Abstract
Fairness is an important standard needed to be considered in a secure quantum key agreement (QKA) protocol. However, it found that most of the quantum key agreement protocols in the travelling model are not fair, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. Thus, how to construct a fair and secure key agreement protocol has obtained much attention. In this paper, a new fair multiparty QKA protocol that can resist the collusive attack is proposed. More specifically, we show that in a client-server scenario, it is possible for the clients to share a key and reveal nothing about what key has been agreed upon to the server. The server prepares quantum states for clients to encode messages to avoid the participants’ collusive attack. This construction improves on previous work, which requires either preparing multiple quantum resources by clients or two-way quantum communication. It is proven that the protocol does not reveal to any eavesdropper, including the server, what key has been agreed upon, and the dishonest participants can be prevented from collaborating to predetermine the final key.
Highlights
The key-stealing stage:When the protocol starts, Pi and Pj share the knowledge of Ri, Si, Ki and Rj, Sj, Kj and the expected fake key K′. In the (i − j)-th period when Pj starts the protocol, upon receiving Sj, Pi is able to attain the bitwise XOR result of Kj+1, Kj+2, ..., Ki−1 according to the measurement outcomes of Rj and Sj
It has been proven that Shor’s algorithm can factor a large number and calculate the discrete logarithms in polynomial time by using a quantum computer
There were only two parties involved in quantum key agreement protocols when they were studied at the beginning18–24
Summary
When the protocol starts, Pi and Pj share the knowledge of Ri, Si, Ki and Rj, Sj, Kj and the expected fake key K′. In the (i − j)-th period when Pj starts the protocol, upon receiving Sj, Pi is able to attain the bitwise XOR result of Kj+1, Kj+2, ..., Ki−1 according to the measurement outcomes of Rj and Sj. When the protocol starts, Pi and Pj share the knowledge of Ri, Si, Ki and Rj, Sj, Kj and the expected fake key K′. In the (i − j)-th period when Pj starts the protocol, upon receiving Sj, Pi is able to attain the bitwise XOR result of Kj+1, Kj+2, ..., Ki−1 according to the measurement outcomes of Rj and Sj. Analogously, Pj could obtain the XOR result of Ki+1, Ki+2, ..., Kj−1 in the (N − i + j)-th period when Pi starts the protocol. Pi and Pj exchange the above bitwise XOR results. Pj could obtain the XOR result of Ki+1, Ki+2, ..., Kj−1 in the (N − i + j)-th period when Pi starts the protocol. They can compute the legal shared key K in the i − j period in advance
Published Version (
Free)
Join us for a 30 min session where you can share your feedback and ask us any queries you have