An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States

Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391–2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245–4254, 2015). In this study, we will show Zhu et al.’s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations {I, Z, X, Y} to encode two bits instead of the original two operations {I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper’s flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.

[1]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[2]  R. Cleve,et al.  HOW TO SHARE A QUANTUM SECRET , 1999, quant-ph/9901025.

[3]  V. Buzek,et al.  Quantum secret sharing , 1998, quant-ph/9806063.

[4]  A Cabello Quantum key distribution in the Holevo limit. , 2000, Physical review letters.

[5]  Guihua Zeng,et al.  Quantum key agreement protocol , 2004 .

[6]  Qiaoyan Wen,et al.  An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement , 2009 .

[7]  Chen Hanwu,et al.  An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication , 2009 .

[8]  Tzonelih Hwang,et al.  Quantum key agreement protocol based on BB84 , 2010 .

[9]  Runhua Shi,et al.  Multiparty quantum secret sharing with the pure entangled two-photon states , 2012, Quantum Inf. Process..

[10]  Fei Gao,et al.  Multiparty quantum key agreement with single particles , 2012, Quantum Information Processing.

[11]  Chitra Shukla,et al.  Orthogonal-state-based protocols of quantum key agreement , 2013, 1310.1435.

[12]  Wang Xiaojun,et al.  Attacks and Improvement of Quantum Sealed-Bid Auction with EPR Pairs , 2014 .

[13]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[14]  Wenjie Liu,et al.  Secure Quantum Private Comparison of Equality Based on Asymmetric W State , 2013, 1312.5577.

[15]  Fei Gao,et al.  Novel multiparty quantum key agreement protocol with GHZ states , 2014, Quantum Information Processing.

[16]  Chitra Shukla,et al.  Protocols of quantum key agreement solely using Bell states and Bell measurement , 2014, Quantum Inf. Process..

[17]  Yu Zheng,et al.  Cryptanalysis and Improvement of Quantum Private Comparison Protocol Based on Bell Entangled States , 2014, 1405.6455.

[18]  Lili Wang,et al.  Two-party quantum key agreement with four-qubit cluster states , 2014, Quantum Information Processing.

[19]  Huantong Geng,et al.  Same Initial States Attack in Yang et al.’s Quantum Private Comparison Protocol and the Improvement , 2013, 1312.5562.

[20]  Chao Liu,et al.  Improved Deterministic N-To-One Joint Remote Preparation of an Arbitrary Qubit via EPR Pairs , 2014, 1405.6453.

[21]  Anmin Fu,et al.  Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement , 2015, Quantum Inf. Process..

[22]  Jin Wang,et al.  Privacy-Preserving Smart Similarity Search Based on Simhash over Encrypted Data in Cloud Computing , 2015 .

[23]  YeFeng He,et al.  Quantum key agreement protocols with four-qubit cluster states , 2015, Quantum Inf. Process..

[24]  Xiaodong Liu,et al.  A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment , 2016, Secur. Commun. Networks.

[25]  Wenping Ma,et al.  Two-party quantum key agreement based on four-particle GHZ states , 2016 .

[26]  Xingming Sun,et al.  Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.

[27]  Wenjie Liu,et al.  Information Leakage Problem in Efficient Bidirectional Quantum Secure Direct Communication with Single Photons in Both Polarization and Spatial-Mode Degrees of Freedom , 2016 .

[28]  Hanwu Chen,et al.  Information Leakage Problem in High-Capacity Quantum Secure Communication with Authentication Using Einstein—Podolsky—Rosen Pairs , 2016 .

[29]  Wenjie Liu,et al.  Cryptanalysis of Controlled Quantum Secure Direct Communication and Authentication Protocol Based on Five-Particle Cluster State and Quantum One-Time Pad , 2016 .

[30]  Yong Xu,et al.  Multiparty quantum sealed-bid auction using single photons as message carrier , 2016, Quantum Inf. Process..

[31]  Xingming Sun,et al.  Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.

[32]  Zhihua Xia,et al.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.

[33]  Hanwu Chen,et al.  Cryptanalysis and improvement of quantum broadcast communication and authentication protocol with a quantum one-time pad , 2016 .

[34]  Xiao-Yan Zhou,et al.  Deterministic Joint Remote Preparation of a Four-Qubit Cluster-Type State via GHZ States , 2016, 1602.02065.

[35]  Zhangjie Fu,et al.  Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data , 2017, IEEE Transactions on Information Forensics and Security.

[36]  Jian Shen,et al.  An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.

[37]  Jian Shen,et al.  A secure cloud-assisted urban data sharing framework for ubiquitous-cities , 2017, Pervasive Mob. Comput..

[38]  Xingming Sun,et al.  Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data , 2019, IEEE Transactions on Services Computing.