,1},a_{i,2},...,a_{i,l}\}\). Here, if \(r^{\prime }_{i,j}=0~(1)\), \(a_{i,j}\) is in state \(|0\rangle ~(|1\rangle )\). Similarly, \(U_{i{\tilde{\oplus }}1}\) prepares a particle sequence \(A_{i{\tilde{\oplus }}1}\). They insert \(\delta \) decoy particles into the particle sequences \(A_{i}\) and \(A_{i{\tilde{\oplus }}1}\), respectively, where each decoy particle is randomly in one of the four states in \(\{|0\rangle , |1\rangle , |+\rangle ,|-\rangle \}\). They then send the processed particle sequences to each other.
(2) After \(U_{i}\) and \(U_{i{\tilde{\oplus }}1}\) receive the particle sequences, they detect the channel security. More specifically, they announce the corresponding bases of the decoy particles and measure them, respectively. Then, they announce the positions and the measurement results and compare these results with the initial states.
(3) If there are no errors, they measure the remaining particles in \(\{|0\rangle , |1\rangle \}\) basis. \(U_{i}\) and \(U_{i{\tilde{\oplus }}1}\) obtain the keys \(R_{i{\tilde{\oplus }}1}^{\prime }\) and \(R_i^{\prime }\), respectively.
(4) \(U_{i}\) and \(U_{i{\tilde{\oplus }}1}\) get a l-bit second layer key by computing \(R_i=R_i^{\prime } \oplus R_{i{\tilde{\oplus }}1}^{\prime }\). The second layer key is influenced equally by two neighboring users.
In total, they consume \(2(l+\delta )\) qubits. In addition, every two neighboring users need to establish a l-bit second layer key. In total, all users need to consume \(2n(l+\delta )\) qubits.
1.2 A.2 The efficiency calculations
Based on the above analysis, let’s calculate the efficiency of this method. In total, it needs to consume \(2n(l+\delta )+n(l+\delta )=3n(l+\delta )\) qubits, i.e., \(q=3n(l+\delta )\). At the end of the protocol, each user gets a 0.5l-bit second layer key and two l-bit second layer keys, i.e., \(b=2.5l\). Therefore, we have
Based on the same calculation method and Refs. [13, 19, 24, 25], we can calculate the efficiencies of some typical MQKA protocols combined with QKD protocols to accomplish the same tasks as TMQKA, as shown in Table 2.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Liu, J., Wang, Q., Mu, Q. et al. Advancing multi-party quantum key agreement protocols: the power of a two-layer approach. Quantum Inf Process 23, 97 (2024). https://doi.org/10.1007/s11128-024-04302-3
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11128-024-04302-3