Participant Attack on Three-party Quantum key Agreement with Two-photon Entanglement

In a recent study (Yin et al. Int. J. Theor. Phys. 52, 3915-3921, 2013), Yin et al. proposed a three-party quantum key agreement protocol based on two-qubit entangled states, they claimed that the protocol could resist against the insider attack and each party in the protocol has an equal contribution to the establishment of the final shared secret key. However, in this study, we will show that the protocol is not secure, two dishonest participants can conclude to determine the shared key alone. To avoid this flaw, a further improved protocol is proposed.

[1]  Mihir Bellare,et al.  Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.

[2]  Fei Gao,et al.  Quantum key agreement with EPR pairs and single-particle measurements , 2013, Quantum Information Processing.

[3]  Alfred Menezes,et al.  Key Agreement Protocols and Their Security Analysis , 1997, IMACC.

[4]  Fei Gao,et al.  Novel multiparty quantum key agreement protocol with GHZ states , 2014, Quantum Information Processing.

[5]  Runhua Shi,et al.  Multi-party quantum key agreement with bell states and bell measurements , 2012, Quantum Information Processing.

[6]  Qiaoyan Wen,et al.  Comment on: “Quantum exam” [Phys. Lett. A 350 (2006) 174] , 2007 .

[7]  Guang-Can Guo,et al.  Comment on “Quantum key distribution without alternative measurements” [Phys. Rev. A 61 , 052312 (2000)] , 2001 .

[8]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[9]  Chak-Kuen Wong,et al.  A conference key distribution system , 1982, IEEE Trans. Inf. Theory.

[10]  Kenneth G. Paterson,et al.  Modular Security Proofs for Key Agreement Protocols , 2005, ASIACRYPT.

[11]  Qiaoyan Wen,et al.  Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol , 2007, 0801.2418.

[12]  Chitra Shukla,et al.  Protocols of quantum key agreement solely using Bell states and Bell measurement , 2014, Quantum Inf. Process..

[13]  Qiao-Yan Wen,et al.  Comment on "experimental demonstration of a quantum protocol for Byzantine agreement and liar detection". , 2008, Physical review letters.

[14]  Zhiwei Sun,et al.  Improvements on “multiparty quantum key agreement with single particles” , 2013, Quantum Inf. Process..

[15]  Xunru Yin,et al.  Three-Party Quantum Key Agreement with Two-Photon Entanglement , 2013 .

[16]  Chia-Wei Tsai,et al.  Improvement on “Quantum Key Agreement Protocol with Maximally Entangled States” , 2011 .

[17]  宋婷婷,et al.  Participant attack on quantum secret sharing based on entanglement swapping , 2009 .

[18]  Wen Qiao-Yan,et al.  Cryptanalysis of the arbitrated quantum signature protocols , 2011 .

[19]  Fei Gao,et al.  A simple participant attack on the brádler-dušek protocol , 2007, Quantum Inf. Comput..

[20]  Tzonelih Hwang,et al.  Quantum key agreement protocol based on BB84 , 2010 .

[21]  Guihua Zeng,et al.  Quantum key agreement protocol , 2004 .

[22]  Hugo Krawczyk,et al.  A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract) , 1998, STOC '98.

[23]  Su-Juan Qin,et al.  Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state , 2010 .

[24]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[25]  Chitra Shukla,et al.  Orthogonal-state-based protocols of quantum key agreement , 2013, 1310.1435.

[26]  Fei Gao,et al.  Multiparty quantum key agreement with single particles , 2012, Quantum Information Processing.

[27]  Yvo Desmedt,et al.  A Secure and Efficient Conference Key Distribution System (Extended Abstract) , 1994, EUROCRYPT.

[28]  Deng Fu-Guo,et al.  Erratum: Improving the security of multiparty quantum secret sharing against Trojan horse attack [Phys. Rev. A 72, 044302 (2005)] , 2006 .

[29]  Qing-yu Cai,et al.  The "ping-pong" protocol can be attacked without eavesdropping. , 2003, Physical review letters.

[30]  Qiaoyan Wen,et al.  Participant attack on a kind of MQSS schemes based on entanglement swapping , 2010 .

[31]  Gene Tsudik,et al.  Key Agreement in Dynamic Peer Groups , 2000, IEEE Trans. Parallel Distributed Syst..

[32]  Fuguo Deng,et al.  Improving the security of multiparty quantum secret sharing against Trojan horse attack , 2005, quant-ph/0506194.

[33]  Yan-Bing Li,et al.  Quantum Key Agreement Against Collective Decoherence , 2014 .

[34]  Antoni Wójcik Eavesdropping on the "ping-pong" quantum communication protocol. , 2003, Physical review letters.