Abstract
This paper proposes a new measure-resend ASQKD protocol. The proposed ASQKD protocol uses only single photons, needs fewer pre-shared keys and even provides better qubit efficiency than the state-of-the-art ASQKD protocols. The security proof shows the robustness of the proposed protocol under the collective attack.
Similar content being viewed by others
References
Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560(12), 7–11 (2014)
Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121 (1992)
Lo, H.-K., Chau, H.F., Ardehali, M.: Efficient quantum key distribution scheme and a proof of its unconditional security. J. Cryptol. 18(2), 133–165 (2005)
Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67(6), 661 (1991)
Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical Bob. In: 2007 First International Conference on Quantum, Nano, and Micro Technologies (ICQNM'07), pp. 10–10. IEEE (2007)
Lo, H.-K., Ma, X., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94(23), 230504 (2005)
Lo, H.-K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108(13), 130503 (2012)
Grosshans, F., Van Assche, G., Wenger, J., Brouri, R., Cerf, N.J., Grangier, P.: Quantum key distribution using gaussian-modulated coherent states. Nature 421(6920), 238–241 (2003)
Long, G.-L., Liu, X.-S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)
Cerf, N.J., Bourennane, M., Karlsson, A., Gisin, N.: Security of quantum key distribution using d-level systems. Phys. Rev. Lett. 88(12), 127902 (2002)
Boyer, M., Gelles, R., Kenigsberg, D., Mor, T.: Semiquantum key distribution. Physical Review A 79(3), 032341 (2009)
Yu, K.-F., Yang, C.-W., Liao, C.-H., Hwang, T.: Authenticated semi-quantum key distribution protocol using Bell states. Quantum Inf. Process. 13(6), 1457–1465 (2014)
Li, C.-M., Yu, K.-F., Kao, S.-H., Hwang, T.: Authenticated semi-quantum key distributions without classical channel. Quantum Inf. Process. 15(7), 2881–2893 (2016)
Carter, J.L., Wegman, M.N.: Universal classes of hash functions. J. Comput. Syst. Sci. 18(2), 143–154 (1979)
Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Dušek, M., Lütkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81(3), 1301–1350 (2009). https://doi.org/10.1103/revmodphys.81.1301
Reed, I.S., Solomon, G.: Polynomial codes over certain finite fields. J. Soc. Ind. Appl. Math. 8(2), 300–304 (1960)
Gallager, R.: Low-density parity-check codes. IRE Trans. Inf. Theory 8(1), 21–28 (1962)
Renner, R., König, R.: Universally composable privacy amplification against quantum adversaries. Paper presented at the Theory of Cryptography Conference,
Yu-Chin Lu, C.-W.T., Tzonelih Hwang: Quantum Key Recycling with optimal key recycling rate based on a noise level. arXiv pre-print server (2020). 2004.11596
Acknowledgements
This research was partially supported by the Ministry of Science and Technology, Taiwan, R.O.C. (MOST 107-2627-E-006-001 and 109-2221-E-006-168).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations
Rights and permissions
About this article
Cite this article
Chang, CH., Lu, YC. & Hwang, T. Measure-resend authenticated semi-quantum key distribution with single photons. Quantum Inf Process 20, 272 (2021). https://doi.org/10.1007/s11128-021-03090-4
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11128-021-03090-4