Abstract
Eavesdropping detection is an indispensable process of most quantum cryptographic protocols. By publishing and comparing part of the shared bits, called as detection bits, the participants can check whether there exists an eavesdropper. Generally, the detection bits are chosen randomly. Consequently, the secret bits, i.e., the rest bits, are also random. Then, what if the detection bits are chosen non-randomly? Can the participant who chooses the detection bits make the secret bits to be a predetermined string he expected? This paper focuses on the participants’ key control capability when they choose the detection bits selectively in two-party quantum communication protocols. Concretely, we analyze the participants’ key control capability in different situations of different proportions of the detection bits. And we prove that the participants can predetermine, with high probability, any part of the secret bits of which the length is smaller than that of the detection bits. The above result has various potential applications in quantum cryptographic protocols. Obviously, utilizing this non-random selection of the detection bits, one can realize the function of a deterministic quantum key distribution protocol through a random one if the number of the detection bits is not smaller than that of the secret bits. What is more, we find that quite a few quantum key agreement protocols cannot guarantee the fairness of the key in the sense that the participant who chooses the detection bits can control the key somewhat.
摘要
创新点
在量子密钥分发( Quantum Key Distribution, QKD) 协议中, 参与者对检测比特的选择一般都是随机的, 这样产生的密钥也是随机的。那么如果不随机选择检测比特会怎样呢? 本文分析了当参与者不随机选择检测比特时其对密钥的控制能力。研究表明, 当检测比特所占比例超过1/2时, 参与者可以以非常高的概率完全控制密钥。同时, 本文还研究了这种不随机选择检测比特的检测窃听方式在确定性QKD和量子密钥协商中的应用。
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Wiesner S. Conjugate coding. SIGACT News, 1983, 15: 78–88
Bennett C H, Brassard G. Quantum cryptography: public-key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers: Systems and Signal Processing, Bangalore, 1984. 175–179
Ekert A K. Quantum cryptography based on Bell theorem. Phys Rev Lett, 1991, 67: 661–663
Bennett C H. Quantum cryptography using any two nonorthogonal states. Phys Rev Lett, 1992, 68: 3121–3124
Goldenberg L, Vaidman L. Quantum cryptography based on orthogonal states. Phys Rev Lett, 1995, 75: 1239–1243
Zhang C M, Song X T, Treeviriyanupab P, et al. Delayed error verification in quantum key distribution. Chin Sci Bull, 2014, 59: 2825–2828
Lin C Y, Hwang T. CNOT extraction attack on “quantum asymmetric cryptography with symmetric keys”. Sci China-Phys Mech Astron, 2014, 57: 1001–1003
Su X L. Applying Gaussian quantum discord to quantum key distribution. Chin Sci Bull, 2014, 59: 1083–1090
Liu B, Gao F, Qin S J, et al. Choice of measurement as the secret. Phys Rev A, 2014, 89: 042318
Hillery M, Buzek V, Berthiaume A. Quantum secret sharing. Phys Rev A, 1999, 59: 1829–1834
Karlsson A, Koashi M, Imoto N. Quantum entanglement for secret sharing and secret splitting. Phys Rev A, 1999, 5: 162–168
Long G L, Liu X. Theoretically efficient high-capacity quantum-key-distribution scheme. Phys Rev A, 2002, 65: 032302
Boström K, Felbinger T. Deterministic secure direct communication using entanglement. Phys Rev Lett, 2002, 89: 187902
Cai Q Y, Li B W. Deterministic secure communication without using entanglement. Chin Phys Lett, 2004, 21: 601–603
Zou X F, Qiu D W. Three-step semiquantum secure direct communication protocol. Sci China-Phys Mech Astron, 2014, 57: 1696–1702
Zheng C, Long G F. Quantum secure direct dialogue using Einstein-Podolsky-Rosen pairs. Sci China-Phys Mech Astron, 2014, 57: 1238–1243
Chang Y, Xu C X, Zhang S B, et al. Quantum secure direct communication and authentication protocol with single photons. Chin Sci Bull, 2013, 58: 4571–4576
Chang Y, Xu C X, Zhang S B, et al. Controlled quantum secure direct communication and authentication protocol based on five-particle cluster state and quantum one-time pad. Chin Sci Bull, 2014, 59: 2541–2546
Lo H K, Chau H F. Is quantum bit commitment really possible? Phys Rev Lett, 1997, 78: 3410–3413
Mayers D. Unconditionally secure quantum bit commitment is impossible. Phys Rev Lett, 1997, 78: 3414–3417
Gao F, Fang W, Wen Q Y. Minimum best success probability by classical strategies for quantum pseudo-telepathy. Sci China-Phys Mech Astron, 2014, 57: 1244–1249
Buhrman H, Chandran N, Fehr S, et al. Position-based quantum cryptography: impossibility and constructions. In: Proceedings of 31st International Cryptology Conference, Santa Barbara, 2011. 429–446
Giovannetti V, Lloyd S, Maccone L. Quantum private queries. Phys Rev Lett, 2008, 100: 230502
Gao F, Liu B, Huang W, et al. Postprocessing of the oblivious key in quantum private query. IEEE J Sel Top Quantum Electron, 2015, 21: 6600111
Liu B, Gao F, Jia H Y, et al. Efficient quantum private comparison employing single photons and collective detection. Quantum Inf Process, 2013, 12: 887–897
Huang W, Wen Q Y, Liu B, et al. Robust and efficient quantum private comparison of equality with collective detection over collective-noise channels. Sci China-Phys Mech Astron, 2013, 56: 1670–1678
Liu Y M. Virtual-photon-induced entanglement with two nitrogen-vacancy centers coupled to a high-Q silica microsphere cavity. Sci China-Phys Mech Astron, 2013, 56: 2138–2142
Shi X, Wei L F, Oh C H. Quantum computation with surface-state electrons by rapid population passages. Sci China-Phys Mech Astron, 2014, 57: 1718–1724
Ye T Y. Information leakage resistant quantum dialogue against collective noise. Sci China-Phys Mech Astron, 2014, 57: 2266–2275
Xu S J, Chen X B, Niu X X, et al. High-efficiency quantum steganography based on the tensor product of Bell states. Sci China-Phys Mech Astron, 2013, 56: 1745–1754
Wang M M, Chen X B, Yang Y X. A blind quantum signature protocol using the GHZ states. Sci China-Phys Mech Astron, 2013, 56: 1636–1641
Shi J J, Shi R H, Guo Y, et al. Batch proxy quantum blind signature scheme. Sci China-Phys Mech Astron, 2013, 56: 052115
Lo H K, Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances. Science, 1999, 283: 2050–2056
Shor P W, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol. Phys Rev Lett, 2000, 85: 441–444
Zhou N, Zeng G, Xiong J. Quantum key agreement protocol. Electron Lett, 2004, 40: 1149–1150
Chong S K, Tsai C W, Hwang T. Improvement on “quantum key agreement protocol with maximally entangled states”. Int J Theor Phys, 2011, 50: 1793–1802
Xu G B, Wen Q Y, Gao F, et al. Novel multiparty quantum key agreement protocol with GHZ states. Quantum Inf Process, 2014, 13: 2587–2594
Chernoff H. A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. Ann Math Stat, 1952, 23: 493–507
Mitchell C J, Ward M, Wilson P. Key control in key agreement protocols. Electron Lett, 1998, 34: 980–981
Ateniese G, Steiner M, Tsudik G. New multiparty authentication services and key agreement protocols. IEEE J Sel Areas Commun, 2000, 18: 628–639
Chong S K, Hwang T. Quantum key agreement protocol based on BB84. Opt Commun, 2010, 283: 1192–1195
Liu B, Gao F, Wen Q Y. Single-photon multiparty quantum cryptographic protocols with collective detection. IEEE J Quantum Electron, 2011, 47: 1383–1390
Lin S, Wen Q Y, Qin S J, et al. Multiparty quantum secret sharing with collective eavesdropping-check. Opt Commun, 2009, 282: 4455–4459
Yang Y G, Chai H P, Wang Y, et al. Fault tolerant quantum secret sharing against collective-amplitude-damping noise. Sci China-Phys Mech Astron, 2011, 54: 1619–1624
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Liu, B., Gao, F., Huang, W. et al. Controlling the key by choosing the detection bits in quantum cryptographic protocols. Sci. China Inf. Sci. 58, 1–11 (2015). https://doi.org/10.1007/s11432-015-5413-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11432-015-5413-8
Keywords
- eavesdropping detection
- deterministic quantum key distribution
- quantum key agreement
- quantum information
- quantum cryptography