Skip to main content
Log in

Information Leakage in a Tree-Type Multiparty Quantum Key Agreement Protocol Against Collusive Attacks

  • COMMENT
  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Data Availability

No data was used for the research described in the article.

References

  1. Bennett, C.H., Brassard, G.: Quantum cryptography: Public-key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pp. 175–179. IEEE Press, New York (1984)

  2. Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145–195 (2002)

    ADS  MATH  Google Scholar 

  3. Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67(6), 661–663 (1991)

    ADS  MathSciNet  MATH  Google Scholar 

  4. Boström, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)

    ADS  Google Scholar 

  5. Deng, F.-G., Long, G.-L., Liu, X.-S.: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 68, 042317 (2003)

    ADS  Google Scholar 

  6. Hillery, M., Bužek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829–1834 (1999)

    ADS  MathSciNet  MATH  Google Scholar 

  7. Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 162–168 (1999)

    ADS  Google Scholar 

  8. Yang, Y.-G., Wen, Q.-Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A: Math. Theor. 42(5), 055305 (2009)

    ADS  MathSciNet  MATH  Google Scholar 

  9. Yang, Y.-G., Cao, W.-F., Wen, Q.-Y.: Secure quantum private comparison. Phys. Scr. 80(6), 065002 (2009)

    ADS  MATH  Google Scholar 

  10. Chen, X.-B., Xu, G., Niu, X.-X., Wen, Q.-Y., Yang, Y.-X.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single particle measurement. Opt. Commun. 283(7), 1561–1565 (2010)

    ADS  Google Scholar 

  11. Lian, J.Y., Li, X., Ye, T.Y.: Multi-party semiquantum private comparison of size relationship with d-dimensional Bell states. EPJ. Quantum. Technol. 10(1), 1–15 (2023)

    ADS  Google Scholar 

  12. Lian, J.Y., Li, X., Ye, T.Y.: Multi-party quantum private comparison of size relationship with two third parties based on d-dimensional Bell states. Phys. Scr. 98(3), 035011 (2023)

    ADS  Google Scholar 

  13. Ye, T.Y., Lian, J.Y.: A novel multi-party semiquantum private comparison protocol of size relationship with d-dimensional single-particle states. Physica. A. 611, 128424 (2023)

    MathSciNet  MATH  Google Scholar 

  14. Geng, M.J., Chen, Y., Xu, T.J., et al.: Single-state semiquantum private comparison based on Bell states[J]. EPJ. Quantum. Technol. 9(1), 1–24 (2022)

    Google Scholar 

  15. Ye, T.Y., Xu, T.J., Geng, M.J., et al.: Two-party secure semiquantum summation against the collective-dephasing noise. Quantum Inf. Process. 21(3), 118 (2022)

    ADS  MathSciNet  MATH  Google Scholar 

  16. Zeng, G.-H., Keitel, C.H.: An arbitrated quantum signature algorithm. Phys. Rev. A 65, 042312 (2002)

    ADS  Google Scholar 

  17. Yang, Y.-G., Liu, Z.-C., Li, J., Chen, X.-B., Zuo, H.-J., Zhou, Y.-H., Shi, W.-M.: Theoretically extensible quantum digital signature with starlike cluster states. Quantum Inf. Process. 16(1), 12 (2017)

    ADS  MATH  Google Scholar 

  18. Yang, Y.-G., Lei, H., Liu, Z.-C., Zhou, Y.-H., Shi, W.-M.: Arbitrated quantum signature scheme based on cluster states. Quantum Inf. Process. 15(6), 2487–2497 (2016)

    ADS  MathSciNet  MATH  Google Scholar 

  19. Jakobi, M., Simon, C., Gisin, N., Bancal, J.D., et al.: Practical private database queries based on a quantum-key-distribution protocol. Phys. Rev. A 83, 022301 (2011)

    ADS  Google Scholar 

  20. Wei, C.-Y., Wang, T.-Y., Gao, F.: Practical quantum private query with better performance in resisting joint-measurement attack. Phys. Rev. A 93, 042318 (2016)

    ADS  Google Scholar 

  21. Yang, Y.-G., Liu, Z.-C., Chen, X.-B., Zhou, Y.-H., Shi, W.-M.: Robust QKD-based private database queries based on alternative sequences of single-qubit measurements. Sci. Chin. Phys. Mech. Astron. 60(12), 120311 (2017)

    ADS  Google Scholar 

  22. Yang, Y.-G., Liu, Z.-C., Li, J., Chen, X.-B., Zuo, H.-J., Zhou, Y.-H., Shi, W.-M.: Quantum private query with perfect user privacy against a joint-measurement attack. Phys. Lett. A 380(48), 4033–4038 (2016)

    ADS  MATH  Google Scholar 

  23. Yang, Y.-G., Liu, Z.-C., Chen, X.-B., Cao, W.-F., Zhou, Y.-H., Shi, W.-M.: Novel classical post-processing for quantum key distribution-based quantum private query. Quantum Inf. Process. 15, 3833–3840 (2016)

    ADS  MathSciNet  MATH  Google Scholar 

  24. Gao, F., Liu, B., Wen, Q.-Y.: Flexible quantum private queries based on quantum key distribution. Opt. Exp. 20, 17411–17420 (2012)

    Google Scholar 

  25. Gao, F., Qin, S.-J., Huang, W., Wen, Q.-Y.: Quantum private query: a new kind of practical quantum cryptographic protocols. Sci. China-Phys. Mech. Astron. 62, 070301 (2019)

    Google Scholar 

  26. Yang, Y.-G., Guo, X.-P., Xu, G., Chen, X.-B., Li, J., Zhou, Y.-H., Shi, W.-M.: Reducing the communication complexity of quantum private database queries by subtle classical post-processing with relaxed quantum ability. Comput. Secur. 81, 15–24 (2019)

    Google Scholar 

  27. Zhou, N.-R., Zeng, G.-H., Xiong, J.: Quantum key agreement protocol. Electron. Lett. 40, 1149 (2004)

    ADS  Google Scholar 

  28. Tsai, C.-W., Hwang, T.: On quantum key agreement protocol. Technical Report C-S-I-E, NCKU, Taiwan (2009).

  29. Chong, S.-K., Hwang, T.: Quantum key agreement protocol based on BB84. Opt. Commun. 283, 1192–1195 (2010)

    ADS  Google Scholar 

  30. He, Y.-F., Ma, W.-P.: Quantum key agreement protocols with four-qubit cluster states. Quantum Inf. Process. 14, 3483–3498 (2015)

    ADS  MathSciNet  MATH  Google Scholar 

  31. He, Y.-F., Ma, W.-P.: Two-party quantum key agreement with five-particle entangled states. Int. J. Quantum Inf. 15(03), 1750018 (2017)

    MathSciNet  MATH  Google Scholar 

  32. Zhu, H.-F., Wang, C.-N., Li, Z.-X.: Semi-honest three-party mutual authentication quantum key agreement protocol based on GHZ-like state. Int. J. Theor. Phys. 60, 293–303 (2021)

    MathSciNet  MATH  Google Scholar 

  33. Zhu, H.-F., Liu, T.-H., Wang, C.-N.: A one-round quantum mutual authenticated key agreement protocol with semi-honest server using three-particle entangled states. Int. J. Theor. Phys. 60, 929–943 (2021)

    MathSciNet  MATH  Google Scholar 

  34. Huang, X., Zhang, S.-B., Chang, Y., Qiu, C., Liu, D.-M., Hou, M.: Quantum key agreement protocol based on quantum search algorithm. Int. J. Theor. Phys. 60, 838–847 (2021)

    MathSciNet  MATH  Google Scholar 

  35. Shi, R.-H., Zhong, H.: Multi-party quantum key agreement with Bell states and Bell measurements. Quantum Inf. Process. 12, 921–932 (2013)

    ADS  MathSciNet  MATH  Google Scholar 

  36. Liu, B., Gao, F., Huang, W., Wen, Q.-Y.: Multiparty quantum key agreement with single particles. Quantum Inf. Process. 12, 1797–1805 (2013)

    ADS  MathSciNet  MATH  Google Scholar 

  37. Sun, Z., Huang, J., Wang, P.: Efficient multiparty quantum key agreement protocol based on commutative encryption. Quantum Inf. Process. 15(5), 2101–2111 (2016)

    ADS  MathSciNet  MATH  Google Scholar 

  38. Yang, Y.-G., Wang, Y.-C., Li, J., Zhou, Y.-H., Shi, W.-M.: Semi-device-independent quantum key agreement protocol. Quantum Inf. Process. 20(11), 376 (2021)

  39. Yang, Y.-G., Li, B.-R., Kang, S.-Y., et al.: New quantum key agreement protocols based on cluster states. Quantum Inf. Process. 18, 77 (2019)

    ADS  MathSciNet  MATH  Google Scholar 

  40. Yang, Y.G., Li, B.R., Li, D., et al.: New quantum key agreement protocols based on Bell states. Quantum Inf. Process. 18, 322 (2019)

  41. Cao, W.-F., Yang, Y.-G., Zhou, Y.-H., Shi, W.-M.: New quantum key agreement protocol with five-qubit Brown states. Mod. Phys. Lett. A 34(40), 1950332 (2019)

  42. Li, L., Li, Z.: A verifiable multiparty quantum key agreement based on bivariate polynomial. Inf. Sci. 521, 343–349 (2020)

    MathSciNet  MATH  Google Scholar 

  43. Lin, S., Zhang, X., Guo, G.-D., Wang, L.-L., Liu, X.-F.: Multiparty quantum key agreement. Phys. Rev. A 104, 042421 (2021)

    ADS  MathSciNet  Google Scholar 

  44. Yang, Y.-G., Lv, X.-L., Gao, S., et al.: Detector-device-independent quantum key agreement based on single-photon Bell state measurement. Int J. Theor. Phys. 61(2), 50 (2022)

    MathSciNet  MATH  Google Scholar 

  45. Yang, H., Lu, S., Zhu, J., et al.: A tree-type multiparty quantum key agreement protocol against collusive attacks. Int. J. Theor. Phys. 62, 7 (2023)

    MathSciNet  MATH  Google Scholar 

  46. Liu, B., Gao, F., Huang, W., Wen, Q.Y.: Multiparty quantum key agreement with single particles. Quantum Inf Process 12, 1797–1805 (2013)

    ADS  MathSciNet  MATH  Google Scholar 

  47. Shi, R.H., Zhong, H.: Multi-party quantum key agreement with Bell states and Bell measurements. Quantum Inf Process 12, 921–932 (2013)

    ADS  MathSciNet  MATH  Google Scholar 

  48. Xu, G.-B., Wen, Q.-Y., Gao, F., Qin, S.-J.: Novel multiparty quantum key agreement protocol with GHZ states. Quantum Inf. Process. 13(12), 2587–2594 (2014)

    ADS  MathSciNet  MATH  Google Scholar 

  49. Konig, R., Wehner, S., Wullschleger, J.: Unconditional security from noisy quantum storage. IEEE Trans. Inf. Theory 58(3), 1962–1984 (2012)

    MathSciNet  MATH  Google Scholar 

  50. Chan, P., Lucio-Martinez, I., Mo, X., Simon, C., Tittel, W.: Performing private database queries in a real-world environment using a quantum protocol. Sci. Rep. 4(1), 5233 (2014)

    ADS  Google Scholar 

  51. Ng, N.H.Y., Joshi, S., Chen Ming, C., Kurtsiefer, C., Wehner, S.: Experimental implementation of bit commitment in the noisy-storage model. Nature Commun. 3(1), 1326 (2012)

    ADS  Google Scholar 

  52. Gao, G.: Information leakage in protection of quantum dialogue affected by quantum field. Quantum Inf. Process. 19, 300 (2020)

    ADS  MATH  Google Scholar 

  53. Liu, Z., Chen, H.: Analyzing and revising quantum dialogue without information leakage based on the entanglement swapping between any two Bell states and the shared secret Bell state. Int. J. Theor. Phys. 58, 575–583 (2019)

    MATH  Google Scholar 

  54. Gao, G., Li, W.-Y., Wang, Y.: Information leakage in quantum dialogue by using non-symmetric quantum channel. Commun. Theor. Phys. 67, 507 (2017)

    ADS  MathSciNet  Google Scholar 

  55. Gao, G.: Information leakage in quantum dialogue by using the two-qutrit entangled states. Mod. Phys. Lett. B 28(12), 1450094 (2014)

    ADS  Google Scholar 

  56. Liu, Z.-H., Chen, H.-W., Liu, W.-J.: Information leakage problem in efficient bidirectional quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom. Int. J. Theor. Phys. 55, 4681–4686 (2016)

    MATH  Google Scholar 

  57. Wang, L.-Y., Chen, X.-B., Xu, G., Yang, Y.-X.: Information leakage in three-party simultaneous quantum secure direct communication with EPR pairs. Opt. Commun. 284(7), 1719–1720 (2011)

    ADS  Google Scholar 

  58. Liu, Z.-H., Chen, H.-W., Liu, W.-J.: Information leakage problem in high-capacity quantum secure communication with authentication using Einstein-Podolsky-Rosen Pairs. Chin. Phys. Lett. 33, 070305 (2016)

    Google Scholar 

  59. Qin, S.-J., Liu, F.: Information leakage in quantum secret sharing of multi-bits by an entangled six-qubit state. Int. J. Theor. Phys. 53, 3116–3123 (2014)

    MATH  Google Scholar 

  60. Yang, Y.-G., Sun, S.-J., Xu, P., Tian, J.: Flexible protocol for quantum private query based on B92 protocol. Quantum Inf. Process. 13, 805–813 (2014)

    ADS  MathSciNet  Google Scholar 

  61. Yang, Y.-G., Sun, S.-J., Tian, J., Xu, P.: Secure quantum private query with real-time security check. Optik. 125, 5538–5541 (2014)

    ADS  Google Scholar 

  62. Yang, Y.-G., Zhang, M.-O., Yang, R.: Private database queries using one quantum state. Quantum Inf. Process. 14, 1017–1024 (2015)

    ADS  MathSciNet  MATH  Google Scholar 

  63. Yang, Y.-G., Gao, S., Li, D., Zhou, Y.-H., Shi, W.-M.: New secure quantum dialogue protocols over collective noisy channels. Int. J. Theor. Phys. 58(9), 2810–2822 (2019)

    MathSciNet  MATH  Google Scholar 

  64. Yang, Y.-G., Gao, S., Li, D., Zhou, Y.-H., Shi, W.-M.: Three-party quantum secret sharing against collective noise. Quantum Inf. Process. 18(5), 215 (2019)

    ADS  MathSciNet  MATH  Google Scholar 

  65. Yang, Y.-G., Gao, S., Li, D., Zhou, Y.-H., Shi, W.-M.: Two-party quantum key agreement over a collective noisy channel. Quantum Inf. Process. 18(3), 74 (2019)

    ADS  MathSciNet  MATH  Google Scholar 

  66. Cao, W.-F., Yang, Y.-G.: Verifiable quantum secret sharing protocols based on four-qubit entangled states. Int. J. Theor. Phys. 58(4), 1202–1214 (2019)

    MathSciNet  MATH  Google Scholar 

  67. Yang, Y.-G., Yang, J.-J., Zhou, Y.-H., et al.: Quantum network communication: A discrete-time quantum-walk approach. Sci. Chin. Inf. Sci. 61, 042501 (2018)

    MathSciNet  Google Scholar 

  68. Yang, Y.-G., Yang, R., Cao, W.-F., Chen, X.-B., Zhou, Y.-H., Shi, W.-M.: Flexible quantum oblivious transfer. Int. J. Theor. Phys. 56(4), 1286–1297 (2017)

    MATH  Google Scholar 

  69. Li, J., Yang, Y.-G., Chen, X.-B., Zhou, Y.-H., Shi, W.-M.: Practical quantum private database queries based on passive round-Robin differential phase-shift quantum key distribution. Sci. Rep. 6, 31738 (2016)

    ADS  Google Scholar 

  70. Yang, Y.-G., Sun, S.-J., Pan, Q.-X., Xu, P.: Quantum oblivious transfer based on unambiguous set discrimination. Optik. 126(23), 3838–3843 (2015)

    ADS  Google Scholar 

  71. Yang, Y.-G., Wang, Y.-C., Yang, Y.-L., Chen, X.-B., Li, D., Zhou, Y.-H., Shi, W.-M.: Participant attack on the deterministic measurement-device-independent quantum secret sharing protocol. Sci. Chin. Phys. Mech. Astron. 64(6), 121–124 (2021)

    MATH  Google Scholar 

  72. Yang, Y.-G., Liu, X.-X., Gao, S., Chen, X.-B., Li, D., Zhou, Y.-H., Shi, W.-M.: A stronger participant attack on the measurement-device-independent protocol for deterministic quantum secret sharing. Quantum Inf. Process. 20(7), 223 (2021)

    ADS  MathSciNet  MATH  Google Scholar 

  73. Yang, Y.-G., Liu, X.-X., Gao, S., Zhou, Y.-H., Shi, W.-M., Li, J., Li, D.: Towards practical anonymous quantum communication: A measurement-device-independent approach. Phys. Rev. A. 104(5), 052415 (2021)

    ADS  MathSciNet  Google Scholar 

  74. Yang, Y.-G., Cao, G.-D., Huang, R.-C., Gao, S., Zhou, Y.-H., Shi, W.-M., Xu, G.B.: Multiparty anonymous quantum communication without multipartite entanglement. Quantum Inf. Process. 21(6), 196 (2022)

    ADS  MathSciNet  MATH  Google Scholar 

  75. Yang, Y.-G., Yang, Y.-L., Lv, X.-L., et al.: Examining the correctness of anonymity for practical quantum networks (vol 101, 062311, 2020). Phys. Rev. A. 106(4), 049901 (2022)

    ADS  Google Scholar 

  76. Yang, Y.-L., Yang, Y.-G., Zhou, Y.-H., Shi, W.-M., Li, J.: Efficient quantum multi-hop communication based on Greenberger-Horne-Zeilinger states and Bell states. Quantum Inf. Process. 20(5), 189 (2021)

    ADS  MathSciNet  MATH  Google Scholar 

  77. Yang, Y.-L., Yang, Y.-G., Zhou, Y.-H., et al.: Measurement-device-independent quantum wireless network communication. Quantum Inf. Process. 21(4), 154 (2022)

    ADS  MathSciNet  MATH  Google Scholar 

  78. Li, J., Yang, Y.-G., Li, J., et al.: Deterministic secure quantum communication based on spatial encoding. Quantum Inf. Process. 21(1), 2 (2022)

    ADS  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (Grant Nos. 62071015, 62171264).

Author information

Authors and Affiliations

Authors

Contributions

Yu-Guang Yang (First Author):Conceptualization, Methodology, Writing - Original Draft; Rui-Chen Huang: Investigation; Guang-Bao Xu, Yi-Hua Zhou, Wei-Min Shi, Dan Li: Writing - Review & Editing.

Corresponding author

Correspondence to Yu-Guang Yang.

Ethics declarations

Competing interests

We declare that we have no financial and personal relationships with other people or organizations that can inappropriately influence our work, there is no professional or other personal interest of any nature or kind in any product, service and/or company that could be construed as influencing the position presented in, or the review of, the manuscript.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, YG., Huang, RC., Xu, GB. et al. Information Leakage in a Tree-Type Multiparty Quantum Key Agreement Protocol Against Collusive Attacks. Int J Theor Phys 62, 148 (2023). https://doi.org/10.1007/s10773-023-05421-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10773-023-05421-w

PACS Number(s)

Navigation