Efficient and Secure Measure-Resend Authenticated Semi-Quantum Key Distribution Protocol against Reflecting Attack
Abstract
:1. Introduction
- (1)
- Chang et al.’s ASQKD protocol is more practical because it uses single qubits instead of Bell states.
- (2)
- Chang et al.’s ASQKD protocol reduces the number of pre-shared keys.
- (3)
- Chang et al. showed that the proposed ASQKD protocol is robust under a collective attack.
- (4)
- It is significantly more efficient than some existing ASQKD protocols.
2. Review of Chang et al.’s ASQKD Protocol
- Step C1.
- Alice chooses a binary string of length n as the session key SK. Based on the pre-share key , Alice selects a hash function from a pool of universal hash functions. She hashes SK using the selected hash function , and obtains the m-bit hash value, . Then, Alice concatenates SK and the hashed value to form , whose length is n + m bits.
- Step C2.
- Alice generates a binary string, . Based on the pre-shared key , Alice inserts into . For example, if , is inserted before . Otherwise, is inserted before . Thus, Alice obtains a new binary string, whose length is 2n + 2m. Alice converts the binary string into a sequence of single photons, , according to the following rules: binary bits {0, 1} in encode into the Z-basis , and binary bits {0, 1} in encode into the X-basis . Then, Alice sends to Bob one bit at a time through a quantum channel.
- Step C3.
- Bob receives the qubits and distinguishes from based on . For , Bob measures the Z-basis and resends the same single photon as the measurement result. As for , Bob reflects without any interference back to Alice.
- Step C4.
- Alice receives a sequence of single photons, , from Bob and measures in the Z-basis, and in the X-basis. Alice checks the measurement results and to prevent an eavesdropping attack. Bob checks to identify the secret key sent by Alice.
- Step C5.
- For completion of the eavesdropping check, Alice and Bob must both send a message to inform each other regarding the checking result via the authenticated channel. If the transmission is secured, the pre-shared keys are recycled; otherwise, the results and the pre-shared key should be abandoned.
3. Security Issues in Chang et al.’s ASQKD Protocol
3.1. Using an Authenticated Classical Channel in ASQKD Protocol
3.2. Reflecting Attack on Chang et al.’s ASQKD Protocol
4. Proposed ASQKD Protocol
- Step 1.
- Alice chooses a binary string of length n as the session key SK. Based on the pre-share key , Alice selects a hash function from a pool of universal hash functions. She hashes SK using the selected hash function , and obtains the m-bit hash value, . Then, Alice concatenates SK and the hashed value to form , whose length is n + m bits.
- Step 2.
- Alice generates the binary strings and . Based on the pre-shared key , Alice combines , and into a binary sequence, . For example, if , is placed in , if , is placed in , and if , is placed in . Thus, Alice obtains a binary sequence, , whose length is . Alice converts the binary sequence into a sequence of single photons, according to the following rules: (1) binary bits in encode into the Z-basis , and (2) binary bits in and encode into the X-basis . Then, Alice sends to Bob one bit at a time through a quantum channel.
- Step 3.
- Bob receives single photons and distinguishes between , and based on . For each received single photon belonging to or , Bob measures the single photon in the Z-basis and resends the same single photon in the Z-basis based on the measurement result. Otherwise, the received single photon belongs to and Bob reflects a single photon without any interference back to Alice.
- Step 4.
- When Alice receives a sequence of single photons, , from Bob, she measures the photons belonging to in the Z-basis and the photons belonging to or in the X-basis. Alice can perform the eavesdropping check as follows: (1) The measurement results of and are equal to those of the initial states and . (2) The measurement result of is not completely equal to that of the initial state (i.e., the measurement result is random). Meanwhile, Bob also calculates to identify the secret key sent by Alice. If all the checking steps were passed, the protocol is completed. Otherwise, the communication is aborted.
5. Security Analysis
5.1. Security against the Reflecting Attack
5.2. Security against the Ordinary Eavesdropping
5.3. Security against the Collective Attack
5.4. Security against the Intercept and Resend Attack
5.5. Security against the Measure and Resend Attack
6. Efficiency Analysis
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Bennett, C.H.; Brassard, G. Quantum Cryptography: Public Key Distribution and Coin Tossing. In Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 9–12 December 1984; pp. 175–179. [Google Scholar]
- Bruß, D. Optimal Eavesdropping in Quantum Cryptography with Six States. Phys. Rev. Lett. 1998, 81, 3018–3021. [Google Scholar] [CrossRef] [Green Version]
- Cerf, N.J.; Bourennane, M.; Karlsson, A.; Gisin, N. Security of Quantum Key Distribution Using d-Level Systems. Phys. Rev. Lett. 2002, 88, 127902. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Long, G.; Liu, X. Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 2002, 65, 032302. [Google Scholar] [CrossRef] [Green Version]
- Grosshans, F.; Van Assche, G.; Wenger, J.; Brouri, R.; Cerf, N.J.; Grangier, P. Quantum key distribution using gaussian-modulated coherent states. Nature 2003, 421, 238. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Hwang, W.-Y. Quantum Key Distribution with High Loss: Toward Global Secure Communication. Phys. Rev. Lett. 2003, 91, 057901. [Google Scholar] [CrossRef] [Green Version]
- Scarani, V.; Acín, A.; Ribordy, G.; Gisin, N. Quantum Cryptography Protocols Robust against Photon Number Splitting Attacks for Weak Laser Pulse Implementations. Phys. Rev. Lett. 2004, 92, 057901. [Google Scholar] [CrossRef] [Green Version]
- Lo, H.K.; Ma, X.F.; Chen, K. Decoy state quantum key distribution. Phys. Rev. Lett. 2005, 94, 4. [Google Scholar] [CrossRef] [Green Version]
- Zhang, Z.J.; Man, Z.X.; Shi, S.H. An efficient multiparty quantum key distribution scheme. Int. J. Quant. Infor. 2005, 3, 555–560. [Google Scholar] [CrossRef]
- Hwang, T.; Lee, K.C.; Li, C.M. Provably secure three-party authenticated quantum key distribution protocols. IEEE Trans. Dependable Secur. Comput. 2007, 4, 71–80. [Google Scholar] [CrossRef]
- Li, X.H.; Deng, F.G.; Zhou, H.Y. Efficient quantum key distribution over a collective noise channel. Phys. Rev. A 2008, 78, 022321. [Google Scholar] [CrossRef] [Green Version]
- Lo, H.-K.; Curty, M.; Qi, B. Measurement-Device-Independent Quantum Key Distribution. Phys. Rev. Lett. 2012, 108, 130503. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Lucamarini, M.; Patel, K.A.; Dynes, J.F.; Fröhlich, B.; Sharpe, A.W.; Dixon, A.R.; Yuan, Z.L.; Penty, R.V.; Shields, A.J. Efficient decoy-state quantum key distribution with quantified security. Opt. Express 2013, 21, 24550–24565. [Google Scholar] [CrossRef] [PubMed]
- Boyer, M.; Kenigsberg, D.; Mor, T. Quantum Key Distribution with Classical Bob. Phys. Rev. Lett. 2007, 99, 140501. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Boyer, M.; Gelles, R.; Kenigsberg, D.; Mor, T. Semiquantum key distribution. Phys. Rev. A 2009, 79, 032341. [Google Scholar] [CrossRef] [Green Version]
- Zou, X.; Qiu, D.; Li, L.; Wu, L.; Li, L. Semiquantum-key distribution using less than four quantum states. Phys. Rev. A 2009, 79, 052312. [Google Scholar] [CrossRef]
- Wang, J.; Zhang, S.; Zhang, Q.; Tang, C.J. Semiquantum Key Distribution Using Entangled States. Chinese Phys. Lett. 2011, 28, 100301. [Google Scholar] [CrossRef] [Green Version]
- Boyer, M.; Gelles, R.; Mor, T. Attacks on fixed-apparatus quantum-key-distribution schemes. Phys. Rev. A 2014, 90, 012329. [Google Scholar] [CrossRef] [Green Version]
- Krawec, W.O. Restricted attacks on semi-quantum key distribution protocols. Quantum Inf. Process. 2014, 13, 2417–2436. [Google Scholar] [CrossRef]
- Krawec, W.O. Mediated semiquantum key distribution. Phys. Rev. A 2015, 91, 032323. [Google Scholar] [CrossRef] [Green Version]
- Zou, X.; Qiu, D.; Zhang, S.; Mateus, P. Semiquantum key distribution without invoking the classical party’s measurement capability. Quantum Inf. Process. 2015, 14, 2981–2996. [Google Scholar] [CrossRef]
- Krawec, W.O. Security of a semi-quantum protocol where reflections contribute to the secret key. Quantum Inf. Process. 2016, 15, 2067–2090. [Google Scholar] [CrossRef] [Green Version]
- Li, Q.; Chan, W.H.; Zhang, S. Semiquantum key distribution with secure delegated quantum computation. Sci. Rep. 2016, 6, 19898. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Boyer, M.; Katz, M.; Liss, R.; Mor, T. Experimentally feasible protocol for semiquantum key distribution. Phys. Rev. A 2017, 96, 062335. [Google Scholar] [CrossRef] [Green Version]
- Boyer, M.; Liss, R.; Mor, T. Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol. Entropy 2018, 20, 536. [Google Scholar] [CrossRef] [Green Version]
- Liu, Z.-R.; Hwang, T. Mediated Semi-Quantum Key Distribution Without Invoking Quantum Measurement. Ann. Phys. 2018, 530, 1700206. [Google Scholar] [CrossRef]
- Zhang, W.; Qiu, D.; Mateus, P. Security of a single-state semi-quantum key distribution protocol. Quantum Inf. Process. 2018, 17, 135. [Google Scholar] [CrossRef] [Green Version]
- Zhu, K.-N.; Zhou, N.-R.; Wang, Y.-Q.; Wen, X.-J. Semi-Quantum Key Distribution Protocols with GHZ States. Int. J. Theor. Phys. 2018, 57, 3621–3631. [Google Scholar] [CrossRef]
- Amer, O.; Krawec, W.O. Semiquantum key distribution with high quantum noise tolerance. Phys. Rev. A 2019, 100, 022319. [Google Scholar] [CrossRef] [Green Version]
- Wang, M.-M.; Gong, L.-M.; Shao, L.-H. Efficient semiquantum key distribution without entanglement. Quantum Inf. Process. 2019, 18, 260. [Google Scholar] [CrossRef]
- Zhou, N.-R.; Zhu, K.-N.; Zou, X.-F. Multi-Party Semi-Quantum Key Distribution Protocol with Four-Particle Cluster States. Ann. Phys. 2019, 531, 1800520. [Google Scholar] [CrossRef]
- Boyer, M.; Liss, R.; Mor, T. Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis. Theor. Comput. Sci. 2020, 801, 96–109. [Google Scholar] [CrossRef]
- Hajji, H.; El Baz, M. Qutrit-based semi-quantum key distribution protocol. Quantum Inf. Process. 2021, 20, 4. [Google Scholar] [CrossRef]
- Han, S.; Huang, Y.; Mi, S.; Qin, X.; Wang, J.; Yu, Y.; Wei, Z.; Zhang, Z. Proof-of-principle demonstration of semi-quantum key distribution based on the Mirror protocol. EPJ Quantum Technol. 2021, 8, 28. [Google Scholar] [CrossRef]
- Tsai, C.-W.; Yang, C.-W. Lightweight mediated semi-quantum key distribution protocol with a dishonest third party based on Bell states. Sci. Rep. 2021, 11, 23222. [Google Scholar] [CrossRef]
- He, Q.; Yang, W.; Chen, B.; Huang, L. Cryptanalysis and improvement of the novel semi-quantum secret sharing scheme using entangled states. Mod. Phys. Lett. B 2019, 32, 1950045. [Google Scholar] [CrossRef]
- Xiang, Y.; Liu, J.; Bai, M.-q.; Yang, X.; Mo, Z.-w. Limited Resource Semi-Quantum Secret Sharing Based on Multi-Level Systems. Int. J. Theor. Phys. 2019, 58, 2883–2892. [Google Scholar] [CrossRef]
- Tsai, C.-W.; Chang, Y.-C.; Lai, Y.-H.; Yang, C.-W. Cryptanalysis of limited resource semi-quantum secret sharing. Quantum Inf. Process. 2020, 19, 224. [Google Scholar] [CrossRef]
- Li, C.; Ye, C.; Tian, Y.; Chen, X.-B.; Li, J. Cluster-state-based quantum secret sharing for users with different abilities. Quantum Inf. Process. 2021, 20, 385. [Google Scholar] [CrossRef]
- Yang, C.-W.; Tsai, C.-W. Intercept-and-resend attack and improvement of semiquantum secure direct communication using EPR pairs. Quantum Inf. Process. 2019, 18, 306. [Google Scholar] [CrossRef]
- Rong, Z.; Qiu, D.; Zou, X. Two single-state semi-quantum secure direct communication protocols based on single photons. Int. J. Mod. Phys. B 2020, 34, 2050106. [Google Scholar] [CrossRef]
- Rong, Z.; Qiu, D.; Zou, X. Semi-Quantum Secure Direct Communication Using Entanglement. Int. J. Theor. Phys. 2020, 59, 1807–1819. [Google Scholar] [CrossRef]
- Yang, C.-W. Efficient and secure semi-quantum secure direct communication protocol against double CNOT attack. Quantum Inf. Process. 2020, 19, 50. [Google Scholar] [CrossRef]
- Yang, C.-W.; Tsai, C.-W. Advanced semi-quantum secure direct communication protocol based on bell states against flip attack. Quantum Inf. Process. 2020, 19, 126. [Google Scholar] [CrossRef]
- Yu, K.-F.; Yang, C.-W.; Liao, C.-H.; Hwang, T. Authenticated semi-quantum key distribution protocol using Bell states. Quantum Inf. Process. 2014, 13, 1457–1465. [Google Scholar] [CrossRef]
- Li, C.-M.; Yu, K.-F.; Kao, S.-H.; Hwang, T. Authenticated semi-quantum key distributions without classical channel. Quantum Inf. Process. 2016, 15, 2881–2893. [Google Scholar] [CrossRef]
- Meslouhi, A.; Hassouni, Y. Cryptanalysis on authenticated semi-quantum key distribution protocol using Bell states. Quantum Inf. Process. 2016, 16, 18. [Google Scholar] [CrossRef]
- Zebboudj, S.; Djoudi, H.; Lalaoui, D.; Omar, M. Authenticated semi-quantum key distribution without entanglement. Quantum Inf. Process. 2020, 19, 77. [Google Scholar] [CrossRef]
- Tsai, C.-W.; Yang, C.-W. Lightweight authenticated semi-quantum key distribution protocol without trojan horse attack. Laser Phys. Lett. 2020, 17, 075202. [Google Scholar] [CrossRef]
- Chang, C.-H.; Lu, Y.-C.; Hwang, T. Measure-resend authenticated semi-quantum key distribution with single photons. Quantum Inf. Process. 2021, 20, 272. [Google Scholar] [CrossRef]
- Wootters, W.K.; Zurek, W.H. A Single Quantum Cannot Be Cloned. Nature 1982, 299, 802–803. [Google Scholar] [CrossRef]
Yu et al.’s ASQKD Protocol [45] | Li et al.’s ASQKD Protocol [46] | Zebboudj et al.’s ASQKD Protocol [48] | Chang et al.’ ASQKD Protocol [50] | The Proposed ASQKD Protocol | |
---|---|---|---|---|---|
Semi-quantum environment | Measure-resend | Measure-resend | Measure-resend | Measure-resend | Measure-resend |
Quantum capability of classical participant |
|
|
|
|
|
Quantum resource | Bell states | Bell states, single photons | Single photons | Single photons | Single photons |
Quantum storage | Yes | Yes | No | No | No |
Bell measurement | Yes | Yes | No | No | No |
Communication efficiency | 10% | 11% | 14% | 17% | 14% |
Required pre-shared keys (in bits) | 3n + 3m | 2n + 2m | 2n + 2m | n + 2m | n + 2m |
Hash function | No | Public hash | Public hash | Secret hash | Secret hash |
Vulnerability to reflecting attack | No | No | No | Yes | No |
Required the classical channel | Yes | Yes | Yes | Yes | No |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wang, H.-W.; Tsai, C.-W.; Lin, J.; Huang, Y.-Y.; Yang, C.-W. Efficient and Secure Measure-Resend Authenticated Semi-Quantum Key Distribution Protocol against Reflecting Attack. Mathematics 2022, 10, 1241. https://doi.org/10.3390/math10081241
Wang H-W, Tsai C-W, Lin J, Huang Y-Y, Yang C-W. Efficient and Secure Measure-Resend Authenticated Semi-Quantum Key Distribution Protocol against Reflecting Attack. Mathematics. 2022; 10(8):1241. https://doi.org/10.3390/math10081241
Chicago/Turabian StyleWang, Hung-Wen, Chia-Wei Tsai, Jason Lin, Yu-Yun Huang, and Chun-Wei Yang. 2022. "Efficient and Secure Measure-Resend Authenticated Semi-Quantum Key Distribution Protocol against Reflecting Attack" Mathematics 10, no. 8: 1241. https://doi.org/10.3390/math10081241
APA StyleWang, H. -W., Tsai, C. -W., Lin, J., Huang, Y. -Y., & Yang, C. -W. (2022). Efficient and Secure Measure-Resend Authenticated Semi-Quantum Key Distribution Protocol against Reflecting Attack. Mathematics, 10(8), 1241. https://doi.org/10.3390/math10081241