簡易檢索 / 詳目顯示

研究生: 顧俊
Gu, Jun
論文名稱: 具密鑰回收之輕量化認證式量子密鑰分配
Lightweight authenticated quantum key distributions with key recycling
指導教授: 黃宗立
Hwang, Tzone-Lih
學位類別: 博士
Doctor
系所名稱: 電機資訊學院 - 資訊工程學系
Department of Computer Science and Information Engineering
論文出版年: 2021
畢業學年度: 109
語文別: 英文
論文頁數: 231
中文關鍵詞: 量子密碼學輕量化認證式量子密鑰分發量子密鑰回收傳輸時間成本集合攻擊分析
外文關鍵詞: Quantum Cryptography, Lightweight authenticated quantum key distribution, Quantum key recycling, Transmission time cost, Collective attack analysis
相關次數: 點閱:102下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 量子密鑰分配協定可以幫助參與者們分配無條件安全的密鑰以用於進一步通訊,諸如BB84和E91之類的量子密鑰分配協定在量子密碼學中起著重要的作用。然而,大多現有的量子密鑰分配協定在實現上有兩個難點。首先,他們要求參與者擁有強大的量子能力,例如量子聯合運算,量子寄存器等。因此,許多量子能力有限的參與者無法參與到這些量子密鑰分配協定之中。其次,大多數現有的量子密鑰分配協定都使用了一種假設的認證式傳統通道,但該通道實際上並不存在。
    為了同時解決上述兩個問題,本論文提出了幾種具有密鑰回收功能的輕量化認證式量子密鑰分配協定。文中首先分析了輕量化參與者可能具有的各種輕量化量子能力組合,然後針對每個組合提出相應的輕量化認證式量子密鑰分配協定。利用這些提出的協定,僅具備有限量子能力的參與者們不再需要為了實施某個特定的量子密鑰分配協定而去增加或改變其原有的量子能力,他們根據自己所具備的量子能力選擇合適的協定來分配密鑰即可。並且,所有提出的協定都使用了預共享密鑰來幫助參與者們彼此之間進行身份認證,從而消除了對假設傳統認證通道的需求。此外,為了幫助彼此之間沒有預先共享密鑰的參與者能夠參與協定,本文對所提出的協定都給出了具有間接認證能力的版本。在這些版本中,參與者可以藉助半誠實的第三方來認證和分配密鑰,而這些第三方不會獲得任何有關最終所分配密鑰的資訊。最後,文中的密鑰回收率分析表明,即使發現被竊聽,本文所提出之協定中使用的預共享密鑰大部分也可以被回收以供再次使用。

    Quantum key distribution protocols can help the involved participants share unconditionally secure keys for further communication. The quantum key distribution protocols such as BB84 and E91 play an important role in quantum cryptography. However, most of the existing quantum key distribution protocols have two difficulties in implementation. First, the involved participants are frequently required to have heavy quantum capabilities, such as quantum joint operation, quantum register, and so on. Hence, many participants who just have limited quantum capabilities cannot be involved in the quantum key distribution protocols. Second, a hypothetical authenticated classical channel is used in most of the existing quantum key distribution protocols and this assumed channel does not exist in reality.
    To solve the above problems at the same time, this thesis proposes several lightweight authenticated quantum key distribution protocols with key recycling. This thesis first analyzes various combinations of lightweight quantum capabilities that a lightweight participant may have. Subsequently, for each combination, a corresponding lightweight authenticated quantum key distribution protocol is proposed. By using these proposed protocols, the participants who just have limited quantum capabilities do not need to increase or change their quantum capabilities for adapting a specific quantum key distribution protocol anymore. They can directly choose an appropriate protocol for sharing keys instead. Besides, to avoid using the assumed authenticated classical channel, all the proposed protocols use pre-shared keys to help the involved participants authenticate with each other. Moreover, to help the participants who have no pre-shared keys between each other can be involved in the protocols, for each proposed lightweight authenticated quantum key distribution protocol, this thesis proposes an indirect authenticated version. In these indirect authentication protocols, the participants can indirectly authenticate with each other and share keys with the help of a semi-honest third party and the third party can obtain nothing about the final shared security key. At last, the key recycling rate analysis shows that most parts of the pre-shared keys used in the proposed protocols can be recycled for reuse even when an eavesdropping is detected.

    中文摘要 i Abstract iii 誌謝 v Contents vi List of Tables x List of Figures xii Chapter 1 Introduction 1 1.1 Quantum key distribution 1 1.2 Authenticated quantum key distribution 2 1.3 Authenticated semi-quantum key distribution 3 1.4 Motivation and Contribution 4 1.5 Thesis Structure 7 Chapter 2 Preliminaries 8 2.1 Quantum Background 8 2.1.1 The Qubit and Its Properties 8 2.1.2 Unitary Operations 10 2.1.3 Bell states and Their Properties 10 2.2 Several concepts used for comparison 11 2.3 Robustness and collective attack 12 Chapter 3 Concepts for designing LAQKD protocols 14 3.1 An analysis of lightweight QKD protocol 14 3.2 The key recycling 17 3.3 The transmission time cost 19 Chapter 4 Proposed SLAQKD protocols 20 4.1 Proposed SLAQKD protocol 1 21 4.1.1 The description of this protocol 22 4.1.2 Security Analysis 24 4.1.3 Key recycling rate 31 4.2 Proposed SLAQKD protocol 2 33 4.2.1 The description of this protocol 33 4.2.2 Security analysis 36 4.2.3 Key recycling rate 37 4.3 Proposed SLAQKD protocol 3 38 4.3.1 The description of this protocol 39 4.3.2 Security analysis 41 4.3.3 Key recycling rate 50 4.4 Comparison of the proposed SLAQKD protocols 51 Chapter 5 Proposed ALAQKD protocols 52 5.1 Proposed ALAQKD protocol 1 52 5.1.1 The description of this protocol 53 5.1.2 Security analysis 55 5.1.3 Key recycling rate 57 5.2 Proposed ALAQKD protocol 2 58 5.2.1 The description of this protocol 59 5.2.2 Security analysis 61 5.2.3 Key recycling rate 69 5.3 Proposed ALAQKD protocol 3 70 5.3.1 The description of this protocol 70 5.3.2 Security analysis 73 5.3.3 Key recycling rate 79 5.4 Comparison of the Proposed ALAQKD protocols 79 Chapter 6 Proposed SLIAQKD protocols 81 6.1 Proposed SLIAQKD protocol 1 81 6.1.1 The description of this protocol 82 6.1.2 Security analysis 85 6.1.3 Key recycling rate 102 6.2 Proposed SLIAQKD protocol 2 103 6.2.1 The description of this protocol 104 6.2.2 Security analysis 107 6.2.3 Key recycling rate 113 6.3 Proposed SLIAQKD protocol 3 114 6.3.1 The description of this protocol 115 6.3.2 Security analysis 118 6.3.3 Key recycling rate 149 6.4 Comparison of the proposed SLIAQKD protocols 149 Chapter 7 Proposed ALIAQKD protocols 151 7.1 Proposed ALIAQKD protocol 1 151 7.1.1 The description of this protocol 152 7.1.2 Security analysis 155 7.1.3 Key recycling rate 174 7.2 Proposed ALIAQKD protocol 2 175 7.2.1 The description of this protocol 175 7.2.2 Security analysis 178 7.2.3 Key recycling rate 198 7.3 Proposed ALIAQKD protocol 3 198 7.3.1 The description of this protocol 199 7.3.2 Security analysis 201 7.3.3 Key recycling rate 217 7.4 Comparison of the proposed ALIAQKD protocols 218 Chapter 8 Conclusion 219 Bibliography 222

    [1] Aysajan Abidin, "Weaknesses of authentication in quantum cryptography and strongly universal hash functions," 2010.
    [2] Jonathan Barrett, Lucien Hardy, and Adrian Kent, "No signaling and quantum key distribution," Physical review letters, vol. 95, no. 1, p. 010503, 2005.
    [3] Mihir Bellare and Phillip Rogaway, "Entity authentication and key distribution," in Annual international cryptology conference, 1993, pp. 232-249: Springer.
    [4] Charles H. Bennet and Gilles Brassard, "Quantum cryptography: Public key distribution and coin tossing," in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 1984, pp. 175-179.
    [5] Charles H Bennett, François Bessette, Gilles Brassard, Louis Salvail, and John Smolin, "Experimental quantum cryptography," Journal of cryptology, vol. 5, no. 1, pp. 3-28, 1992.
    [6] Charles H Bennett, Gilles Brassard, and N David Mermin, "Quantum cryptography without Bell’s theorem," Physical Review Letters, vol. 68, no. 5, p. 557, 1992.
    [7] Eli Biham, Michel Boyer, Gilles Brassard, Jeroen Van De Graaf, and Tal Mor, "Security of quantum key distribution against all collective attacks," Algorithmica, vol. 34, no. 4, pp. 372-388, 2002.
    [8] Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, and Moti Yung, "Perfectly-secure key distribution for dynamic conferences," in Annual international cryptology conference, 1992, pp. 471-486: Springer.
    [9] Michel Boyer, Ran Gelles, Dan Kenigsberg, and Tal Mor, "Semiquantum key distribution," Physical Review A, vol. 79, no. 3, p. 032341, 2009.
    [10] Michel Boyer, Dan Kenigsberg, and Tal Mor, "Quantum key distribution with classical Bob," Physical review Letters vol. 99, p. 140501, 2007.
    [11] Michel Boyer and Tal Mor, "Comment on “Semiquantum-key distribution using less than four quantum states”," Physical Review A, vol. 83, no. 4, p. 046301, 2011.
    [12] Mike Burmester and Yvo Desmedt, "A secure and efficient conference key distribution system," in Workshop on the Theory and Application of of Cryptographic Techniques, 1994, pp. 275-286: Springer.
    [13] Adán Cabello, "Quantum key distribution in the Holevo limit," Physical Review Letters, vol. 85, no. 26, p. 5635, 2000.
    [14] Wei-Feng Cao and Yu-Guang Yang, "Verifiable Quantum Secret Sharing Protocols Based on Four-Qubit Entangled States," International Journal of Theoretical Physics, pp. 1-13, 2019.
    [15] J Lawrence Carter and Mark N Wegman, "Universal classes of hash functions," Journal of computer and system sciences, vol. 18, no. 2, pp. 143-154, 1979.
    [16] Hsing-Chung Chen, Syuan-Zong Lin, and Tzu-Liang Kung, "Three-party authenticated quantum key distribution protocol with time constraint," in 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012, pp. 506-511: IEEE.
    [17] Xiu-Bo Chen, Zhao Dou, Gang Xu, Cong Wang, and Yi-Xian Yang, "A class of protocols for quantum private comparison based on the symmetry of states," Quantum information processing, vol. 13, no. 1, pp. 85-100, 2014.
    [18] Jeong-Woon Choi, Ku-Young Chang, Nam-Su Jho, and Do-Won Hong, "Method of user-authenticated quantum key distribution," ed: Google Patents, 2014.
    [19] Song-Kong Chong and Tzonelih Hwang, "Quantum key agreement protocol based on BB84," Optics Communications, vol. 283, no. 6, pp. 1192-1195, 2010.
    [20] Wen-Han Chou, Tzonelih Hwang, and Jun Gu, "Semi-quantum private comparison protocol under an almost-dishonest third party," arXiv preprint arXiv:1607.07961, 2016.
    [21] Ivan Damgård, Thomas Brochmann Pedersen, and Louis Salvail, "A quantum cipher with near optimal key-recycling," in Annual International Cryptology Conference, 2005, pp. 494-510: Springer.
    [22] Dorothy E Denning and Giovanni Maria Sacco, "Timestamps in key distribution protocols," Communications of the ACM, vol. 24, no. 8, pp. 533-536, 1981.
    [23] A. Einstein, B. Podolsky, and N. Rosen, "Can quantum-mechanical description of physical reality be considered complete?," Physical Review, vol. 47, no. 10, pp. 0777-0780, May 1935.
    [24] Artur K Ekert, "Quantum cryptography based on Bell’s theorem," Physical review letters, vol. 67, no. 6, p. 661, 1991.
    [25] Serge Fehr and Louis Salvail, "Quantum authentication and encryption with key recycling," in Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2017, pp. 311-338: Springer.
    [26] Nicolas Gisin, Sylvain Fasel, Barbara Kraus, Hugo Zbinden, and Grégoire Ribordy, "Trojan-horse attacks on quantum-key-distribution systems," Physical Review A, vol. 73, no. 2, p. 022320, 2006.
    [27] Daniel Gottesman, H-K Lo, Norbert Lutkenhaus, and John Preskill, "Security of quantum key distribution with imperfect devices," in International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings., 2004, p. 136: IEEE.
    [28] Frédéric Grosshans, Gilles Van Assche, Jérôme Wenger, Rosa Brouri, Nicolas J Cerf, and Philippe Grangier, "Quantum key distribution using gaussian-modulated coherent states," Nature, vol. 421, no. 6920, pp. 238-241, 2003.
    [29] Jun Gu, Chih-Yung Ho, and Tzonelih Hwang, "Statistics attack on ‘quantum private comparison with a malicious third party’and its improvement," Quantum Information Processing, vol. 17, no. 2, p. 23, 2018.
    [30] Jun Gu and Tzonelih Hwang, "Collusion attack and counterattack on the quantum key agreement via non-maximally entangled cluster states," arXiv preprint arXiv:2010.10002, 2020.
    [31] Jun Gu and Tzonelih Hwang, "Comment on'Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement'," arXiv preprint arXiv:1510.08249, 2015.
    [32] Jun Gu and Tzonelih Hwang, "Comment on'Multiparty Quantum Key Agreement with GHZ State'," in 2016 International Computer Symposium (ICS), 2016, pp. 241-243: IEEE.
    [33] Jun Gu and Tzonelih Hwang, "Comment on ‘improving the security of protocols of quantum key agreement solely using bell states and bell measurement’," in 2017 IEEE Conference on Dependable and Secure Computing, 2017, pp. 520-521: IEEE.
    [34] Jun Gu and Tzonelih Hwang, "Improvement of “Novel multiparty quantum key agreement protocol with GHZ states”," International Journal of Theoretical Physics, vol. 56, no. 10, pp. 3108-3116, 2017.
    [35] Jun Gu, Po-Hua Lin, and Tzonelih Hwang, "Double C-NOT attack and counterattack on ‘Three-step semi-quantum secure direct communication protocol’," Quantum Information Processing, vol. 17, no. 7, p. 182, 2018.
    [36] Dah-Jyh Guan, Yuan-Jiun Wang, and Es Zhuang, "A practical protocol for three-party authenticated quantum key distribution," Quantum information processing, vol. 13, no. 11, pp. 2355-2374, 2014.
    [37] Wei Huang, Qiaoyan Wen, Bin Liu, Fei Gao, and Ying Sun, "Robust and efficient quantum private comparison of equality with collective detection over collective-noise channels," Science China Physics, Mechanics and Astronomy, vol. 56, no. 9, pp. 1670-1678, 2013.
    [38] Wei Huang, Bing-Jie Xu, Ji-Tong Duan, Bin Liu, Qi Su, Yuan-Hang He, and Heng-Yue Jia, "Authenticated quantum key distribution with collective detection using single photons," International Journal of Theoretical Physics, vol. 55, no. 10, pp. 4238-4256, 2016.
    [39] Zhiming Huang, "Quantum secret sharing affected by vacuum fluctuation," Quantum Information Processing, vol. 18, no. 3, p. 88, 2019.
    [40] Shih-Min Hung, Sheng-Liang Hwang, Tzonelih Hwang, and Shih-Hung Kao, "Multiparty Quantum Private Comparsion with Individually Dishonest Third Parties for Strangers," arXiv preprint arXiv:1607.07119, 2016.
    [41] Tzonelih Hwang, Yen-Jie Chen, Chia-Wei Tsai, and Cheng-Ching Kuo, "Semi-quantum Inspired Lightweight Mediated Quantum Key Distribution Protocol," arXiv preprint arXiv:2007.05804, 2020.
    [42] Tzonelih Hwang, Kuo-Chang Lee, and Chuan-Ming Li, "Provably secure three-party authenticated quantum key distribution protocols," Dependable and Secure Computing, IEEE Transactions on, vol. 4, no. 1, pp. 71-80, 2007.
    [43] Tzonelih Hwang, Kuo-Chang Lee, and Chuan-Ming Li, "Provably secure three-party authenticated quantum key distribution protocols," IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 1, pp. 71-80, 2007.
    [44] Tzonelih Hwang, Chia-Wei Tsai, and Song-Kong Chong, "Probabilistic quantum key distribution," Quantum Information & Computation, vol. 11, no. 7-8, pp. 615-637, 2011.
    [45] Ingemar Ingemarsson, Donald Tang, and C Wong, "A conference key distribution system," IEEE Transactions on Information theory, vol. 28, no. 5, pp. 714-720, 1982.
    [46] Bryan C Jacobs, "Embedded authentication protocol for quantum key distribution systems," ed: Google Patents, 2014.
    [47] Jens G Jensen and Ruediger Schack, "Quantum authentication and key distribution using catalysis," arXiv preprint quant-ph/0003104, 2000.
    [48] Wang Jian, Zhang Sheng, Zhang Quan, and Tang Chao-Jing, "Semiquantum key distribution using entangled states," Chinese Physics Letters, vol. 28, no. 10, p. 100301, 2011.
    [49] Richard Jozsa and Jürgen Schlienz, "Distinguishability of states and von Neumann entropy," Physical Review A, vol. 62, no. 1, p. 012301, 2000.
    [50] Brian Julsgaard, Jacob Sherson, J Ignacio Cirac, Jaromír Fiurášek, and Eugene S Polzik, "Experimental demonstration of quantum memory for light," Nature, vol. 432, no. 7016, pp. 482-486, 2004.
    [51] Walter O Krawec, "Mediated semiquantum key distribution," Physical Review A, vol. 91, no. 3, p. 032323, 2015.
    [52] Walter O Krawec, "Multi-mediated semi-quantum key distribution," in 2019 IEEE Globecom Workshops (GC Wkshps), 2019, pp. 1-6: IEEE.
    [53] Walter O Krawec, "Restricted attacks on semi-quantum key distribution protocols," Quantum Information Processing, vol. 13, no. 11, pp. 2417-2436, 2014.
    [54] Walter O Krawec, "Security proof of a semi-quantum key distribution protocol," in 2015 IEEE International Symposium on Information Theory (ISIT), 2015, pp. 686-690: IEEE.
    [55] Walter O Krawec and Eric P Geiss, "Semi-quantum key distribution with limited measurement capabilities," in 2018 International Symposium on Information Theory and Its Applications (ISITA), 2018, pp. 462-466: IEEE.
    [56] Christian Kurtsiefer, P Zarda, Matthus Halder, H Weinfurter, Pm Gorman, Pr Tapster, and Jg Rarity, "A step towards global key distribution," Nature, vol. 419, no. 6906, pp. 450-450, 2002.
    [57] Chuan-Ming Li, Kun-Fei Yu, Shih-Hung Kao, and Tzonelih Hwang, "Authenticated semi-quantum key distributions without classical channel," Quantum Information Processing, vol. 15, no. 7, pp. 2881-2893, 2016.
    [58] Qin Li, Wh Chan, and Dong-Yang Long, "Semiquantum secret sharing using entangled states," Physical Review A, vol. 82, no. 2, p. 022303, 2010.
    [59] Taichao Li, Xu Wang, and Min Jiang, "Quantum Key Agreement Via Non-maximally Entangled Cluster States," International Journal of Theoretical Physics, pp. 1-16, 2020.
    [60] Charles Ci Wen Lim, Christopher Portmann, Marco Tomamichel, Renato Renner, and Nicolas Gisin, "Device-independent quantum key distribution with local Bell test," Physical Review X, vol. 3, no. 3, p. 031006, 2013.
    [61] Po-Hua Lin, Tzonelih Hwang, and Chia-Wei Tsai, "Efficient semi-quantum private comparison using single photons," Quantum Information Processing, vol. 18, no. 7, p. 207, 2019.
    [62] Bin Liu, Fei Gao, Wei Huang, and Qiao-Yan Wen, "Multiparty quantum key agreement with single particles," Quantum information processing, vol. 12, no. 4, pp. 1797-1805, 2013.
    [63] Bin Liu, Zhifeng Gao, Di Xiao, Wei Huang, Zhiqing Zhang, and Bingjie Xu, "Quantum identity authentication in the counterfactual quantum key distribution protocol," Entropy, vol. 21, no. 5, p. 518, 2019.
    [64] Wen-Jie Liu, Zhen-Yu Chen, Sai Ji, Hai-Bin Wang, and Jun Zhang, "Multi-party semi-quantum key agreement with delegating quantum computation," International Journal of Theoretical Physics, vol. 56, no. 10, pp. 3164-3174, 2017.
    [65] Wen-Jie Liu, Chao Liu, Han-Wu Chen, Zhi-Hao Liu, Min-Xiao Yuan, and Jin-Shen Lu, "Improvement on" an efficient protocol for the quantum private comparison of equality with W state"," International Journal of Quantum Information, vol. 12, no. 01, p. 1450001, 2014.
    [66] Wen Liu and Yong-Bin Wang, "Quantum private comparison based on GHZ entangled states," International Journal of Theoretical Physics, vol. 51, no. 11, pp. 3596-3604, 2012.
    [67] Wen Liu, Yong-Bin Wang, and Xiao-Mei Wang, "Multi-party quantum private comparison protocol using d-dimensional basis states without entanglement swapping," International Journal of Theoretical Physics, vol. 53, no. 4, pp. 1085-1091, 2014.
    [68] Xing-Tong Liu, Jing-Jing Zhao, Jian Wang, and Chao-Jing Tang, "Cryptanalysis of the secure quantum private comparison protocol," Physica Scripta, vol. 87, no. 6, p. 065004, 2013.
    [69] Daniel Ljunggren, Mohamed Bourennane, and Anders Karlsson, "Authority-based user authentication in quantum key distribution," Physical Review A, vol. 62, no. 2, p. 022305, 2000.
    [70] Hoi-Kwong Lo and Hoi Fung Chau, "Unconditional security of quantum key distribution over arbitrarily long distances," science, vol. 283, no. 5410, pp. 2050-2056, 1999.
    [71] Hoi-Kwong Lo, Marcos Curty, and Bing Qi, "Measurement-device-independent quantum key distribution," Physical review letters, vol. 108, no. 13, p. 130503, 2012.
    [72] Hoi-Kwong Lo, Marcos Curty, and Kiyoshi Tamaki, "Secure quantum key distribution," Nature Photonics, vol. 8, no. 8, p. 595, 2014.
    [73] Hoi-Kwong Lo, Xiongfeng Ma, and Kai Chen, "Decoy state quantum key distribution," Physical review letters, vol. 94, no. 23, p. 230504, 2005.
    [74] Gui-Lu Long and Xiao-Shu Liu, "Theoretically efficient high-capacity quantum-key-distribution scheme," Physical Review A, vol. 65, no. 3, p. 032302, 2002.
    [75] Yu-Chin Lu, Chia-Wei Tsai, and Tzonelih Hwang, "Quantum Key Recycling with optimal key recycling rate based on a noise level," arXiv preprint arXiv:2004.11596, 2020.
    [76] Xiongfeng Ma, Bing Qi, Yi Zhao, and Hoi-Kwong Lo, "Practical decoy state for quantum key distribution," Physical Review A, vol. 72, no. 1, p. 012326, 2005.
    [77] Abdelmajid Meslouhi and Yassine Hassouni, "Cryptanalysis on authenticated semi-quantum key distribution protocol using Bell states," Quantum Information Processing, vol. 16, no. 1, p. 18, 2017.
    [78] Naya Nagy and Selim G Akl, "Authenticated quantum key distribution without classical communication," Parallel processing letters, vol. 17, no. 03, pp. 323-335, 2007.
    [79] Jennifer Ouellette, "Quantum key distribution," Industrial Physicist, vol. 10, no. 6, pp. 22-25, 2004.
    [80] Asher Peres, Quantum theory: concepts and methods. Springer Science & Business Media, 2006.
    [81] Renato Renner, "Security of quantum key distribution," International Journal of Quantum Information, vol. 6, no. 01, pp. 1-127, 2008.
    [82] Valerio Scarani, Helle Bechmann-Pasquinucci, Nicolas J Cerf, Miloslav Dušek, Norbert Lütkenhaus, and Momtchil Peev, "The security of practical quantum key distribution," Reviews of modern physics, vol. 81, no. 3, p. 1301, 2009.
    [83] Dong-Su Shen, Wen-Ping Ma, and Li-Li Wang, "Two-party quantum key agreement with four-qubit cluster states," Quantum Information Processing, vol. 13, no. 10, pp. 2313-2324, 2014.
    [84] Bao-Sen Shi, Jian Li, Jin-Ming Liu, Xiao-Feng Fan, and Guang-Can Guo, "Quantum key distribution and quantum authentication based on entangled state," Physics letters A, vol. 281, no. 2-3, pp. 83-87, 2001.
    [85] Run-Hua Shi and Hong Zhong, "Multi-party quantum key agreement with bell states and bell measurements," Quantum information processing, vol. 12, no. 2, pp. 921-932, 2013.
    [86] Peter W Shor and John Preskill, "Simple proof of security of the BB84 quantum key distribution protocol," Physical review letters, vol. 85, no. 2, p. 441, 2000.
    [87] Chitra Shukla, Nasir Alam, and Anirban Pathak, "Protocols of quantum key agreement solely using Bell states and Bell measurement," Quantum Information Processing, vol. 13, no. 11, pp. 2391-2405, 2014.
    [88] Chitra Shukla, Kishore Thapliyal, and Anirban Pathak, "Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue," Quantum Information Processing, vol. 16, no. 12, p. 295, 2017.
    [89] Boris Škorić and Manon De Vries, "Quantum Key Recycling with 8-state encoding (The Quantum One-Time Pad is more interesting than we thought)," International Journal of Quantum Information, vol. 15, no. 03, p. 1750016, 2017.
    [90] Zhiwei Sun, Jianping Yu, Ping Wang, Lingling Xu, and Chunhui Wu, "Quantum private comparison with a malicious third party," Quantum Information Processing, vol. 14, no. 6, pp. 2125-2133, 2015.
    [91] Zhiwei Sun, Cai Zhang, Banghai Wang, Qin Li, and Dongyang Long, "Improvements on “Multiparty quantum key agreement with single particles”," Quantum information processing, vol. 12, no. 11, pp. 3411-3420, 2013.
    [92] Kishore Thapliyal, Rishi Dutt Sharma, and Anirban Pathak, "Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment," International Journal of Quantum Information, vol. 16, no. 05, p. 1850047, 2018.
    [93] Chia-Wei Tsai, Song-Kong Chong, and Tzonelih Hwang, "Comment on quantum key agreement protocol with maximally entangled states," in Proceedings of the 20th Cryptology and Information Security Conference (CISC 2010), 2010, pp. 210-213.
    [94] Chia-Wei Tsai and Chun-Wei Yang, "Cryptanalysis and improvement of the semi-quantum key distribution robust against combined collective noise," International Journal of Theoretical Physics, vol. 58, no. 7, pp. 2244-2250, 2019.
    [95] Chia-Wei Tsai and Chun-Wei Yang, "Lightweight authenticated semi-quantum key distribution protocol without trojan horse attack," Laser Physics Letters, vol. 17, no. 7, p. 075202, 2020.
    [96] Chih-Lun Tsai and Tzonelih Hwang, "Semi-quantum key distribution robust against combined collective noise," International Journal of Theoretical Physics, vol. 57, no. 11, pp. 3410-3418, 2018.
    [97] Hsin-Yi Tseng, Jason Lin, and Tzonelih Hwang, "New quantum private comparison protocol using EPR pairs," Quantum Information Processing, vol. 11, no. 2, pp. 373-384, 2012.
    [98] S Venkatramulu and S Veena, "Secure communication using two party authenticated quantum key distribution protocols," IJCSNS, vol. 10, no. 8, p. 233, 2010.
    [99] Jian Wang, Sheng Zhang, Quan Zhang, and Chao-Jing Tang, "Semiquantum secret sharing using two-particle entangled state," International Journal of Quantum Information, vol. 10, no. 05, p. 1250050, 2012.
    [100] Qing-Le Wang, Hong-Xiang Sun, and Wei Huang, "Multi-party quantum private comparison protocol with n-level entangled states," Quantum Information Processing, vol. 13, no. 11, pp. 2375-2389, 2014.
    [101] Toung-Shang Wei, Chia-Wei Tsai, and Tzonelih Hwang, "Comment on “Quantum key distribution and quantum authentication based on entangled state”," International Journal of Theoretical Physics, vol. 50, no. 9, pp. 2703-2707, 2011.
    [102] Feihu Xu, "Measurement-device-independent quantum communication with an untrusted source," Physical Review A, vol. 92, no. 1, p. 012333, 2015.
    [103] Guo-Ai Xu, Xiu-Bo Chen, Zhan-Hong Wei, Meng-Jiao Li, and Yi-Xian Yang, "An efficient protocol for the quantum private comparison of equality with a four-qubit cluster state," International Journal of Quantum Information, vol. 10, no. 04, p. 1250045, 2012.
    [104] Akihiro Yamamura and Hirokazu Ishizuka, "Error detection and authentication in quantum key distribution," in Australasian Conference on Information Security and Privacy, 2001, pp. 260-273: Springer.
    [105] Lang Yan-Feng, "Semi-quantum private comparison using single photons," International Journal of Theoretical Physics, vol. 57, no. 10, pp. 3048-3055, 2018.
    [106] Li Li Yan, Shi Bin Zhang, Yan Chang, Zhi Wei Sheng, and Fan Yang, "Mutual semi-quantum key agreement protocol using Bell states," Modern Physics Letters A, vol. 34, no. 35, p. 1950294, 2019.
    [107] Chun-Wei Yang and Tzonelih Hwang, "Efficient key construction on semi-quantum secret sharing protocols," International Journal of Quantum Information, vol. 11, no. 05, p. 1350052, 2013.
    [108] Chun-Wei Yang and Tzonelih Hwang, "Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channels," Quantum information processing, vol. 12, no. 10, pp. 3207-3222, 2013.
    [109] Kun-Fei Yu, Jun Gu, Tzonelih Hwang, and Prosanta Gope, "Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing," Quantum Information Processing, journal article vol. 16, no. 8, p. 194, July 01 2017.
    [110] Kun-Fei Yu, Chun-Wei Yang, Ci-Hong Liao, and Tzonelih Hwang, "Authenticated semi-quantum key distribution protocol using Bell states," Quantum Information Processing, vol. 13, no. 6, pp. 1457-1465, 2014.
    [111] Hao Yuan, Yi-Min Liu, Guo-Zhu Pan, Gang Zhang, Jun Zhou, and Zhan-Jun Zhang, "Quantum identity authentication based on ping-pong technique without entanglements," Quantum Information Processing, vol. 13, no. 11, pp. 2535-2549, 2014.
    [112] Sofia Zebboudj, Hizia Djoudi, Dalila Lalaoui, and Mawloud Omar, "Authenticated semi-quantum key distribution without entanglement," Quantum Information Processing, vol. 19, no. 3, p. 77, 2020.
    [113] Ke-Jia Zhang, Xue Zhang, Heng-Yue Jia, and Long Zhang, "A new n-party quantum secret sharing model based on multiparty entangled states," Quantum Information Processing, vol. 18, no. 3, p. 81, 2019.
    [114] Ming-Hui Zhang, Hui-Fang Li, Jin-Ye Peng, and Xiao-Yi Feng, "Fault-tolerant Semiquantum key Distribution Over a Collective-dephasing Noise Channel," International Journal of Theoretical Physics, vol. 56, no. 8, pp. 2659-2670, 2017.
    [115] Wei Zhang, Daowen Qiu, and Paulo Mateus, "Security of a single-state semi-quantum key distribution protocol," Quantum Information Processing, vol. 17, no. 6, p. 135, 2018.
    [116] Wei Zhang, Daowen Qiu, and Paulo Mateus, "Single-state semi-quantum key distribution protocol and its security proof," International Journal of Quantum Information, vol. 18, no. 04, p. 2050013, 2020.
    [117] Nanrun Zhou, Guihua Zeng, and Jin Xiong, "Quantum key agreement protocol," Electronics Letters, vol. 40, no. 18, pp. 1149-1150, 2004.
    [118] Kong-Ni Zhu, Nan-Run Zhou, Yun-Qian Wang, and Xiao-Jun Wen, "Semi-quantum key distribution protocols with GHZ states," International Journal of Theoretical Physics, vol. 57, no. 12, pp. 3621-3631, 2018.
    [119] Xiangfu Zou and Daowen Qiu, "Three-step semiquantum secure direct communication protocol," Science China Physics, Mechanics & Astronomy, vol. 57, no. 9, pp. 1696-1702, 2014.
    [120] Xiangfu Zou, Daowen Qiu, Lvzhou Li, Lihua Wu, and Lvjun Li, "Semiquantum-key distribution using less than four quantum states," Physical Review A, vol. 79, no. 5, p. 052312, 2009.

    無法下載圖示 校內:2026-01-01公開
    校外:2026-01-01公開
    電子論文尚未授權公開,紙本請查館藏目錄
    QR CODE