Security of a single-state semi-quantum key distribution protocol

Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some “classical” or “semi-quantum” operations, which potentially makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channel. The eavesdropper has two opportunities to intercept the quantum states transmitted in the quantum communication stage. It may allow the eavesdropper to get more information and make the security analysis more complicated. In the past ten years, many semi-quantum key distribution protocols have been proposed and proved to be robust. However, there are few works concerning their unconditional security. It is doubted that how secure the semi-quantum ones are and how much noise they can tolerate to establish a secure secret key. In this paper, we prove the unconditional security of a single-state semi-quantum key distribution protocol proposed by Zou et al. (Phys Rev A 79:052312, 2009). We present a complete proof from information theory aspect by deriving a lower bound of the protocol’s key rate in the asymptotic scenario. Using this bound, we figure out an error threshold value such that for all error rates that are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Otherwise, the users should abort the protocol. We make an illustration of the protocol under the circumstance that the reverse quantum channel is a depolarizing one with parameter q. Additionally, we compare the error threshold value with some full quantum protocols and several existing semi-quantum ones whose unconditional security proofs have been provided recently.

[1]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[2]  R. Renner,et al.  Information-theoretic security proof for quantum-key-distribution protocols , 2005, quant-ph/0502064.

[3]  A Cabello Quantum key distribution in the Holevo limit. , 2000, Physical review letters.

[4]  Chun-Wei Yang,et al.  Authenticated semi-quantum key distribution protocol using Bell states , 2014, Quantum Inf. Process..

[5]  Shengyu Zhang,et al.  Semiquantum key distribution without invoking the classical party’s measurement capability , 2015, Quantum Inf. Process..

[6]  Takayuki Miyadera RELATION BETWEEN INFORMATION AND DISTURBANCE IN QUANTUM KEY DISTRIBUTION PROTOCOL WITH CLASSICAL ALICE , 2011 .

[7]  R. Renner,et al.  A Generic Security Proof for Quantum Key Distribution , 2004, quant-ph/0402131.

[8]  Quan Zhang,et al.  Semiquantum Key Distribution Using Entangled States , 2011, 1104.1267.

[9]  Walter O. Krawec Security of a semi-quantum protocol where reflections contribute to the secret key , 2015, Quantum Inf. Process..

[10]  Mark M. Wilde,et al.  From Classical to Quantum Shannon Theory , 2011, ArXiv.

[11]  Shun Watanabe,et al.  Tomography increases key rates of quantum-key-distribution protocols , 2008, 0802.2419.

[12]  Hua Lu,et al.  QUANTUM KEY DISTRIBUTION WITH CLASSICAL ALICE , 2008 .

[13]  Shengyu Zhang,et al.  Semiquantum key distribution with secure delegated quantum computation , 2015, Scientific Reports.

[14]  Tan Yong-Gang,et al.  Quantum key distribution series network protocol with M-classical Bobs , 2009 .

[15]  Hoi-Kwong Lo,et al.  Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security , 2004, Journal of Cryptology.

[16]  R. Renner,et al.  A de Finetti representation for finite symmetric quantum states , 2004, quant-ph/0410229.

[17]  Simon J. D. Phoenix,et al.  Eavesdropping Strategies and Rejected-data Protocols in Quantum Cryptography , 1993 .

[18]  Shun Watanabe,et al.  Narrow basis angle doubles secret key in the BB84 protocol , 2010 .

[19]  Chitra Shukla,et al.  Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue , 2017, Quantum Inf. Process..

[20]  Walter O. Krawec Mediated semiquantum key distribution , 2014, 1411.6024.

[21]  B Kraus,et al.  Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication. , 2004, Physical review letters.

[22]  Walter O. Krawec An improved asymptotic key rate bound for a mediated semi-quantum key distribution protocol , 2015, Quantum Inf. Comput..

[23]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[24]  Tal Mor,et al.  Quantum Key Distribution with Classical Bob , 2007, ICQNM.

[25]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[26]  Nicolas Gisin,et al.  Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks , 2004 .

[27]  Walter O. Krawec Quantum key distribution with mismatched measurements over arbitrary channels , 2016, Quantum Inf. Comput..

[28]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[29]  R. Renner,et al.  An information-theoretic security proof for QKD protocols , 2005, quant-ph/0502064.

[30]  Daowen Qiu,et al.  Semiquantum-key distribution using less than four quantum states , 2009 .

[31]  Thierry Paul,et al.  Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.

[32]  Walter O. Krawec Security proof of a semi-quantum key distribution protocol , 2014, 2015 IEEE International Symposium on Information Theory (ISIT).

[33]  Shun Watanabe,et al.  Key Rate Available from Mismatched Measurements in the BB84 Protocol and the Uncertainty Principle , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[34]  Hoi-Kwong Lo,et al.  Security proof of a three-state quantum-key-distribution protocol without rotational symmetry , 2006 .

[35]  Zhiwei Sun,et al.  QUANTUM KEY DISTRIBUTION WITH LIMITED CLASSICAL BOB , 2011, 1106.4615.

[36]  Ryutaroh Matsumoto,et al.  Improved asymptotic key rate of the B92 protocol , 2013, 2013 IEEE International Symposium on Information Theory.

[37]  Walter O. Krawec Restricted attacks on semi-quantum key distribution protocols , 2014, Quantum Inf. Process..

[38]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[39]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[40]  Walter O. Krawec A genetic algorithm to analyze the security of quantum cryptographic protocols , 2016, 2016 IEEE Congress on Evolutionary Computation (CEC).

[41]  A. Winter,et al.  Distillation of secret key and entanglement from quantum states , 2003, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences.