Authenticated quantum key agreement based on cluster states against collective noise DOI
Li Zhang, Zhaowei Han,

Qiuyu Ma

и другие.

Physica Scripta, Год журнала: 2024, Номер 99(7), С. 075104 - 075104

Опубликована: Май 28, 2024

Abstract Quantum key agreement (QKA) is an important branch of quantum cryptography. Particles are easily affected by noise in channel transmission, which provides a cover for eavesdropper Eve to attack maliciously and eventually leads the protocol failure. In this paper, based on properties four-particle cluster states their entanglement swapping, two authenticated two-party QKA protocols that can resist collective (collective-dephasing collective-rotation noise) using CZ, CNOT, Pauli operations designed, respectively. Besides, both parties authenticate each other’s identities, makes our more secure. addition, security analysis shows these various attacks from inside outside, such as participant entangle-measure attacks.

Язык: Английский

Multi-Party Quantum Key Agreement with Four-Qubit Cluster States Immune to Collusive Attack DOI
Mengqing Yang, Hao Cao,

Zepeng Zhuo

и другие.

International Journal of Theoretical Physics, Год журнала: 2024, Номер 63(2)

Опубликована: Фев. 16, 2024

Язык: Английский

Процитировано

6

A quantum solution to blind millionaire problem with only single-particle states DOI Creative Commons

Kunchi Hou,

Huixin Sun,

Yao Yao

и другие.

EPJ Quantum Technology, Год журнала: 2025, Номер 12(1)

Опубликована: Янв. 23, 2025

Язык: Английский

Процитировано

0

Mutual authentication quantum key agreement protocol with single-particle measurement DOI Creative Commons
Yang Hao,

Zepu Yi,

Songfeng Lu

и другие.

Frontiers in Physics, Год журнала: 2025, Номер 13

Опубликована: Март 25, 2025

In this paper, a mutual authentication quantum key agreement protocol with single-particle measurement is proposed. The participants can authenticate each other’s identity through their secret information and the entanglement property of Bell states. After phase, negotiate private equal contribution. We prove that proposed scheme unconditional security. comparison to previous protocols, method utilizes states as resource in both stages. It requires without need for measurements or involvement trusted semi-trusted other participants. Additionally, our demonstrates significant advantages terms qubit efficiency.

Язык: Английский

Процитировано

0

Single-State Multi-Party Quantum Key Agreement with Single-Particle Measurement DOI Creative Commons
Hao Yang, Dunbo Cai, Ling Qian

и другие.

Entropy, Год журнала: 2025, Номер 27(4), С. 405 - 405

Опубликована: Апрель 10, 2025

In this study, we propose a single-state multi-party quantum key agreement (MQKA) protocol with single-particle measurement. Firstly, three-party measurement is introduced, followed by security analysis that validated its capability to resist potential internal and external attacks. Furthermore, utilize multi-particle entangled states present version of the comparison previous MQKA protocols, our approach presents following advantages: it employs one kind state as resource; eliminates need for entanglement swapping techniques, unitary operations, or pre-shared keys between participants; uses only X basis Z basis; transmits fewer qubits; consumes has higher qubit efficiency.

Язык: Английский

Процитировано

0

Authenticated quantum key agreement based on cluster states against collective noise DOI
Li Zhang, Zhaowei Han,

Qiuyu Ma

и другие.

Physica Scripta, Год журнала: 2024, Номер 99(7), С. 075104 - 075104

Опубликована: Май 28, 2024

Abstract Quantum key agreement (QKA) is an important branch of quantum cryptography. Particles are easily affected by noise in channel transmission, which provides a cover for eavesdropper Eve to attack maliciously and eventually leads the protocol failure. In this paper, based on properties four-particle cluster states their entanglement swapping, two authenticated two-party QKA protocols that can resist collective (collective-dephasing collective-rotation noise) using CZ, CNOT, Pauli operations designed, respectively. Besides, both parties authenticate each other’s identities, makes our more secure. addition, security analysis shows these various attacks from inside outside, such as participant entangle-measure attacks.

Язык: Английский

Процитировано

1