A verifiable multi-party quantum key distribution protocol based on repetitive codes
نویسندگان
چکیده
A multi-party quantum key distribution protocol based on repetitive code is designed in this paper for the first time. First we encode classical sequence accordance with code. Then unitary transformation of state corresponding to encoded carried out by using parameters from (t, n) threshold protocol. Furthermore, derive two thresholds whether or not reserving measured values received sequence, and extract subkey conforming these conditions. This can authenticate identity participant, resist attack internal external participants, do need decoy particles when testing eavesdropper, which more efficient than similar protocols, also saves resources.
منابع مشابه
A high-speed multi-protocol quantum key distribution transmitter based on a dual-drive modulator.
We propose a novel source based on a dual-drive modulator that is adaptable and allows Alice to choose between various practical quantum key distribution (QKD) protocols depending on what receiver she is communicating with. Experimental results show that the proposed transmitter is suitable for implementation of the Bennett and Brassard 1984 (BB84), coherent one-way (COW) and differential phase...
متن کاملQuantum Clock Synchronization: a Multi-Party Protocol
We present a multi-party quantum clock synchronization protocol that utilizes shared prior entanglement and broadcast of classical information to synchronize spatially separated clocks. Notably, it is necessary only for any one party to publish classical information. Consequently, the efficacy of the method is independent of the relative location of the parties. The suggested protocol is robust...
متن کاملMulti-party Agile Quantum Key Distribution Network with a Broadband Fiber-based Entangled Source
A reconfigurable, multi-party quantum key distribution scheme is experimentally demonstrated by utilizing a poled fiber-based source of broadband polarization-entangled photon pairs and dense wavelengthdivision multiplexing (DWDM). The large bandwidth (> 90 nm centered about 1555 nm) and highly spectrally-correlated nature of the entangled source is exploited to allow for the generation of more...
متن کاملPractical Quantum Key Distribution based on the BB84 protocol
Quantum Cryptography features a unique way of sharing a random sequence of bits between users with a certifiably security not attainable with either public or secret-key classical cryptographic systems. This is achieved by means of Quantum Key Distribution (QKD) techniques, which rely on exploiting the laws of quantum mechanics [1]. Indeed, only systems based on QKD techniques can offer uncondi...
متن کاملA Method of Constructing CSS Codes with LDPC Codes for the BB84 Quantum Key Distribution Protocol
Abstract—In this paper, we propose how to construct a pair of linear codes simply for the BB84 quantum key distribution protocol. This protocol allows unconditional security in the presence of an eavesdropper, and the pair of linear codes is used for error correction and privacy amplification. Since their high decoding performance implies low eavesdropper’s mutual information, the design of the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Sciences
سال: 2022
ISSN: ['0020-0255', '1872-6291']
DOI: https://doi.org/10.1016/j.ins.2021.11.019