An efficient multiparty quantum key distribution scheme

We propose a quantum key distribution (QKD) scheme in which four parties can simultaneously share a secret key via optical device. The participants divide the communication into two modes, namely, detecting mode and message mode. Taking advantage of controlled secret short key technology, the participants together can achieve the detecting mode or the message mode by switching between their two sets of optical devices. In the detecting mode, the key distributer Alice utilizes a single-photon state resource and two beam splitters and the other three participants Bob, Charlie and Dick use first-type devices to detect the superposition of vacuum and single-particle states. Hence, any eavesdropping can be found by using a variant of Bell's inequality. In the message mode, Alice uses a two-photon Bell-state resource and two polarization beam splitters instead of the single-particle state resource and beam splitters used in the detecting mode and the other three participants use second-type devices to detect photons. In this case, the secret key can be successfully distributed from Alice to the other three ones. Moreover, the present four-party QKD scheme can be generalized to a 2n-party QKD scheme by using n-photon Greenberg-Horne-Zeilinger.

[1]  Fuguo Deng,et al.  Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.

[2]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[3]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[4]  P. Xue,et al.  Conditional efficient multiuser quantum cryptography network , 2002 .

[5]  Masato Koashi,et al.  Quantum Cryptography Based on Split Transmission of One-Bit Information in Two Steps , 1997 .

[6]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[7]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[8]  Jun Yu Li,et al.  Quantum key distribution scheme with orthogonal product states , 2001, quant-ph/0102060.

[9]  Won Young Hwang,et al.  Quantum cryptography without public announcement of bases , 1997 .

[10]  Jaewan Kim,et al.  Quantum cryptography using single-particle entanglement , 2003 .

[11]  K. Matsumoto,et al.  Shor-Preskill-type security proof for quantum key distribution without public announcement of bases , 2003 .

[12]  M. Ardehali Quantum cryptography based on wheeler's delayed choice experiment , 1995 .

[13]  Yoav Sagi Scheme for generating Greenberger-Horne-Zeilinger-type states of n photons , 2003 .

[14]  G. Long,et al.  Controlled order rearrangement encryption for quantum key distribution , 2003, quant-ph/0308172.

[15]  Goldenberg,et al.  Quantum cryptography based on orthogonal states. , 1995, Physical review letters.

[16]  Gisin,et al.  Quantum cryptography with coherent states. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[17]  G. Long,et al.  Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.

[18]  H. Bechmann-Pasquinucci,et al.  Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography , 1998, quant-ph/9807041.

[19]  K. Boström,et al.  Deterministic secure direct communication using entanglement. , 2002, Physical review letters.

[20]  Jian-Wei Pan,et al.  Efficient multiparty quantum-secret-sharing schemes , 2004, quant-ph/0405179.