Cargando…

Encryption chain based on measurement result and its applications on semi-quantum key distribution protocol

This study proposes a new encoding method, also known as an encryption chain based on the measurement result. Then, using the encryption chain to propose a unitary-operation-based semi-quantum key distribution protocol (SQKD) protocol. In the existing SQKD protocols, semi-quantum environments adopt...

Descripción completa

Detalles Bibliográficos
Autor principal: Yang, Chun-Wei
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9626572/
https://www.ncbi.nlm.nih.gov/pubmed/36319692
http://dx.doi.org/10.1038/s41598-022-23135-7
_version_ 1784822765015007232
author Yang, Chun-Wei
author_facet Yang, Chun-Wei
author_sort Yang, Chun-Wei
collection PubMed
description This study proposes a new encoding method, also known as an encryption chain based on the measurement result. Then, using the encryption chain to propose a unitary-operation-based semi-quantum key distribution protocol (SQKD) protocol. In the existing SQKD protocols, semi-quantum environments adopt a round-trip transmission strategy. In round-trip transmission, the classical participant must resend the received photons to the quantum participant after implementing local operations. Therefore, round-trip transmissions are vulnerable to Trojan horse attacks. Hence, the classical participant must be equipped with a photon number splitter and an optical wavelength filter device against Trojan horse attacks. This is illogical for semi-quantum environments because the burden on the classical participant is significantly increased as it involves the prevention of Trojan horse attacks. The proposed SQKD protocol is congenitally immune to Trojan horse attacks and involves no extra hardware because it is designed based on a one-way transmission as opposed to a round-trip transmission. When compared to the existing SQKD protocols, the proposed SQKD protocol provides the best qubit efficiency, and classical participants only require two quantum capabilities, which enhance its practicability. Moreover, the proposed SQKD protocol is free from collective attacks, Trojan horse attacks, and intercept-resend attacks. Thus, the proposed scheme is more efficient and practical than the existing SQKD protocols.
format Online
Article
Text
id pubmed-9626572
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-96265722022-11-03 Encryption chain based on measurement result and its applications on semi-quantum key distribution protocol Yang, Chun-Wei Sci Rep Article This study proposes a new encoding method, also known as an encryption chain based on the measurement result. Then, using the encryption chain to propose a unitary-operation-based semi-quantum key distribution protocol (SQKD) protocol. In the existing SQKD protocols, semi-quantum environments adopt a round-trip transmission strategy. In round-trip transmission, the classical participant must resend the received photons to the quantum participant after implementing local operations. Therefore, round-trip transmissions are vulnerable to Trojan horse attacks. Hence, the classical participant must be equipped with a photon number splitter and an optical wavelength filter device against Trojan horse attacks. This is illogical for semi-quantum environments because the burden on the classical participant is significantly increased as it involves the prevention of Trojan horse attacks. The proposed SQKD protocol is congenitally immune to Trojan horse attacks and involves no extra hardware because it is designed based on a one-way transmission as opposed to a round-trip transmission. When compared to the existing SQKD protocols, the proposed SQKD protocol provides the best qubit efficiency, and classical participants only require two quantum capabilities, which enhance its practicability. Moreover, the proposed SQKD protocol is free from collective attacks, Trojan horse attacks, and intercept-resend attacks. Thus, the proposed scheme is more efficient and practical than the existing SQKD protocols. Nature Publishing Group UK 2022-11-01 /pmc/articles/PMC9626572/ /pubmed/36319692 http://dx.doi.org/10.1038/s41598-022-23135-7 Text en © The Author(s) 2022 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Article
Yang, Chun-Wei
Encryption chain based on measurement result and its applications on semi-quantum key distribution protocol
title Encryption chain based on measurement result and its applications on semi-quantum key distribution protocol
title_full Encryption chain based on measurement result and its applications on semi-quantum key distribution protocol
title_fullStr Encryption chain based on measurement result and its applications on semi-quantum key distribution protocol
title_full_unstemmed Encryption chain based on measurement result and its applications on semi-quantum key distribution protocol
title_short Encryption chain based on measurement result and its applications on semi-quantum key distribution protocol
title_sort encryption chain based on measurement result and its applications on semi-quantum key distribution protocol
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9626572/
https://www.ncbi.nlm.nih.gov/pubmed/36319692
http://dx.doi.org/10.1038/s41598-022-23135-7
work_keys_str_mv AT yangchunwei encryptionchainbasedonmeasurementresultanditsapplicationsonsemiquantumkeydistributionprotocol