Skip to main content

ORIGINAL RESEARCH article

Front. Phys., 13 October 2022
Sec. Quantum Engineering and Technology
This article is part of the Research Topic Multiparty Secure Quantum and Semiquantum Computations View all 19 articles

Multi-party semi-quantum key distribution protocol based on hyperentangled Bell states

Yuan Tian
Yuan Tian1*Jian LiJian Li2Chongqiang YeChongqiang Ye3Chaoyang LiChaoyang Li4
  • 1College of Information and Control Engineering, Xi’an University of Architecture and Technology, Xi'an, China
  • 2School of Cyberspace Security, Beijing University of Post and Telecommunications, Beijing, China
  • 3Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Post and Telecommunications, Beijing, China
  • 4College of Software Engineering, Zhengzhou University of Light Industry, Zhengzhou, China

Semi-quantum key distribution allows generating a raw key between two communication participants, in which the sender is a quantum participant and the receiver is a classical participant. This article presents an original semi-quantum key distribution protocol based on hyperentangled Bell states. The hyperentangled Bell states can be entangled simultaneously in polarization and spatial degrees of freedom, enhancing channel capacity. According to the characteristics of hyperentangled Bell states, the proposed protocol is more efficient than the protocol based on Bell states. Moreover, the measure–resend attack, the intercept–resend attack, and the entangle–measure attack are analyzed in detail. The security analysis demonstrates that the proposed protocol is secure. In addition, a multi-party semi-quantum key distribution scheme based on hyperentangled Bell states is proposed, which can realize key distribution between one quantum participant and multiple classical participants.

1 Introduction

A traditional cryptographic protocol is the foundation of information security in public network channels [13]. With the successful development of quantum computers and quantum computing, the traditional classical encryption algorithm based on mathematical problems has been seriously threatened [4]. Different from traditional cryptography, quantum cryptography is based on quantum physics [5] and information science to guarantee communication security [6]. Therefore, quantum information processing has gained increasing attention for potential applications such as quantum communication technology and quantum computing. Quantum communication technology is based on quantum cryptography to solve the potential problem of channel eavesdropping, which has provable security. Quantum communication includes quantum key distribution (QKD) [7, 8], quantum secure direction communication (QSDC) [9, 10], quantum secret sharing (QSS) [11, 12], quantum private comparison (QPC) [13, 14] etc. Quantum key distribution protocol, as a significant field of quantum cryptography, is a quantum cryptography protocol, which can be verified theoretically and experimentally.

The BB84 protocol [15], the initial quantum key distribution protocol, was presented by Bennett and Brassard in 1984. It guarantees the secure transmission of keys between two participants. The BB84 protocol had gained widespread attention when it was proposed, and many researchers began to study the QKD protocol since BB84 was presented, such as Ekert91 protocol [16], BBM92 protocol [17], SARG04 protocol [18], and so on. In recent years, the latest protocols and the development of QKD were presented [1922]. However, the traditional QKD protocols require all communication participants to have quantum capability and quantum devices [23], which are too complex and expensive to realize. At present, only a few environments can be implemented. These are also important factors hindering QKD’s current development.

Aiming at the problems faced in complex quantum operations and expensive quantum devices, the concept of “semi-quantum” was proposed for the first time by Boyer et al. [24]. They proposed the first semi-quantum key distribution protocol in 2007. Alice, a sender, has quantum capability, and Bob, a receiver, has classical capability. The classical capability is restricted within the following operations : (1) reflecting the qubits with no disturbance ; (2) measuring the qubits with basis Z; (3) preparing the fresh qubits with basis Z; and (4) reordering the qubits via delay lines. Because the concept of “semi-quantum” requires less quantum power and resources and is easy to implement, it has received extensive attention, has been studied by an increasing number of scholars, and even extended to other directions such as semi-quantum distribution (SQKD) protocols [2533], semi-quantum secret sharing (SQSS) protocols [3437], semi-quantum private comparison (SQPC) protocols [3841], etc. In 2009, Zou et al. [25] put forward five SQKD protocols based on three quantum states, two quantum states, and one quantum state, and strong proofs are given. In 2011, an SQKD protocol based on Bell states was devised by Wang et al. [26]. Without invoking the classical participant’s measurement capability, an efficient SQKD protocol was designed by Zou et al. [27] in 2015. In 2017, an SQKD protocol that limits the quantum sender’s measurement capabilities was presented by Krawec et al. [28]. Two semi-quantum key distribution protocols based on GHZ states were proposed by Zhu et al. [29] in 2018. The presented protocol had higher noise tolerance than the “fully quantum” protocol. Iqbal et al. [30] designed an SQKD protocol based on high-dimensional quantum states which increased the noise tolerance in 2019. In 2020, Ye et al. [31] proposed a novel SQKD based on single photons in both polarization and spatial-mode degrees of freedom, which improved the capacity of quantum communication. In 2021, Tian et al. [32] presented an efficient SQKD based on EPR and single-particle hybridization, which has higher efficiency than that found in the similar literature. An efficient SQKD protocol based on single photons in both polarization and spatial-mode degrees of freedom was proposed by Ye et al. [33], which has double quantum communication capacity.

The hyperentangled states not only contain the entanglement between multi-particles but also multi-dimensional entanglements, such as spatial degree of freedom and polarization degree of freedom [42]. The way to transmit secret information safely is to measure the spatial degree of freedom and polarization degree of freedom of a photon by hyperentangled Bell state measurement to change the spatial degree of freedom and polarization degree of freedom of another photon.

To improve the efficiency and security of information transmission, reducing the responsibility of the protocol, this study proposes a semi-quantum key distribution protocol based on hyperentangled Bell states. In addition, the security analysis of the protocol shows that the proposed protocol can effectively resist the measure–resend attack, intercept–resend attack, and entangle–measure attack. It is demonstrated that the proposed protocol is efficient and secure. In the process of key distribution, sometimes not only two participants but also multiple participants are required. Considering that more scenarios are applicable, we design a semi-quantum key distribution protocol that satisfies multiple participants and achieves more than the previous key distribution between two participants.

This article is organized as follows: Section 2 proposes the semi-quantum distribution protocol, Section 3 gives the security proof and comparison of the protocol, Section 4 designs the multi-party semi-quantum distribution protocol, and Section 5 summarizes it.

2 Semi-quantum key distribution protocol

In this section, we introduce the hyperentangled Bell states and propose an SQKD protocol based on the hyperentangled Bell states.

2.1 The hyperentangled Bell states

We present the hyperentangled Bell states as follows:

|Φps12=|μp12|νs12,(1)

where 1 and 2 represent the two qubits in the hyperentangled Bell states and p, s represent the polarization degree of freedom and the spatial degree of freedom, respectively.

Under the polarization degree of freedom |μp12, the Bell states can be described as follows:

|ϕ±p12=12|HH±|VV,(2)
|ψ±p12=12|HV±|VH,(3)

where |H⟩, |V⟩ are the horizontal and the vertical polarizations, respectively.

Under the spatial degree of freedom |νs12, the Bell state can be described as follows:

|ϕ±s12=12|RR±|LL,(4)
|ψ±s12=12|RL±|LR,(5)

where |R⟩, |L⟩ are orthogonal spatial states.

2.2 Protocol

Based on hyperentangled Bell states, the quantum sender Alice and the classical receiver Bob can produce secure keys. In this protocol, Alice has full quantum capabilities, with the potential to generate and measure the qubits with an arbitrary basis. Bob has classical capabilities, with the potential to only prepare and measure the qubits with Z basis. The proposed protocol comprises the following six steps.

Step 1: Alice generated N = 4n hyperentangled Bell states, which are chosen from sets {|ϕ±p12|ϕ±s12,|ψ±p12|ϕ±s12,|ψ±p12|ψ±s12,|ϕ±p12|ψ±s12}, where 1, 2 represent the two particles of each state. Alice implemented particle 1 to compose the sequence A = {A1, A2, … , AN} and particle 2 to compose the sequence B = {B1, B2, … , BN}. Then, she held the A sequence in her hands and transmitted the B sequence to Bob.

Step 2: When Bob received the qubits, he randomly performed two operations. CTRL operation: reflecting the qubits to Alice with no disturbance and SIFT operation: measuring the qubits with base ZPZS and resending the same states to Alice.

Step 3: When the qubits arrived, Alice notified Bob that she has received them. Bob announced the operations of qubits, which he performed.

Step 4: Alice and Bob conducted eavesdropping detection. For CTRL particles, Alice combined particle 2 with the corresponding particle 1 and recorded hyperentangled Bell state measurements. The measurement results should be the same as what Alice sent. If the error rate exceeds the threshold value, Alice and Bob will terminate this protocol. Otherwise, they will move on to the next step.

Step 5: For SIFT particles, Alice carried out ZPZS base measurement on particle 1. Alice randomly selected n measurement results from particle 1, in which Bob chose SIFT operation. Alice and Bob checked the error rate, and Alice’s measurements should be equal to Bob’s measurements. If the error rate is higher than the threshold value, the protocol will be discarded. Otherwise, they will proceed with the next step.

Step 6: Alice and Bob performed error correcting code (ECC) and privacy amplification (PA) for the remaining n measurement results, in which Bob chose SIFT operation to obtain the final keys.

Table 1 gives a description of Alice’s and Bob’s operations when Alice transmitted |ϕ+p2|ϕ+s2 to Bob.

TABLE 1
www.frontiersin.org

TABLE 1. One example description of Alice’s and Bob’s operations.

3 Security analysis and comparison

A malicious eavesdropper, Eve, attempted to obtain the significant keys between Alice and Bob in this communication. Eve may attack keys by the measure–resend attack, intercept–resend attack, and entangle–resend attack.

3.1 Measure–resend attack

When Alice transmitted qubits to Bob via the quantum channel, Eve measured qubits from Alice and sent the measured qubits to Bob. Eve is eager to obtain the significant operations, which is chosen by Bob. Unfortunately, no matter what measures Eve took, errors will be introduced. When Alice and Bob conduct eavesdropping detection, Eve will be found.

Without loss of generality, Alice prepared the hyperentangled Bell states |ϕ+p12|ϕ+s12 and sent the particle 2 sequence to Bob. The security analysis of hyperentangled Bell states |ϕp12|ϕs12, |ψ±p12|ϕ±s12, |ψ±p12|ψ±s12 and |ϕ±p12|ψ±s12 are similar to |ϕ+p12|ϕ+s12.

Eve intercepted the particles and recorded base ZPZS measurement on |ϕ+p2|ϕ+s2. The qubit is collapsed to |0⟩ ⊗|0⟩, |0⟩ ⊗|1⟩, |1⟩ ⊗|0⟩, or |1⟩ ⊗|1⟩, each with 25% probability. After measurement, we suppose that Eve transmitted the states |0⟩ ⊗|0⟩ to Bob (if Eve’s measurement results are the rest of three results, the analysis is similar to the mentioned analysis). When Bob received the qubits, he chose CTRL operation or SIFT operation at random. If Bob chose CTRL operation, Alice performed hyperentangled Bell state measurement on the reflected qubit and the remaining qubit. Because Eve destroyed particle 2 from the hyperentangled Bell states, particle 2 has been changed, which is differently sent by Alice. The hyperentangled Bell states are collapsed to |ϕ+p12|ϕ+s12, |ϕp12|ϕ+s12, |ϕ+p12|ϕs12 and |ϕp12|ϕs12, each with 25% probability. Alice can gain the initial measurement results |ϕ+p12|ϕ+s12 with 1/4 probability. Therefore, Eve will be detected with the probability of 75% by the security check of Step 4. If Bob chose CTRL operation, there is no error introduced in this case. So Eve will not be detected.

Therefore, the proposed protocol can resist the measure–resend attack.

3.2 Intercept–resend attack

When Alice transmitted qubits to Bob via the quantum channel, Eve intercepted qubits from Alice and resent faked qubits, which were generated by Eve to Bob. Eve wanted to figure out which operation Bob had chosen. Unfortunately, irrespective of the measures taken by Eve, errors will be introduced. When Alice and Bob conduct eavesdropping detection, Eve will be found.

Without loss of generality, Alice prepares the hyperentangled Bell states |ϕ+p12|ϕ+s12 and sends the particle 2 sequence to Bob. The security analysis of hyperentangled Bell states |ψp12|ϕs12, |ψ±p12|ψ±s12 and |ϕ±p12|ψ±s12 are similar to |ϕ+p12|ϕ+s12.

Eve intercepted the particles and generated hyperentangled Bell states |ϕp12|ϕs12 (if Eve generated the remaining three hyperentangled Bell states, the analysis is similar to the mentioned analysis). Eve transmitted particle 2 to Bob because Eve reflected the qubits directly from Alice, and if Bob selected CTRL operation, there is no error introduced in this case. If Bob selects SIFT operation, the received qubits will be measured with base ZPZS, and the qubits will collapse to |0⟩ ⊗|0⟩, |0⟩ ⊗|1⟩, |1⟩ ⊗|0⟩, and |1⟩ ⊗|1⟩, each with 25% probability. When Alice received qubits, the received qubits with base ZPZS will be measured with ease, and the qubits will collapse to |0⟩ ⊗|0⟩, |0⟩ ⊗|1⟩, |1⟩ ⊗|0⟩, and |1⟩ ⊗|1⟩, each with 25% probability. Alice and Bob obtain the same measurement results with 1/4 probability. Therefore, Eve can be detected with the probability of 75% by the security check of Step 5.

Therefore, the proposed protocol can resist the intercept–resend attack.

3.3 Entangle–measure attack

When Alice transmitted qubits to Bob via the quantum channel, Eve entangled the ancillary qubits to the transmitted qubits from Alice. When the qubits were transmitted back to Alice, Eve measured the transmitted qubits to obtain Bob’s measurement results. The implementation of the entangle–measure attack is shown in Figure 1. Unfortunately, irrespective of the measures taken by Eve, errors will be introduced. When Alice and Bob conduct eavesdropping detection, Eve will be found.

FIGURE 1
www.frontiersin.org

FIGURE 1. Entangle–measure attacks with two operations Ue and Uf.

Without loss of generality, it is assumed that Alice sent |ϕ+p2|ϕ+s2 to Bob and Eve performed unitary operation Ue to entangle the ancillary qubit |e⟩ with the target qubits and sent to Bob. When the qubits returned to Alice, Eve measured the ancillary qubit |e⟩ to get the information. For the target qubits |ϕ+p2|ϕ+s2, which are sent by Alice, after Ue, the states become as follows:

Ue|Hp2|Rs2|e=|Hp2|ehh+|Vp2|ehv|Rs2|err+|Ls2|erl,(6)
Ue|Hp2|Ls2|e=|Hp2|ehh+|Vp2|ehv|Rs2|elr+|Ls2|ell,(7)
Ue|Vp2|Rs2|e=|Hp2|evh+|Vp2|evv|Rs2|err+|Ls2|erl,(8)
Ue|Vp2|Ls2|e=|Hp2|evh+|Vp2|evv|Rs2|elr+|Ls2|ell,(9)

where |ehh⟩, |ehv⟩, |evh⟩, |evv⟩, |err⟩, |erl⟩, |elr⟩, and |ell⟩ are the pure ancillary states, which are controlled by the operation Ue.

Eve expected to pass the eavesdropping detection, where the operation Ue does not introduce errors. According to Eqs. 69, it can be inferred that

|ehv=|erl=|elr=|evh=0.(10)

Then, Eve sent the qubits to Bob. Bob selected CTRL operation or SIFT operation on the qubits when he received them, and Bob returned the qubits to Alice. Eve carried out unitary operation Uf on the qubits which Bob transmitted back to Alice.

Case 1: Bob performed SIFT operation and returned the qubits to Alice. Eve performed Uf on the states sent back to Alice.

Uf|Hp2|ehh|Rs2|err=|Hp2|fhh|Rs2|frr,(11)
Uf|Hp2|ehh|Ls2|ell=|Hp2|fhh|Ls2|fll,(12)
Uf|Vp2|evv|Rs2|err=|Vp2|fvv|Rs2|frr,(13)
Uf|Vp2|evv|Ls2|ell=|Vp2|fvv|Ls2|fll.(14)

Case 2: Bob performed CTRL operation and did nothing on the qubits. Therefore, after entangling the ancillary particle on the hyperentangled Bell states, the states become as follows:

Uf|ϕ+p12|ϕ+s12=12|H1|H2|fhh+|V2|fhv+|V1|H2|fvh+|V2|fvv|R1|R2|frr+|L2|frl+|L1|R2|flr+|L2|fll=12|H1H2|fhh+|H1V2|fhv+|V1H2|fvh+|V1V2|fvv|R1R2|frr+|R1L2|frl+|L1R2|flr+|L1L2|fll=12|ϕ+p12+|ϕp12|fhh+|ψ+p12+|ψp12|fhv+|ψ+p12|ψp12|fvh+|ϕ+p12|ϕp12|fvv|ϕ+s12+|ϕs12|frr+|ψ+s12+|ψs12|frl+|ψ+s12|ψs12|flr+|ϕ+s12|ϕs12|fll=12|ϕ+p12|fhh+|ϕp12|fhh+|ψ+p12+|ψp12|fhv+|ψ+p12|ψp12|fvh+|ϕ+p12|fvv|ϕp12|fvv|ϕ+s12|frr+|ϕs12|frr+|ψ+s12+|ψs12|frl+|ψ+s12|ψs12|flr+|ϕ+s12|fll|ϕs12|fll=12|ϕ+p12|fhh+|fvv+|ϕp12|fhh|fvv+|ψ+p12+|ψp12|fhv+|ψ+p12|ψp12|fvh|ϕ+s12|frr+|fll+|ϕs12|frr|fll+|ψ+s12+|ψs12|frl+|ψ+s12|ψs12|flr.(15)

Eve expected to pass the eavesdropping detection, so Uf should not change the states which were sent by Alice. Therefore, from Eq. 15, it can be inferred that

|fhh|fvv=0,(16)
|frr|fll=0,(17)
|fhv=|fvh=|frl=|flr=0.(18)

According to Eqs. 1618, Eqs. 1114 can be rewritten as follows:

Uf|Hp2|ehh|Rs2|err=|Hp2|fhh|Rs2|frr,(19)
Uf|Hp2|ehh|Ls2|ell=|Hp2|fhh|Ls2|fll=|Hp2|fhh|Ls2|frr,(20)
Uf|Vp2|evv|Rs2|err=|Vp2|fvv|Rs2|frr=|Vp2|fhh|Rs2|frr,(21)
Uf|Vp2|evv|Ls2|ell=|Vp2|fvv|Ls2|fll=|Vp2|fhh|Ls2|frr.(22)

According to the aforementioned equations, Eve’s probes are dependent on the corresponding states. Once Eve acquired the information, the eavesdropping behavior will introduce the error and be detected. So, Eve cannot acquire any valuable information.

For security analysis of qubits |ψp12|ϕs12, |ψ±p12|ψ±s12, |ψ±p12|ϕ±s12, and |ϕ±p12|ψ±s12 are similar to |ϕ+p12|ϕ+s12.

Consequently, the proposed protocol can resist the entangle–measure attack.

3.4 Comparison

The efficiency of key distribution can be improved by using the properties of hyperentangled Bell states. For example, Bell states can transmit two bits of classical information each time, while hyperentangled Bell states can transmit four bits of classical information each time, twice as much as Bell states. Specifically, the proposed protocols transmitted two bits in each interaction, and the previous SQKD based on the Bell state can only transmit one bit.

The efficiency qubit can use equation η = c/(q + b) for calculation, where c represents the compared classical participants, q represents particles generated by the quantum participant, and b represents particles generated by the classical participant. In Boyer et al. [24], the quantum resource is single photon; Alice prepared eight particles, and Bob measured and prepared four particles. Hence, η = c/(q + b) = 1/(8 + 4) = 1/12. Wang et al. [26] used the Bell states to describe an SQPC protocol, wherein Alice generated four particles and Bob measured and prepared two particles. Therefore, η = c/(q + b) = 1/(4 + 2) = 1/6. Zhu et al. [29] employed GHZ states to construct an SQPC protocol. Therefore, η = c/(q + b) = 1/(12 + 2) = 1/14. In Ye et al. [33], the single photon in two degrees of freedom is used to implement quantum key distribution. Alice prepared six particles, and Bob measured and prepared three particles. So, η = c/(q + b) = 2/(6 + 3) = 2/9. In the proposed protocol, SQKD is based on hyperentangled Bell states, Alice randomly prepared eight particles, and Bob measured and prepared four particles. Hence, η = c/(q + b) = 2/(8 + 4) = 1/6.

Table 2 shows the comparison between the proposed protocol and some protocols. It can be seen that this protocol and protocol [33] expand the degree of freedom of particles from a single degree of freedom to two degrees of freedom. This increases the communication capacity. The proposed protocol takes Bell states as an example to discuss the multiple degrees of freedom of the entangled state, which provides an indication for further research of various entangled states (GHZ states, cluster states, etc.).

TABLE 2
www.frontiersin.org

TABLE 2. Comparison.

4 Multi-party semi-quantum key distribution protocol

In this section, the previously proposed protocol is extended to a multi-party semi-quantum key distribution protocol (MPSQKD), which can realize that one quantum participant distributes keys among T (T > 1) classical participants.

Here, set U1, U2, … , UT is referred as existing classical participants. In MPSQKD, only Alice has full quantum capability and can perform any quantum operation. Others are limited to measuring and preparing qubits with base ZPZS and realize the key distribution with the help of Alice. The following steps are part of the MPSQKD protocol.

Step 1: Alice generated 2T+1N hyperentangled Bell states in the set {|ϕ±p12|ϕ±s12,|ψ±p12|ϕ±s12,|ψ±p12|ψ±s12,|ϕ±p12|ψ±s12}. Subsequently, Alice transmitted particle 2 of each hyperentangled Bell state to the first user U1.

Step 2: T classical participants are sorted in the order of U1, U2, … , UT. The former classical participant randomly selected measurement or reflection operation and then back to the latter participant. The last participant randomly selected a measurement or reflection operation back to Alice.

Step 3: After Alice received all the qubits, U1, U2, … , UT published their specific choices.

Step 4: According to the operation of their choices, Alice will take a different operation.

Case 1: When all classical participants chose SIFT operation, the measurement results of U1, U2, … , UT will be raw keys.

Case 2: When all classical participants chose CTRL operation, Alice will check whether an eavesdropper arises. The results announced by Alice should be the same as prepared. Once the error rate is higher than the threshold, the protocol will be terminal.

Case 3: the classical participants discarded the qubits whose operations performed differently.

Step 5: T classical participants recorded some measurement results to check the eavesdropper of Case 1.

Step 6: U1, U2, … , UT will own the final keys after promulgating the error correcting code (ECC) and privacy amplification (PA) data.

5 Conclusion

In this study, a novel semi-quantum key distribution protocol based on the hyperentangled Bell states is proposed. Alice has quantum capability and transmitted the hyperentangled Bell states to the classical participant Bob. Bob randomly performed two operations on the received qubits. Communication participants used the hyperentangled Bell states to realize the secure transmission. The security analysis proves that this scheme can effectively resist the measure–resend attack, intercept–resend attack, and entangle–measure attack. Hence, the proposed protocol is secure. The hyperentangled states dramatically improves the efficiency of key transmission, which effectively improves the efficiency and feasibility of the protocol. Moreover, a multi-party scenario protocol based on the hyperentangled Bell stats is presented, realizing key distribution for multiple classical participants. The proposed protocol is the first SQKD protocol based on multi-degree of freedom entangled states, which has a certain guiding role for future research.

Data availability statement

The original contributions presented in the study are included in the article/Supplementary Material; further inquiries can be directed to the corresponding author.

Author contributions

YT is responsible for proposing innovative points, designing protocol steps, analyzing and designing, and writing paper. JL is responsible for the overall structure and content design of the paper. CY is responsible for paper preparation, protocol correctness and security analysis. CL is responsible for the polishing and proofreading of paper.

Funding

This work is supported by the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province No. SKLACSS-202108, the National Natural Science Foundation of China under Grant Nos. 92046001 and 61962009, the Fundamental Research Funds for the Central Universities under Grant 2019XD-A02, and the Open Research Project of the State Key Laboratory of Media Convergence and Communication under Grant KLMCC2020KF006.

Acknowledgments

We would like to thank the anonymous reviewers for their detailed reviews and valuable comments, which have enhanced the quality of this manuscript.

Conflict of interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher’s note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors, and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

1. Xia ZH, Jiang LQ, Liu DD, Li LH, Jeon B. Boew: A content-based image retrieval scheme using bag-of-encrypted-words in cloud computing. IEEE Trans Comput (2019)(1) 1.

Google Scholar

2. Xia ZH, Wang L, Tang J, Xiong N, Weng J. A privacy-preserving image retrieval scheme using secure local binary pattern in cloud computing. IEEE Trans Netw Sci Eng (2020) 8(1):318–30. doi:10.1109/tnse.2020.3038218

CrossRef Full Text | Google Scholar

3. Xia ZH, Zhou WH, Xiong LZ, Weng J, Xiong NX. Str: Secure computation on additive shares using the share-transform-reveal strategy. IEEE Trans Comput (2021) 1. doi:10.1109/tc.2021.3073171

CrossRef Full Text | Google Scholar

4. Aumasson JP. The impact of quantum computing on cryptography. Computer Fraud Security (2017) 2017(6):8–11. doi:10.1016/s1361-3723(17)30051-9

CrossRef Full Text | Google Scholar

5. Diffie W, Hellman M. New directions in cryptography. IEEE Trans Inf Theor (1976) 22(6):644–54. doi:10.1109/tit.1976.1055638

CrossRef Full Text | Google Scholar

6. Pan XB, Chen XB, Xu G, Ahmad H, Yang YX, Li ZP, et al. Controlled quantum network coding without loss of information. Comput Mater Continua (2021) 69(3):3967–79. doi:10.32604/cmc.2021.017087

CrossRef Full Text | Google Scholar

7. Guo GP, Li CF, Shi BS, Li J, Guo GC. Quantum key distribution scheme with orthogonal product states. Phys Rev A (Coll Park) (2001) 64(4):042301. doi:10.1103/physreva.64.042301

CrossRef Full Text | Google Scholar

8. Kronberg DA, Nikolaeva AS, Kurochkin YV, Fedorov AK. Quantum soft filtering for the improved security analysis of the coherent one-way quantum-key-distribution protocol. Phys Rev A (Coll Park) (2020) 101(3):032334. doi:10.1103/physreva.101.032334

CrossRef Full Text | Google Scholar

9. Deng FG, Long GL, Liu XS. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys Rev A (Coll Park) (2003) 68(4):042317–114. doi:10.1103/physreva.68.042317

CrossRef Full Text | Google Scholar

10. Sun Z, Song L, Huang Q, Yin L, Long G, Lu J, et al. Toward practical quantum secure direct communication: A quantum-memory-free protocol and code design. IEEE Trans Commun (2020) 68(9):5778–92. doi:10.1109/tcomm.2020.3006201

CrossRef Full Text | Google Scholar

11. Hillery M, Nek V., Berthiaume A. Quantum secret sharing. Phys Rev A (Coll Park) (1999) 59(3):1829–34. doi:10.1103/physreva.59.1829

CrossRef Full Text | Google Scholar

12. Yang CW, Tsai CW. Efficient and secure dynamic quantum secret sharing protocol based on Bell states. Quan Inf Process (2020) 19(5):162–14. doi:10.1007/s11128-020-02662-0

CrossRef Full Text | Google Scholar

13. Yang YG, Wen QY. An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J Phys A: Math Theor (2009) 42(5):055305. doi:10.1088/1751-8113/42/5/055305

CrossRef Full Text | Google Scholar

14. Lang YF. Quantum private comparison using single Bell state. Int J Theor Phys (Dordr) (2021) 60:4030–6. doi:10.1007/s10773-021-04937-3

CrossRef Full Text | Google Scholar

15. Bennett CH, Brassard G. Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of the IEEE international conference on computers, systems and signal processing. Bangalore (1984). p. 175–9.

Google Scholar

16. EkertArtur K. Quantum cryptography based on Bell’s theorem. Phys Rev Lett (1991) 67(6):661–3. doi:10.1103/physrevlett.67.661

PubMed Abstract | CrossRef Full Text | Google Scholar

17. Bennett CH. Quantum cryptography using any two nonorthogonal states. Phys Rev Lett (1992) 68:3121–4. doi:10.1103/physrevlett.68.3121

PubMed Abstract | CrossRef Full Text | Google Scholar

18. Scarani V, Acin A, Ribordy G, Gisin N. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulses implementations. Phys Rev Lett (2004) 92(5):057901.1–057901.4.

PubMed Abstract | CrossRef Full Text | Google Scholar

19. Yan X, Zhou N, Gong L, Wang Y, Wen X. High-dimensional quantum key distribution based on qudits transmission with quantum Fourier transform. Quan Inf Process (2019) 18(9):271–14. doi:10.1007/s11128-019-2368-5

CrossRef Full Text | Google Scholar

20. Srikara S, Thapliyal K, Pathak A. Continuous variable B92 quantum key distribution protocol using single photon added and subtracted coherent states. Quan Inf Process (2020) 19(10):371–16. doi:10.1007/s11128-020-02872-6

CrossRef Full Text | Google Scholar

21. Wu X, Wang Y, Huang D, Guo Y. Multi-mode plug-and-play dual-phase-modulated continuous-variable quantum key distribution. Quan Inf Process (2021) 20(4):143–21. doi:10.1007/s11128-021-03076-2

CrossRef Full Text | Google Scholar

22. Li CY, Ye CQ, Tian Y, Chen XB, Li J. Cluster-state-based quantum secret sharing for users with different abilities. Quan Inf Process (2021) 20(12):385–14. doi:10.1007/s11128-021-03327-2

CrossRef Full Text | Google Scholar

23. Bennett CH, Wiesner SJ. Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. Phys Rev Lett (1992) 69(20):2881–4. doi:10.1103/physrevlett.69.2881

PubMed Abstract | CrossRef Full Text | Google Scholar

24. Boyer M, Kenigsberg D, Mor T. Quantum key distribution with classical Bob. Phys Rev Lett (2007) 99(14):140501. doi:10.1103/physrevlett.99.140501

PubMed Abstract | CrossRef Full Text | Google Scholar

25. Zou X, Qiu D, Li L, Wu L, Li L. Semi-quantum key distribution using less than four quantum states. Phys Rev A (Coll Park) (2009) 79(5):052312–1747. doi:10.1103/physreva.79.052312

CrossRef Full Text | Google Scholar

26. Wang J, Zhang S, Zhang Q, Tang CJ. Semi-quantum key distribution using entangled states. Chin Phys Lett (2011) 28(10):100301. doi:10.1088/0256-307x/28/10/100301

CrossRef Full Text | Google Scholar

27. Zou X, Qiu D, Zhang S, Mateus P. Semi-quantum key distribution without invoking the classical party’s measurement capability. Quan Inf Process (2015) 14(8):2981–96. doi:10.1007/s11128-015-1015-z

CrossRef Full Text | Google Scholar

28. Krawec WO, Geiss EP. Limited resource semi-quantum key distribution. arXiv preprint arXiv:1710.05076 (2017).

Google Scholar

29. Zhu KN, Zhou NR, Wang YQ, Wen XJ. Semi-quantum key distribution protocols with GHZ states. Int J Theor Phys (Dordr) (2018) 57(12):3621–31. doi:10.1007/s10773-018-3875-3

CrossRef Full Text | Google Scholar

30. Iqbal H, Krawec WO. Semi-quantum cryptography. Quan Inf Process (2020) 19(3):97–52. doi:10.1007/s11128-020-2595-9

CrossRef Full Text | Google Scholar

31. Ye TY, Li HK, Hu JL. Semi-quantum key distribution with single photons in both polarization and spatial-mode degrees of freedom. Int J Theor Phys (Dordr) (2020) 59(9):2807–15. doi:10.1007/s10773-020-04540-y

CrossRef Full Text | Google Scholar

32. Tian Y, Li J, Yuan KG, Li CY, Li HJ, Chen XB. An efficient semi-quantum key distribution protocol based on EPR and single-particle hybridization. Quan Inf Comput (2021) 21(7-8):563–76. doi:10.26421/qic21.7-8-3

CrossRef Full Text | Google Scholar

33. Ye TY, Geng MJ, Xu TJ, Chen Y. Efficient semiquantum key distribution based on single photons in both polarization and spatial-mode degrees of freedom. Quan Inf Process (2022) 21(4):123–1. doi:10.1007/s11128-022-03457-1

CrossRef Full Text | Google Scholar

34. Tsai CW, Chang YC, Lai YH, Yang CW. Cryptanalysis of limited resource semi-quantum secret sharing. Quan Inf Process (2020) 19(8):224–8. doi:10.1007/s11128-020-02690-w

CrossRef Full Text | Google Scholar

35. Li XY, Chang Y, Zhang SB. Multi-party semi-quantum secret sharing scheme based on Bell states. In: International conference on artificial intelligence and security. Cham: Springer (2020). p. 280–8.

CrossRef Full Text | Google Scholar

36. Tian Y, Li J, Chen XB, Ye CQ, Li HJ. An efficient semi-quantum secret sharing protocol of specific bits. Quan Inf Process (2021) 20(6):217–1. doi:10.1007/s11128-021-03157-2

CrossRef Full Text | Google Scholar

37. Wang Y, Lou X, Fan Z, Wang S, Huang G. Verifiable multi-dimensional (t, n) threshold quantum secret sharing based on quantum walk. Int J Theor Phys (Dordr) (2022) 61(2):24–17. doi:10.1007/s10773-022-05009-w

CrossRef Full Text | Google Scholar

38. Ye TY, Ye CQ. Measure-resend semi-quantum private comparison without entanglement. Int J Theor Phys (Dordr) (2018) 57(12):3819–34. doi:10.1007/s10773-018-3894-0

CrossRef Full Text | Google Scholar

39. Jiang LZ. Semi-quantum private comparison based on Bell states. Quan Inf Process (2020) 19(6):180–21. doi:10.1007/s11128-020-02674-w

CrossRef Full Text | Google Scholar

40. Tian Y, Li J, Chen XB, Ye CQ, Li CY, Hou YY. An efficient semi-quantum private comparison without pre-shared keys. Quan Inf Process (2021) 20(11):360–13. doi:10.1007/s11128-021-03294-8

CrossRef Full Text | Google Scholar

41. Ye CQ, Li J, Chen XB, Tian Y. Efficient semi-quantum private comparison without using entanglement resource and pre-shared key. Quan Inf Process (2021) 20(8):1–19.

CrossRef Full Text | Google Scholar

42. Yang YG, Wen QY, Zhu FC. Multi-party multi-level quantum key distribution protocol based on entanglement swapping. Acta Phys Sin (2005) 54(12):5544–8. doi:10.7498/aps.54.5544

CrossRef Full Text | Google Scholar

Keywords: quantum cryptography, semi-quantum key distribution, hyperentangled Bell states, polarization degree of freedom, spatial degree of freedom

Citation: Tian Y, Li J, Ye C and Li C (2022) Multi-party semi-quantum key distribution protocol based on hyperentangled Bell states. Front. Phys. 10:1023443. doi: 10.3389/fphy.2022.1023443

Received: 19 August 2022; Accepted: 15 September 2022;
Published: 13 October 2022.

Edited by:

Tianyu Ye, Zhejiang Gongshang University, China

Reviewed by:

Xiangfu Zou, Wuyi University, China
Xiaoping Lou, Hunan Normal University, China

Copyright © 2022 Tian, Li, Ye and Li. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Yuan Tian, dGlueXVlbkB4YXVhdC5lZHUuY24=

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.