Efficient semiquantum key distribution without entanglement

Semiquantum cryptography was proposed to deal with the issue that some players require only partial quantum power, such as preparing or measuring quantum states in the classical basis, which simplifies the implementations of quantum cryptography. However, the efficiency of the existing semiquantum cryptographic protocols was relatively low from a practical point of view. In this paper, we devise improved semiquantum key distribution (SQKD) protocols to improve the efficiency of SQKD protocols. Our improved SQKD protocols utilize the discarded X-SIFT bits in the previous SQKD protocols for improving the efficiency of previous SQKD protocols (Boyer et al. in Phys Rev Lett 99:140501, 2007; Zou et al. in Phys Rev A 79:052312, 2009). Besides, the efficiency of our new protocols can be made asymptotically close to 100% by letting players select their actions asymmetrically. We prove the information theoretical secure of the proposed SQKD protocols against the most general attacks. Our security proof is suitable for the single-state SQKD protocol (Zou et al. in Phys Rev A 79:052312, 2009).

[1]  Quan Zhang,et al.  Semiquantum Key Distribution Using Entangled States , 2011, 1104.1267.

[2]  Yuan-hua Li,et al.  Semi-quantum information splitting using GHZ-type states , 2013, Quantum Inf. Process..

[3]  Walter O. Krawec Restricted attacks on semi-quantum key distribution protocols , 2014, Quantum Inf. Process..

[4]  Daowen Qiu,et al.  Three-step semiquantum secure direct communication protocol , 2014, Science China Physics, Mechanics & Astronomy.

[5]  R. Renner,et al.  Information-theoretic security proof for quantum-key-distribution protocols , 2005, quant-ph/0502064.

[6]  Shengyu Zhang,et al.  Semiquantum key distribution without invoking the classical party’s measurement capability , 2015, Quantum Information Processing.

[7]  Walter O. Krawec,et al.  Semi-Quantum Key Distribution with Limited Measurement Capabilities , 2018, 2018 International Symposium on Information Theory and Its Applications (ISITA).

[8]  Daowen Qiu,et al.  Quantum secret sharing with classical Bobs , 2013 .

[9]  Walter O. Krawec Mediated semiquantum key distribution , 2014, 1411.6024.

[10]  Walter O. Krawec Practical security of semi-quantum key distribution , 2018, Commercial + Scientific Sensing and Imaging.

[11]  Daowen Qiu,et al.  A Novel Semi-Quantum Secret Sharing Scheme of Specific Bits , 2015, International Journal of Theoretical Physics.

[12]  Tal Mor,et al.  Quantum Key Distribution with Classical Bob , 2007, 2007 First International Conference on Quantum, Nano, and Micro Technologies (ICQNM'07).

[13]  Tal Mor,et al.  A New and Feasible Protocol for Semi-quantum Key Distribution , 2017, ArXiv.

[14]  Tal Mor,et al.  Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol , 2018, Entropy.

[15]  Qin Li,et al.  Semiquantum secret sharing using entangled states , 2009, 0906.1866.

[16]  Walter O. Krawec Quantum key distribution with mismatched measurements over arbitrary channels , 2016, Quantum Inf. Comput..

[17]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[18]  Hua Lu,et al.  QUANTUM KEY DISTRIBUTION WITH CLASSICAL ALICE , 2008 .

[19]  Wei Zhang,et al.  Single-state semi-quantum key distribution protocol and its security proof , 2016, International Journal of Quantum Information.

[20]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[21]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[22]  Quan Zhang,et al.  SEMIQUANTUM SECRET SHARING USING TWO-PARTICLE ENTANGLED STATE , 2011 .

[23]  Lov K. Grover Quantum Mechanics Helps in Searching for a Needle in a Haystack , 1997, quant-ph/9706033.

[24]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[25]  Walter O. Krawec Security proof of a semi-quantum key distribution protocol , 2014, 2015 IEEE International Symposium on Information Theory (ISIT).

[26]  Hoi-Kwong Lo,et al.  Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security , 2004, Journal of Cryptology.

[27]  Ming-Ming Wang,et al.  Semiquantum secure direct communication with authentication based on single-photons , 2019, International Journal of Quantum Information.

[28]  Wei Zhang,et al.  Security of a single-state semi-quantum key distribution protocol , 2016, Quantum Inf. Process..

[29]  Tan Yong-Gang,et al.  Quantum key distribution series network protocol with M-classical Bobs , 2009 .

[30]  Ran Gelles,et al.  Semi-Quantum Key Distribution , 2008, ArXiv.

[31]  R. Renner,et al.  An information-theoretic security proof for QKD protocols , 2005, quant-ph/0502064.

[32]  Daowen Qiu,et al.  Semiquantum-key distribution using less than four quantum states , 2009 .