Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2018 Mar 15;8(1):4633.
doi: 10.1038/s41598-018-21658-6.

Dynamic Group Multi-party Quantum Key Agreement

Affiliations

Dynamic Group Multi-party Quantum Key Agreement

Yao-Hsin Chou et al. Sci Rep. .

Abstract

This paper presents a novel dynamic group multi-party Quantum Key Agreement (DGMQKA) protocol, achieved by a multicast transmission method. The proposed method is able to achieve arbitrary number of groups and members under the same resources. In addition, it can be dynamically adjusted by joining a new member, combining two groups into one group, revoking an old member and dividing one group into two groups, for different and complex situations. Furthermore, the proposed protocol can be of help to research into Quantum Secret Sharing (QSS), which it complements. The security analysis shows that the proposed protocol can resist both external and internal attacks. In consumption comparison, the proposed protocol using the multicast transmission method is more effective than other current MQKA protocols.

PubMed Disclaimer

Conflict of interest statement

The authors declare no competing interests.

Figures

Figure 1
Figure 1
The procedure of two-group DGMQKA step 3. (a) The process of odd group, (b) The qubit states after operations.
Figure 2
Figure 2
The final states of two group example.
Figure 3
Figure 3
(a) Comparison of number of transmission: ours and references–,–, (b) Comparison of number of qubit for channel checking: ours and references–,–.
Figure 4
Figure 4
Comparison of number of qubit measurement: (a) Comparisons between our protocol and references–,–, (b) Comparisons between our protocol and references,– (enlarged Fig. 4a).

Similar articles

Cited by

References

    1. Bennett, C. H. & Brassard, G. Quantum cryptography: Public key distribution and coin tossing. In in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, 175–179 (1984).
    1. Lo H-K, Chau H-F. Unconditional security of quantum key distribution over arbitrarily long distances. Science. 1999;283:2050–2056. doi: 10.1126/science.283.5410.2050. - DOI - PubMed
    1. Shor PW, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol. Physical Review Letters. 2000;85:441–444. doi: 10.1103/PhysRevLett.85.441. - DOI - PubMed
    1. Mayers D. Unconditional security in quantum cryptography. Journal of the ACM (JACM) 2001;48:351–406. doi: 10.1145/382780.382781. - DOI
    1. Koashi M, Preskill J. Secure quantum key distribution with an uncharacterized source. Physical Review Letters. 2003;90:057902. doi: 10.1103/PhysRevLett.90.057902. - DOI - PubMed

LinkOut - more resources