Secure networking quantum key distribution schemes with Greenberger–Horne–Zeilinger states

A novel approach to quantum cryptography to be called NQKD, networking quantum key distribution, has been developed for secure quantum communication schemes on the basis of the complementary relations of entanglement Greenberger–Horne–Zeilinger (GHZ) triplet states. One scheme distributes the private key among legal participants in a probabilistic manner, while another transmits the deterministic message with some certainty. Some decoy photons are employed for preventing a potential eavesdropper from attacking quantum channels. The present schemes are efficient as there exists an elegant method for key distributions. The security of the proposed schemes is exactly guaranteed by the entanglement of the GHZ quantum system, which is illustrated in security analysis.

[1]  Paul D. Townsend,et al.  Quantum cryptography on multiuser optical fibre networks , 1997, Nature.

[2]  Guihua Zeng Reply to “Comment on ‘Arbitrated quantum-signature scheme’ ” , 2008 .

[3]  S. Barnett,et al.  Multi-user Quantum Cryptography on Optical Networks , 1995 .

[4]  H. Chau Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate , 2002 .

[5]  I. Chuang,et al.  Quantum Computation and Quantum Information: Introduction to the Tenth Anniversary Edition , 2010 .

[6]  V. Karimipour,et al.  Quantum secret sharing based on reusable GHZ states as secure carriers , 2002, quant-ph/0204124.

[7]  H. Weinfurter,et al.  Observation of three-photon Greenberger-Horne-Zeilinger entanglement , 1998, quant-ph/9810035.

[8]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[9]  Guihua Zeng,et al.  Arbitrated quantum-signature scheme , 2001, quant-ph/0109007.

[10]  G. Long,et al.  Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.

[11]  H. J. Kimble,et al.  Reversible State Transfer Between Light and a Single Trapped Atom , 2007 .

[12]  Fuguo Deng,et al.  Bidirectional quantum key distribution protocol with practical faint laser pulses , 2004 .

[13]  Deng Fu-Guo,et al.  Efficient Quantum Cryptography Network without Entanglement and Quantum Memory , 2006 .

[14]  C. P. Sun,et al.  Quasi-spin-wave quantum memories with a dynamical symmetry. , 2003, Physical review letters.

[15]  Jian-Wei Pan,et al.  Efficient multiparty quantum-secret-sharing schemes , 2004, quant-ph/0405179.

[16]  N. Gisin,et al.  Experimental demonstration of quantum secret sharing , 2001 .

[17]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[18]  Guihua Zeng,et al.  Identity verification in quantum key distribution , 2000 .

[19]  A. D. Boozer,et al.  Reversible state transfer between light and a single trapped atom. , 2007, Physical review letters.

[20]  Biham,et al.  Quantum cryptographic network based on quantum memories. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[21]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[22]  P. Xue,et al.  Conditional efficient multiuser quantum cryptography network , 2002 .