Quantum no-key protocol for direct and secure transmission of quantum and classical messages

Li Yang
DOI: https://doi.org/10.48550/arXiv.quant-ph/0309200
2003-09-28
Abstract:We present a quantum no-key protocol for direct and secure transmission of quantum and classical messages based on simple Boolean function computation with several quantum gates and Shamir's interactive idea of classical message encryption. This protocol has inherent personal identification and message authentication. It probably is the first quantum protocol that can resist the man-in-the-middle attack by itself.
Quantum Physics
What problem does this paper attempt to address?
The problem that this paper attempts to solve is to achieve direct and secure quantum and classical message transmissions, especially how to ensure the security and authenticity of communication without pre - sharing keys in advance. Specifically, the author proposes a new quantum cryptography protocol, aiming to overcome the computational security limitations of the traditional Shamir protocol in classical cryptography and be able to resist man - in - the - middle attacks. ### Main contributions of the paper 1. **Direct transmission**: This protocol allows for the direct transmission of quantum and classical messages without the need to establish a shared key in advance. 2. **Security enhancement**: By utilizing the properties of quantum entanglement and Boolean functions, the security of the protocol is ensured and it can resist man - in - the - middle attacks. 3. **Authentication and message authentication**: In addition to encryption, it also provides the functions of authentication and message authentication, ensuring the authenticity and integrity of messages. ### Core ideas of the protocol - **Quantum message transmission**: - Alice selects an n - dimensional Boolean function \(F_A(x)\), transforms the quantum state and sends it to Bob. - Bob independently selects another Boolean function \(F_B(x)\), transforms the quantum state again and returns it to Alice. - Alice and Bob use their own Boolean functions for further transformation respectively, and finally Bob can recover the original quantum message. - **Classical message transmission**: - Alice converts the classical message into a quantum state (through the Hadamard transformation), and then processes it according to the protocol of quantum message transmission. - Bob receives the quantum state and then recovers the original classical message through the Hadamard transformation. - **Message transmission with authentication**: - Alice and Bob pre - share authentication keys (in the form of Boolean functions) and add these keys during the transmission process to ensure the authenticity of the message source. ### Representation of formulas - Representation of quantum states: \[ |\psi\rangle=\sum_{m = 1}^{2^k}\alpha_m|m\rangle \] where \(|m\rangle\) is the basis state and \(\alpha_m\) is the complex coefficient. - Application of Boolean functions: \[ U_A=\sum_{m}|F_A(m)\rangle\langle m| \] \[ U_B=\sum_{m}|F_B(m)\rangle\langle m| \] - Quantization of classical messages: \[ H(|0\rangle)=\frac{1}{\sqrt{2}}(|0\rangle + |1\rangle) \] \[ H(|1\rangle)=\frac{1}{\sqrt{2}}(|0\rangle - |1\rangle) \] In this way, this protocol not only realizes direct secure transmission, but also introduces authentication and message authentication mechanisms, thereby improving the security and reliability of communication.