2017
DOI: 10.1038/s41598-017-15227-6
|View full text |Cite
|
Sign up to set email alerts
|

Efficient multiparty quantum key agreement with collective detection

Abstract: As a burgeoning branch of quantum cryptography, quantum key agreement is a kind of key establishing processes where the security and fairness of the established common key should be guaranteed simultaneously. However, the difficulty on designing a qualified quantum key agreement protocol increases significantly with the increase of the number of the involved participants. Thus far, only few of the existing multiparty quantum key agreement (MQKA) protocols can really achieve security and fairness. Nevertheless,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
21
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 28 publications
(21 citation statements)
references
References 65 publications
0
21
0
Order By: Relevance
“…Comparing with previous QKA protocols under this definition of protocol efficiency, i.e. protocols with single photons [15,20,27,29], protocols with Bell states [21,24,30], our protocol possess a higher efficiency in the three-party cases. This is because of dense-coding method which enables one qubit to carry two bits of information being used in the protocol.…”
Section: Discussion and Summarymentioning
confidence: 79%
See 3 more Smart Citations
“…Comparing with previous QKA protocols under this definition of protocol efficiency, i.e. protocols with single photons [15,20,27,29], protocols with Bell states [21,24,30], our protocol possess a higher efficiency in the three-party cases. This is because of dense-coding method which enables one qubit to carry two bits of information being used in the protocol.…”
Section: Discussion and Summarymentioning
confidence: 79%
“…This is because of dense-coding method which enables one qubit to carry two bits of information being used in the protocol. It should make sense that we use the method of inserting some single photons rather than using control strings and performing rotation operations [26,27,29] to prevent the inside attacks. With one encoding operation being performed, participant in those protocols can only encode one bit information on one photon while he can encode two bits in our protocol.…”
Section: Discussion and Summarymentioning
confidence: 99%
See 2 more Smart Citations
“…information processing, encrypted transmission, machine learning, etc.) has also achieved some important results, such as quantum key agreement (QKA) [6], [7], quantum secure direct communication (QSDC) [8], [9], quantum teleportation and remote state preparation (QT&RSP) [10]- [12], quantum steganography (QS) [13]- [15], delegating quantum computation (DQC) [16], [17], and quantum machine learning [18], [19].…”
Section: Introductionmentioning
confidence: 99%