Collective attack free controlled quantum key agreement without quantum memory

Arindam Dutta,Anirban Pathak
2023-08-10
Abstract:Here we present a new protocol for controlled quantum key agreement and another protocol for key agreement with a specific focus on the security analysis. Specifically, detailed security proof is provided against impersonated fraudulent attack and collective attacks and it is established that the proposed protocols are not only secure, but they also satisfy other desired properties of such schemes (i.e., fairness and correctness). Further, the proposed schemes are critically compared with a set of schemes for quantum key agreement and an existing scheme for controlled quantum key agreement (Tang et al.'s protocol) in terms of efficiency and the required quantum resources. Especially, it is observed that in contrast to the existing schemes, the present scheme does not require quantum memory. In addition, the protocol for controlled quantum key agreement proposed here is found to require quantum resources (Bell state and single photon state) that are easier to produce and maintain compared to the quantum resources (GHZ states) required by the only known existing protocol for the same purpose, i.e., Tang et al.'s protocol.
Quantum Physics
What problem does this paper attempt to address?
The problem that this paper attempts to solve is to implement a new protocol in Quantum Key Agreement (QKA), which can perform Controlled Quantum Key Agreement (CQKA) without using quantum memory. Specifically, the author proposes two new protocols: 1. **A new protocol for Controlled Quantum Key Agreement**: This protocol allows two legitimate parties (Alice and Bob) to reach a consistent key under the control of the controller (Charlie). The key to the protocol lies in its security analysis, especially the security proofs against impersonated fraudulent attacks and collective attacks. 2. **A new protocol for Quantum Key Agreement**: This protocol focuses on the security analysis of key agreement and is compared with existing Quantum Key Agreement protocols, especially in terms of efficiency and required quantum resources. ### Main contributions - **Security**: The paper has detailedly proven the security of the proposed protocols against impersonated fraudulent attacks and collective attacks. - **Fairness and correctness**: The protocols not only ensure security but also meet the requirements of fairness and correctness, that is, all legitimate participants equally influence the final key, and each participant can obtain the correct key. - **Optimization of quantum resources**: Compared with existing protocols, the proposed protocols do not require quantum memory, and the quantum resources used (such as Bell states and single - photon states) are easier to generate and maintain, which makes the protocols more practical. ### Background Quantum Key Agreement (QKA) is an important research direction in quantum cryptography, aiming to enable multiple participants to reach a consistent key through quantum resources. Traditional classical key agreement protocols rely on computational complexity, but with the development of quantum computers, the security of these protocols has been challenged. Therefore, it is particularly important to use the characteristics of quantum mechanics (such as measurement collapse, the no - cloning theorem, the Heisenberg uncertainty principle, non - locality and contextuality) to design unconditionally secure quantum key agreement protocols. ### Specific description of the problem The main problems mentioned in the paper are: - **How to implement Controlled Quantum Key Agreement without using quantum memory**: Existing Controlled Quantum Key Agreement protocols usually require quantum memory, which is a limiting factor in practical applications. This paper proposes a new protocol that avoids the need for quantum memory by using Bell states and single - photon states as quantum resources. - **How to ensure the security, fairness and correctness of the protocol**: The paper provides detailed mathematical proofs, showing that the proposed protocols can resist various attacks while meeting the requirements of fairness and correctness. By solving these problems, the paper provides a new, more efficient and more practical solution in the field of quantum key agreement.