簡易檢索 / 詳目顯示

研究生: 余昆霏
Yu, Kun-Fei
論文名稱: 半量子金鑰分配與量子金鑰協商
Semi-quantum Key Distribution and Quantum Key Agreement
指導教授: 黃宗立
Hwang, Tzone-Lih
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Department of Computer Science and Information Engineering
論文出版年: 2014
畢業學年度: 102
語文別: 英文
論文頁數: 54
中文關鍵詞: 量子密碼學半量子金鑰分配協定量子金鑰協商
外文關鍵詞: Quantum Cryptography, Semi-quantum Key Distribution, Quantum Key Agreement
相關次數: 點閱:151下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 現今量子密碼學之研究領域涵蓋廣泛,其中以量子金鑰分配之研究成果最為豐碩。相較於傳統金鑰分配,量子金鑰分配協定之安全性是基於量測不確定性及量子不可複製原理等。然而,現有大多數之量子金鑰分配協定皆假設所有參與協定的通訊方都具備量子通訊設備及儀器,任何一方缺少了這些設備,即無法繼續參與協定之運作。考量到實際之情況,現行量子電腦尚在發展階段,在短時間內仍難以普及量產,其成本價格更是相當昂貴。因此,半量子環境因而發展出來,其探討在有限的量子資源環境下,仍能執行量子金鑰分配協定並不失其安全性。
    然而,現有的半量子金鑰分配協定,皆假設各參與方共享一傳統認證通道。在此通道上的訊息雖可以被竊聽,但無法被任意竄改,因此能確保其來源性及完整性。若捨棄此認證通道的假設,則現存之半量子金鑰分配協定將容易遭受中間人攻擊。
      另一方面,在量子金鑰分配協定中,其共享金鑰是由一位參與方或是一位第三方所產生並分配給其他的參與方。然而,考量到在協定中的各個參與方並不一定彼此信任,進而對金鑰之產生有所疑慮。因此,如何讓所有參與方能共同且公平地協商共享金鑰之量子金鑰協商研究,即成為一項重要議題。
    基於上述兩種環境,本論文首先針對於半量子假設下,提出一具認證功能之半量子金鑰分配協定,其中屏棄了傳統認證通道的假設,利用公開通道來實現半量子金鑰分配協定。此外,本論文也提出一個利用多顆量子糾結態來實現多個參與方之半量子金鑰分配協定。另一方面,針對量子金鑰協商之研究,本論文提出一內部攻擊方法,使得現存之量子金鑰協商協定面臨無法公平地為使用者建立共享金鑰之問題。同時,本論文亦提出一種解決方法,並根據此方法發展出允許多個參與方之安全量子金鑰協商協定。

    The present researches in the quantum cryptography have covered wide range of research topics. Particularly, the topic of quantum key distribution (QKD) is the most attractive one. Compare with the classical key distribution, the security of the QKD protocol is based on the quantum physics, which possesses the properties of the measurement uncertainty and no-cloning theorem. However, most of the QKD schemes assume that both participants equip the advanced quantum devices. In this condition, consider that the quantum computer is still in development stage and it’s hard to afford, this assumption may become a restriction for a user to execute those QKD schemes without these devices.
    Under this situation, the “semi-quantum” environment was proposed to achieve the quantum communication with limited quantum capability. In the case of semi-quantum key distribution (SQKD), however, all the existing SQKD protocols utilize authenticated classical channels between the participants (i.e., the integrity and the originality of messages transmitted via the authenticated classical channel can be ensured). Without the use of the authenticated classical channels, these SQKD protocols are vulnerable to man-in-the-middle attacks.
    Besides, in a QKD protocol, the shared secret key is determined by a party or a key distribution center, and subsequently distributed to the other participants. However, the participants in a communication may be dishonest and further threaten the generation of the shared key. In that case, the quantum key agreement (QKA) protocols can be applied. The QKA protocols allow all the participants to negotiate the shared secret key which cannot be determined alone by any one or subset of the participants. This thesis discloses a novel key manipulation problem which makes the existing QKA protocols vulnerable and unfair.
    Based on above discussion, this thesis first proposes authenticated SQKD (ASQKD) protocols, which utilize public channels and pre-shared keys to authenticate users instead of using the authenticated classical channels. In addition, this thesis also proposes a multi-party SQKD protocol using N-particle GHZ-like states, which allows numerous participants to establish a shared secret key. Second, based on that, this thesis also gives a solution model. Moreover, a two-party QKA protocol and two multi-party QKA protocols with mediators based on the solution model are presented.

    中文摘要 III Abstract V 誌 謝 VII Content VIII Figure List XI Chapter 1 Introduction 1 1.1 Overview 1 1.2 Motivation and Contribution 2 1.3 Thesis Organization 3 Chapter 2 Review of Quantum Cryptography 4 2.1 Quantum Bits and Measurements 4 2.2 Quantum Unitary Operators 5 2.3 Quantum Entanglement 6 2.4 Quantum Key Distribution and Quantum Key Agreement 7 2.5 Semi-quantum Scenario 8 Chapter 3 Semi-quantum Quantum Key Distribution Protocols 9 3.1 Authenticated Semi-quantum Key Distribution Protocols Using Bell States 9 3.1.1 Proposed Randomization-based ASQKD Protocol 9 3.1.2 Proposed Measure-resend ASQKD Protocol 12 3.1.3 Security Analyses 14 3.1.3.1 Security against Impersonation Attacks 14 3.1.3.2 Security against Modification Attacks 16 3.2 Authenticated Semi-quantum Key Distributions without Classical Channel 17 3.2.1 Proposed Randomization-based ASQKD Protocol 17 3.2.2 Proposed Measure-resend ASQKD Protocol 19 3.2.3 Security Analyses 22 3.2.3.1 Security against Impersonation Attacks 22 3.2.3.2 Security against Modification Attacks 23 3.3 Multi-party Semi-quantum Key Distribution Protocol Using GHZ-like States 24 3.3.1 N-particle GHZ-like States 25 3.3.1.1 Generation of N-particle GHZ-like States 25 3.3.1.2 Properties of N-particle GHZ-like States 26 3.3.2 Proposed MSQKD Protocol 27 3.3.3 Security Analysis 31 3.3.4 Qubit Efficiency Analysis 33 Chapter 4 Quantum Key Agreement Protocols 34 4.1 Insider Attacks in Public Discussion and Fairness property 34 4.1.1 Fairness Property 34 4.1.2 Review of Huang et al.’s QKA Protocol 34 4.1.3 Key Manipulation Problem 36 4.2 Design of Quantum Key Agreement Protocols with Fairness Properties 37 4.2.1 Solution Model 38 4.2.2 Proposed Two-party QKA Protocol Based on Solution Model 39 4.2.3 Security Analyses 41 4.2.3.1 Security against Eavesdropping Attack 41 4.2.3.2 Security against Insider Attack 42 4.2.4 Fairness Discussion 43 4.3 Multi-party Quantum Key Agreement Protocols with Mediators 43 4.3.1 Proposed MQKA Protocol with a Mediator 44 4.3.2 Proposed MQKA Protocol with Two Mediators 47 4.3.3 Security Analyses 48 4.3.3.1 Security against Eavesdropping Attack 48 4.3.3.2 Security against Participant Attack 49 4.3.3.3 Security against Mediator Attack 50 Chapter 5 Conclusions 51 Bibliography 52

    [1] P. W. Shor, "Algorithms for quantum computation: discrete logarithms and factoring." pp. 124-134.
    [2] C. H. Bennett, and G. Brassard, “Quantum Cryptography: Public Key Distribution and Coin Tossing,” in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 1984, pp. 175-179.
    [3] A. K. Ekert, “Quantum cryptography based on Bell’s theorem,” Physical Review Letters, vol. 67, no. 6, pp. 661-663, 08/05/, 1991.
    [4] C. H. Bennett, G. Brassard, and N. D. Mermin, “Quantum cryptography without Bell’s theorem,” Physical Review Letters, vol. 68, no. 5, pp. 557-559, 02/03/, 1992.
    [5] A. Cabello, “Quantum key distribution without alternative measurements,” Physical Review A, vol. 61, no. 5, pp. art. no.-052312, May, 2000.
    [6] B. S. Shi, J. Li, J. M. Liu, X. F. Fan, and G. C. Guo, “Quantum key distribution and quantum authentication based on entangled state,” Physics Letters A, vol. 281, no. 2-3, pp. 83-87, Mar 19, 2001.
    [7] G. L. Long, and X. S. Liu, “Theoretically efficient high-capacity quantum-key-distribution scheme,” Physical Review A, vol. 65, no. 3, pp. 032302, 02/01/, 2002.
    [8] C. Li, H. S. Song, L. Zhou, and C. F. Wu, “A random quantum key distribution achieved by using Bell states,” Journal of Optics B-Quantum and Semiclassical Optics, vol. 5, no. 2, pp. 155-157, Apr, 2003.
    [9] D. G. Song, “Secure key distribution by swapping quantum entanglement,” Physical Review A, vol. 69, no. 3, Mar, 2004.
    [10] X. H. Li, F. G. Deng, and H. Y. Zhou, “Efficient quantum key distribution over a collective noise channel,” Physical Review A, vol. 78, no. 2, Aug, 2008.
    [11] H. C. Shih, K. C. Lee, and T. Hwang, “New Efficient Three-Party Quantum Key Distribution Protocols,” Ieee Journal of Selected Topics in Quantum Electronics, vol. 15, no. 6, pp. 1602-1606, Nov-Dec, 2009.
    [12] C. H. Hong, J. O. Heo, G. L. Khym, J. Lim, S.-K. Hong, and H. J. Yang, “quantum channels are sufficient for Multi-user Quantum Key Distribution protocol between users,” Optics Communications, vol. 283, no. 12, pp. 2644-2646, 6/15/, 2010.
    [13] N.-R. Zhou, L.-J. Wang, J. Ding, and L.-H. Gong, “Quantum deterministic key distribution protocols based on the authenticated entanglement channel,” Physica Scripta, vol. 81, no. 4, pp. 045009, 2010.
    [14] N.-R. Zhou, L.-J. Wang, J. Ding, L.-H. Gong, and X.-W. Zuo, “Novel Quantum Deterministic Key Distribution Protocols with Entangled States,” International Journal of Theoretical Physics, vol. 49, no. 9, pp. 2035-2044, 2010/09/01, 2010.
    [15] N. Zhou, G. Zeng, and J. Xiong, “Quantum key agreement protocol,” Electronics Letters, vol. 40, no. 18, pp. 1149, 2004.
    [16] S.-K. Chong, and T. Hwang, “Quantum key agreement protocol based on BB84,” Optics Communications, vol. 283, no. 6, pp. 1192-1195, 2010.
    [17] S.-K. Chong, C.-W. Tsai, and T. Hwang, “Improvement on “Quantum Key Agreement Protocol with Maximally Entangled States”,” International Journal of Theoretical Physics, vol. 50, no. 6, pp. 1793-1802, 2011.
    [18] R.-H. Shi, and H. Zhong, “Multi-party quantum key agreement with bell states and bell measurements,” Quantum Information Processing, vol. 12, no. 2, pp. 921-932, 2013/02/01, 2013.
    [19] B. Liu, F. Gao, W. Huang, and Q.-y. Wen, “Multiparty quantum key agreement with single particles,” Quantum Information Processing, vol. 12, no. 4, pp. 1797-1805, 2013/04/01, 2013.
    [20] Z. Sun, C. Zhang, B. Wang, Q. Li, and D. Long, “Improvements on “multiparty quantum key agreement with single particles”,” Quantum Information Processing, vol. 12, no. 11, pp. 3411-3420, 2013.
    [21] X.-R. Yin, W.-P. Ma, and W.-Y. Liu, “Three-Party Quantum Key Agreement with Two-Photon Entanglement,” International Journal of Theoretical Physics, vol. 52, no. 11, pp. 3915-3921, 2013.
    [22] W. Huang, Q.-Y. Wen, B. Liu, F. Gao, and Y. Sun, “Quantum key agreement with EPR pairs and single-particle measurements,” Quantum Information Processing, vol. 13, no. 3, pp. 649-663, 2014/03/01, 2014.
    [23] M. Hillery, V. Bužek, and A. Berthiaume, “Quantum secret sharing,” Physical Review A, vol. 59, no. 3, pp. 1829-1834, 03/01/, 1999.
    [24] Y. Li, K. Zhang, and K. Peng, “Multiparty secret sharing of quantum information based on entanglement swapping,” Physics Letters A, vol. 324, no. 5–6, pp. 420-424, 4/26/, 2004.
    [25] Z.-j. Zhang, Y. Li, and Z.-x. Man, “Multiparty quantum secret sharing,” Physical Review A, vol. 71, no. 4, pp. 044301, 04/11/, 2005.
    [26] R.-h. Shi, and H. Zhong, “Multiparty quantum secret sharing with the pure entangled two-photon states,” Quantum Information Processing, vol. 11, no. 1, pp. 161-169, 2012/02/01, 2012.
    [27] M. Boyer, D. Kenigsberg, and T. Mor, “Quantum Key Distribution with Classical Bob,” Physical Review Letters, vol. 99, no. 14, pp. 140501, 10/05/, 2007.
    [28] M. Boyer, R. Gelles, D. Kenigsberg, and T. Mor, “Semiquantum key distribution,” Physical Review A, vol. 79, no. 3, pp. 032341, 03/30/, 2009.
    [29] Z. Xian-Zhou, G. Wei-Gui, T. Yong-Gang, R. Zhen-Zhong, and G. Xiao-Tian, “Quantum key distribution series network protocol with M -classical Bobs,” Chinese Physics B, vol. 18, no. 6, pp. 2143, 2009.
    [30] X. Zou, D. Qiu, L. Li, L. Wu, and L. Li, “Semiquantum-key distribution using less than four quantum states,” Physical Review A, vol. 79, no. 5, pp. 052312, 05/12/, 2009.
    [31] W. Jian, Z. Sheng, Z. Quan, and T. Chao-Jing, “Semiquantum Key Distribution Using Entangled States,” Chinese Physics Letters, vol. 28, no. 10, pp. 100301, 2011.
    [32] K. F. Yu, C. W. Yang, C. H. Liao, and T. Hwang, “Authenticated semi-quantum key distribution protocol using Bell states,” Quantum Information Processing, vol. 13, no. 6, pp. 1457-1465, Jun, 2014.
    [33] Q. Li, W. H. Chan, and D.-Y. Long, “Semiquantum secret sharing using entangled states,” Physical Review A, vol. 82, no. 2, pp. 022303, 2010.
    [34] J. Wang, S. Zhang, Q. Zhang, and C.-J. Tang, “Semiquantum Secret Sharing Using Two-Particle Entangled State,” International Journal of Quantum Information, vol. 10, no. 05, pp. 1250050, 2012.
    [35] L. Li, D. Qiu, and P. Mateus, “Quantum secret sharing with classical Bobs,” Journal of Physics A: Mathematical and Theoretical, vol. 46, no. 4, pp. 045304, 2013.
    [36] C.-W. Yang, and T. Hwang, “Efficient Key Construction on Semi-Quantum Secret Sharing Protocols,” International Journal of Quantum Information, vol. 11, no. 05, pp. 1350052, 2013.
    [37] J. Lin, C.-W. Yang, C.-W. Tsai, and T. Hwang, “Intercept-Resend Attacks on Semi-quantum Secret Sharing and the Improvements,” International Journal of Theoretical Physics, vol. 52, no. 1, pp. 156-162, 2013.
    [38] C. W. Yang, T. Hwang, and T. H. Lin, “Modification Attack on QSDC with Authentication and the Improvement,” International Journal of Theoretical Physics, vol. 52, no. 7, pp. 2230-2234, Jul, 2013.

    下載圖示 校內:2024-08-31公開
    校外:2024-08-31公開
    QR CODE