Single-state semi-quantum key distribution protocol and its security proof

Semi-quantum key distribution (SQKD) can share secret keys by using less quantum resource than its fully quantum counterparts, and this likely makes SQKD become more practical and realizable. In this paper, we present a new SQKD protocol by introducing the idea of B92 protocol in fully quantum cryptography into SQKD. In this protocol, the sender Alice just sends one quantum state to the classical Bob and Bob just prepares a fixed state in the preparation process. It is much simpler than the existing SQKD and potentially much easier to be implemented. It can be seen as a semi-quantum version of B92 protocol, compared to the protocol BKM07 as the semi-quantum version of BB84 in fully quantum cryptography. We verify that it is more efficient than the existing single-state SQKD protocols by introducing an efficiency parameter. Specifically, we prove it is secure against a restricted collective attack by computing a lower bound of the key rate in the asymptotic scenario. Then we can find a threshold value of errors such that for all error rates less than this value, the secure key can be definitely established between the legitimate users definitely. We make an illustration of how to compute the threshold value in case the reverse channel is a depolarizing one with parameter [Formula: see text]. Though the threshold value is a little smaller than those of some existing SQKD protocols, it can be comparable to the B92 protocol in fully quantum cryptography.

[1]  Masato Koashi,et al.  Unconditionally secure key distribution based on two nonorthogonal states. , 2003, Physical review letters.

[2]  R. Renner,et al.  An information-theoretic security proof for QKD protocols , 2005, quant-ph/0502064.

[3]  R. Renner,et al.  Information-theoretic security proof for quantum-key-distribution protocols , 2005, quant-ph/0502064.

[4]  J-C Boileau,et al.  Unconditional security of a three state quantum key distribution protocol. , 2004, Physical review letters.

[5]  A. Winter,et al.  Distillation of secret key and entanglement from quantum states , 2003, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[6]  Hoi-Kwong Lo,et al.  A Survey on Quantum Cryptographic Protocols and Their Security , 2007, Canadian Conference on Electrical and Computer Engineering.

[7]  Quantum Key Distribution with Classical Bob , 2007, 2007 First International Conference on Quantum, Nano, and Micro Technologies (ICQNM'07).

[8]  Hua Lu,et al.  QUANTUM KEY DISTRIBUTION WITH CLASSICAL ALICE , 2008 .

[9]  Ran Gelles,et al.  Semi-Quantum Key Distribution , 2008, ArXiv.

[10]  Daowen Qiu,et al.  Semiquantum-key distribution using less than four quantum states , 2009 .

[11]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[12]  Y. P. Zhang,et al.  Study of runaway electron behaviour during electron cyclotron resonance heating in the HL-2A Tokamak , 2009 .

[13]  Zhiwei Sun,et al.  QUANTUM KEY DISTRIBUTION WITH LIMITED CLASSICAL BOB , 2011, 1106.4615.

[14]  Takayuki Miyadera RELATION BETWEEN INFORMATION AND DISTURBANCE IN QUANTUM KEY DISTRIBUTION PROTOCOL WITH CLASSICAL ALICE , 2011 .

[15]  Quan Zhang,et al.  Semiquantum Key Distribution Using Entangled States , 2011, 1104.1267.

[16]  Ryutaroh Matsumoto,et al.  Improved asymptotic key rate of the B92 protocol , 2013, 2013 IEEE International Symposium on Information Theory.

[17]  Walter O. Krawec Restricted attacks on semi-quantum key distribution protocols , 2014, Quantum Inf. Process..

[18]  Chun-Wei Yang,et al.  Authenticated semi-quantum key distribution protocol using Bell states , 2014, Quantum Inf. Process..

[19]  Walter O. Krawec Mediated semiquantum key distribution , 2014, 1411.6024.

[20]  Shengyu Zhang,et al.  Semiquantum key distribution without invoking the classical party’s measurement capability , 2015, Quantum Information Processing.

[21]  Walter O. Krawec Security proof of a semi-quantum key distribution protocol , 2014, 2015 IEEE International Symposium on Information Theory (ISIT).

[22]  Shengyu Zhang,et al.  Semiquantum key distribution with secure delegated quantum computation , 2015, Scientific Reports.

[23]  Walter O. Krawec Security of a semi-quantum protocol where reflections contribute to the secret key , 2015, Quantum Inf. Process..

[24]  Walter O. Krawec Quantum key distribution with mismatched measurements over arbitrary channels , 2016, Quantum Inf. Comput..

[25]  Dafa Li,et al.  SLOCC classification of n qubits invoking the proportional relationships for spectrums and standard Jordan normal forms , 2017, Quantum Inf. Process..

[26]  André Souto,et al.  Quantum key distribution with quantum walks , 2017, Quantum Inf. Process..

[27]  Walter O. Krawec Key-Rate Bound of a Semi-Quantum Protocol Using an Entropic Uncertainty Relation , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).