# Semiquantum key distribution with high quantum noise tolerance

@article{Amer2019SemiquantumKD, title={Semiquantum key distribution with high quantum noise tolerance}, author={Omar Amer and Walter O. Krawec}, journal={Physical Review A}, year={2019} }

Semi-quantum key distribution protocols are designed to allow two parties to establish a shared secret key, secure against an all-powerful adversary, even when one of the users is severely restricted in their quantum capabilities. While interesting from a theoretical standpoint, these protocols have the disadvantage that a two-way quantum communication channel is necessary which generally limits their theoretical efficiency and noise tolerance. In this paper, we construct a new semi-quantum key…

## 11 Citations

### Improved semi-quantum key distribution with two almost-classical users

- Computer Science, MathematicsQuantum Information Processing
- 2022

This paper revisits a mediated semi-quantum key distribution protocol, introduced by Massa et al., in 2019, and shows how this protocol may be extended to improve its efficiency and also its noise tolerance, and discusses an extension which allows more communication rounds to be directly usable.

### Scalable Mediated Semi-quantum Key Distribution

- Computer Science, Mathematics
- 2022

This paper designs a circular M-SQKD protocol based on Bell states, which is an approach to realizing multiple “classical” users’ key distribution, and proves the protocol is unconditional security in the asymptotic scenario.

### Mediated semi-quantum key distribution with improved efficiency

- Computer Science, Mathematics
- 2022

A new mediated semi-quantum key distribution protocol is introduced, extending prior work, which has asymptotically perfect efficiency though this comes at the cost of decreased noise tolerance, and is backwards compatible with prior work.

### High-Dimensional Semiquantum Cryptography

- Computer ScienceIEEE Transactions on Quantum Engineering
- 2020

It is shown that, similar to the fully quantum key distribution case, high-dimensional systems can increase the noise tolerance in the semiquantum case and several general security results are proved which are applicable to other (S)QKD protocols (both high- dimensional ones and standard qubit-based protocols) utilizing a two-way quantum channel.

### Security Proof for Circular Mediated Semi-quantum Key Distribution

- Computer Science
- 2022

This paper designs a circular M-SQKD protocol based on Bell states and proves the protocol is unconditional security in the asymptotic scenario and has comparable noise tolerance and can realize key distribution between multiple “classical” users.

### High-Dimensional Semi-Quantum Cryptography

- Computer Science, Mathematics
- 2019

It is shown that, similar to the fully-Quantum key distribution case, high-dimensional systems can increase the noise tolerance in the semi-quantum case.

### Semi-quantum cryptography

- Computer Science, PhysicsQuantum Inf. Process.
- 2020

The history and current state-of-the-art in semi-quantum research is surveyed, including security proof methods and how classical post-processing can be used to counteract users' inability to perform certain quantum operations.

### Efﬁcient and Secure Measure-Resend Authenticated Semi-Quantum Key Distribution Protocol against Reﬂecting Attack

- Computer Science
- 2022

Security analysis proves that the proposed ASQKD protocol can effectively avoid reﬂecting attacks, collective attacks, and other typical attacks and has the following advantages: based on a single photon, it demands less advanced quantum devices, the communication efﬁciency is higher than most protocols, and it reduces the length of the required pre-shared keys.

### Dynamics of quantum correlations for different types of noisy channels

- Physics
- 2020

The effect of noise channels (amplitude damping, phase damping, depolarizing and phase flip) on the behaviors of quantum correlations such as quantum discord (QD), super quantum discord (SQD) within…

### Two single-state semi-quantum secure direct communication protocols based on single photons

- Computer Science, Physics
- 2020

This research presents a probabilistic architecture for semi-quantum protocol that automates the very labor-intensive and therefore time-heavy and expensive process of designing and implementing a protocol.

## References

SHOWING 1-10 OF 56 REFERENCES

### Mediated semiquantum key distribution

- Computer Science, Mathematics
- 2015

This paper designs a new quantum key distribution protocol, allowing two limited semi-quantum or "classical" users to establish a shared secret key with the help of a fully quantum server and proves the unconditional security of this protocol even in the worst case: when this quantum server is an all-powerful adversary.

### Security of a semi-quantum protocol where reflections contribute to the secret key

- Computer Science, MathematicsQuantum Inf. Process.
- 2016

In this work, a complete proof of security is provided by deriving a lower bound of the protocol’s key rate in the asymptotic scenario and finding an error threshold value such that for all error rates less than this threshold, it is guaranteed that A and B may distill a secure secret key.

### Quantum key distribution with mismatched measurements over arbitrary channels

- Computer Science, PhysicsQuantum Inf. Comput.
- 2017

This paper derives key-rate expressions for different quantum key distribution protocols from multiple channel statistics, including those gathered from mismatched measurement bases, and demonstrates that their tolerance to noise is higher than previously thought.

### An information-theoretic security proof for QKD protocols

- Computer Science, Mathematics
- 2005

A new technique based on direct information-theoretic arguments is presented, which gives new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute.

### Semi-Quantum Key Distribution

- Computer Science, MathematicsArXiv
- 2008

This work presents two protocols with this constraint, and proves their robustness against attacks: it is proved that any attempt of an adversary to obtain information necessarily induces some errors that the legitimate parties could notice.

### Security proof of a semi-quantum key distribution protocol

- Computer Science, Mathematics2015 IEEE International Symposium on Information Theory (ISIT)
- 2015

This paper proves the unconditional security of a particular semi-quantum protocol and derive an expression for its key rate, in the asymptotic scenario.

### Information-theoretic security proof for quantum-key-distribution protocols (17 pages)

- Computer Science, Mathematics
- 2005

This work investigates a general class of QKD protocols with one-way classical post-processing and gives new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute.

### Key distillation from quantum channels using two-way communication protocols

- Computer Science
- 2007

The results suggest that there may exist weakly entangling channels useless for key distribution using prepare and measure schemes, and several possibilities to enlarge these bounds are explored.

### Security of two-way quantum key distribution

- Computer Science
- 2013

This work provides a strategy to prove security for two-way quantum key distribution protocols against the most general quantum attack possible by an eavesdropper, and shows that a two- way protocol can outperform comparable one-way protocols.

### Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment

- Computer ScienceInternational Journal of Quantum Information
- 2018

Two new protocols for QPC are proposed, first of which does not use conjugate coding (uses orthogonal states only) and the second one allows the users other than TP to be classical whose activities are restricted to either reflecting a quantum state or measuring it in computational basis.