Multi-user quantum key distribution based on Bell states with mutual authentication

A new multi-user quantum key distribution protocol with mutual authentication is proposed on a star network. Here, two arbitrary users are able to perform key distribution with the assistance of a semi-trusted center. Bell states are used as information carriers and transmitted in a quantum channel between the center and one user. A keyed hash function is utilized to ensure the identities of three parties. Finally, the security of this protocol with respect to various kinds of attacks is discussed.

[1]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[2]  Albert Einstein,et al.  Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? , 1935 .

[3]  Deng Fu-Guo,et al.  A Theoretical Scheme for Multi-user Quantum Key Distribution with N Einstein-Podolsky-Rosen Pairs on a Passive Optical Network , 2002 .

[4]  Long Gui-lu,et al.  Quantum Key Distribution Network Based on Differential Phase Shift , 2007 .

[5]  Li Zhi-qiang,et al.  Efficient Quantum Secure Direct Communication with Authentication , 2007 .

[6]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[7]  M. Daoud,et al.  Three-dimensional quantum key distribution in the presence of several eavesdroppers , 2011 .

[8]  Jan Bouda,et al.  Entanglement swapping between multi-qudit systems , 2001 .

[9]  Shi-Jinn Horng,et al.  Quantum direct communication with mutual authentication , 2009, Quantum Inf. Comput..

[10]  Jan-Åke Larsson,et al.  Security Aspects of the Authentication Used in Quantum Cryptography , 2008, IEEE Transactions on Information Theory.

[11]  Mosayeb Naseri AN EFFICIENT PROTOCOL FOR QUANTUM SECURE DIALOGUE WITH AUTHENTICATION BY USING SINGLE PHOTONS , 2011 .

[12]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[13]  周萍,et al.  Efficient Quantum Cryptography Network without Entanglement and Quantum Memory , 2006 .

[14]  Qiaoyan Wen,et al.  On the information-splitting essence of two types of quantum key distribution protocols , 2006 .

[15]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[16]  Xiongfeng Ma,et al.  Practical issues in quantum-key-distribution postprocessing , 2009, 0910.0312.

[17]  Deng Fu-Guo,et al.  Efficient Quantum Cryptography Network without Entanglement and Quantum Memory , 2006 .

[18]  P. Knight,et al.  Multiparticle generalization of entanglement swapping , 1998 .

[19]  Jing Yang,et al.  Quantum Secure Direct Communication with Authentication Expansion Using Single Photons , 2010 .

[20]  Guihua Zeng,et al.  Secure networking quantum key distribution schemes with Greenberger–Horne–Zeilinger states , 2010 .

[21]  Jongin Lim,et al.  N quantum channels are sufficient for Multi-user Quantum Key Distribution protocol between n users , 2010 .

[22]  Michael K. Reiter,et al.  Fair Exchange with a Semi-Trusted Third Party (extended abstract) , 1997, CCS.

[23]  Jun Zhu,et al.  QUANTUM IDENTITY AUTHENTICATION USING GAUSSIAN-MODULATED SQUEEZED STATES , 2011 .

[24]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[25]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .

[26]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[27]  Li-Hua Gong,et al.  Quantum deterministic key distribution protocols based on the authenticated entanglement channel , 2010 .

[28]  Yan Wang,et al.  Secure quantum key distribution network with Bell states and local unitary operations , 2007, 0705.1746.

[29]  Pan Wei,et al.  Quantum Secure Direct Communication Based on Authentication , 2008 .

[30]  Hwayean Lee,et al.  Quantum direct communication with authentication , 2005, quant-ph/0512051.

[31]  Wang Yan,et al.  Secure Quantum Key Distribution Network with Bell States and Local Unitary Operations , 2005 .

[32]  P. Xue,et al.  Conditional efficient multiuser quantum cryptography network , 2002 .

[33]  Liu Dan,et al.  A New Quantum Secure Direct Communication Scheme with Authentication , 2010 .

[34]  S. Barnett,et al.  Multi-user Quantum Cryptography on Optical Networks , 1995 .