Improved semi-quantum key distribution with two almost-classical users

@article{Mutreja2022ImprovedSK,
  title={Improved semi-quantum key distribution with two almost-classical users},
  author={Saachi Mutreja and Walter O. Krawec},
  journal={Quantum Information Processing},
  year={2022},
  volume={21}
}
Semi-quantum key distribution (SQKD) protocols attempt to establish a shared secret key between users, secure against computationally unbounded adversaries. Unlike standard quantum key distribution protocols, SQKD protocols contain at least one user who is limited in their quantum abilities and is almost “classical” in nature. In this paper, we revisit a mediated semi-quantum key distribution protocol, introduced by Massa et al. (Experimental quantum cryptography with classical users, 2019… 

References

SHOWING 1-10 OF 44 REFERENCES

Multi-Mediated Semi-Quantum Key Distribution

  • Walter O. Krawec
  • Computer Science, Mathematics
    2019 IEEE Globecom Workshops (GC Wkshps)
  • 2019
TLDR
This work constructs a new protocol in this model and shows how it can withstand high levels of quantum noise, though at a cost to efficiency, and proves a general security result applicable to arbitrary MM-SQKD protocols.

Mediated semi-quantum key distribution with improved efficiency

TLDR
A new mediated semi-quantum key distribution protocol is introduced, extending prior work, which has asymptotically perfect efficiency though this comes at the cost of decreased noise tolerance, and is backwards compatible with prior work.

Mediated semiquantum key distribution

TLDR
This paper designs a new quantum key distribution protocol, allowing two limited semi-quantum or "classical" users to establish a shared secret key with the help of a fully quantum server and proves the unconditional security of this protocol even in the worst case: when this quantum server is an all-powerful adversary.

An Introduction to Practical Quantum Key Distribution

TLDR
This tutorial serves as an introduction to basicQKD along with QKD technology from a practical perspective and is to introduce a larger set of researchers and practitioners to its study in the hopes of furthering its progress and eventual wide-scale adoption.

Two semi-quantum secure direct communication protocols based on Bell states

TLDR
The analysis results show that the two protocols can avoid some eavesdropping attacks and their qubit efficiency is higher than some current related quantum or semi-quantum protocols.

Semi-quantum cryptography

TLDR
The history and current state-of-the-art in semi-quantum research is surveyed, including security proof methods and how classical post-processing can be used to counteract users' inability to perform certain quantum operations.

Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment

TLDR
Two new protocols for QPC are proposed, first of which does not use conjugate coding (uses orthogonal states only) and the second one allows the users other than TP to be classical whose activities are restricted to either reflecting a quantum state or measuring it in computational basis.

High-Dimensional Semiquantum Cryptography

TLDR
It is shown that, similar to the fully quantum key distribution case, high-dimensional systems can increase the noise tolerance in the semiquantum case and several general security results are proved which are applicable to other (S)QKD protocols (both high- dimensional ones and standard qubit-based protocols) utilizing a two-way quantum channel.

Information-theoretic security proof for quantum-key-distribution protocols (17 pages)

TLDR
This work investigates a general class of QKD protocols with one-way classical post-processing and gives new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute.

An Efficient Semi-Quantum Key Distribution Protocol and Its Security Proof

TLDR
This study proposes an efficient semi-quantum key distribution protocol that allows Alice and quantum-capable restricted Bob to establish a secure key and demonstrates that the protocol is information-theoretic secure in the asymptotic scenario.