Abstract

Eavesdropping detection is an indispensable process of most quantum cryptographic protocols. By publishing and comparing part of the shared bits, called as detection bits, the participants can check whether there exists an eavesdropper. Generally, the detection bits are chosen randomly. Consequently, the secret bits, i.e., the rest bits, are also random. Then, what if the detection bits are chosen non-randomly? Can the participant who chooses the detection bits make the secret bits to be a predetermined string he expected? This paper focuses on the participants’ key control capability when they choose the detection bits selectively in two-party quantum communication protocols. Concretely, we analyze the participants’ key control capability in different situations of different proportions of the detection bits. And we prove that the participants can predetermine, with high probability, any part of the secret bits of which the length is smaller than that of the detection bits. The above result has various potential applications in quantum cryptographic protocols. Obviously, utilizing this non-random selection of the detection bits, one can realize the function of a deterministic quantum key distribution protocol through a random one if the number of the detection bits is not smaller than that of the secret bits. What is more, we find that quite a few quantum key agreement protocols cannot guarantee the fairness of the key in the sense that the participant who chooses the detection bits can control the key somewhat.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.