Skip to main content
Log in

A New Secure Quantum Key Expansion Scheme

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

A new quantum key expansion scheme is proposed. The protocol of quantum key expansion proposed by Hwang is analyzed and the eavesdropping scheme is presented. We found that the using of the basis sequence shared by communicating parties is the weakness of the protocol. Hence we propose a ‘purification attack’ for the eavesdropper to steal partial information of the raw key and the new key between communicating parties. In view of this defect, we propose a new protocol of quantum key expansion, where the shared key is encrypted into a sequence of unitary operators which can be used securely against the presented attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proc. IEEE Int. Conf. on Computers, Systems and Signal Processing, pp. 175–179. IEEE, New York (1984)

    Google Scholar 

  2. Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121 (1992)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  3. Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661 (1991)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  4. Lutkenhaus, N.: Security against eavesdropping in quantum cryptography. Phys. Rev. A 54, 97–112 (1996)

    Article  ADS  Google Scholar 

  5. Bruss, D.: Optimal eavesdropping in quantum cryptography with six states. Phys. Rev. Lett. 81, 3018 (1998)

    Article  ADS  Google Scholar 

  6. Bechmann-Pasquinucci, H., Peres, A.: Quantum cryptography with 3-state systems. Phys. Rev. Lett. 85, 3313 (2000)

    Article  MathSciNet  ADS  Google Scholar 

  7. Lo, H.K., Ma, X., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005)

    Article  ADS  Google Scholar 

  8. Zhao, Y., Qi, B., Lo, H.K.: Quantum key distribution with an unknown and untrusted source. Phys. Rev. A 77, 052327 (2008)

    Article  ADS  Google Scholar 

  9. Xiu, X.M., Dong, L., Gao, Y.J., Chi, F.: Quantum key distribution protocols with six-photon states against collective noise. Opt. Commun. 282, 4171 (2009)

    Article  ADS  Google Scholar 

  10. Sun, S.H., Liang, L.M., Li, C.Z.: Decoy state quantum key distribution with finite resources. Phys. Lett. A 373, 2533 (2009)

    Article  ADS  MATH  Google Scholar 

  11. Sheridan, L., Le, T.P., Scarani, V.: Finite-key security against coherent attacks in quantum key distribution. New J. Phys. 12, 123019 (2010)

    Article  ADS  Google Scholar 

  12. Gobby, C., Yuan, Z.L., Shields, A.J.: Quantum key distribution over 122 km of standard telecom fiber. Appl. Phys. Lett. 84, 3762 (2004)

    Article  ADS  Google Scholar 

  13. Hughes, R.J., Nordholt, J.E., Derkacs, D., et al.: Practical free-space quantum key distribution over 10 km in daylight and at night. New J. Phys. 4, 43 (2002)

    Article  ADS  MATH  Google Scholar 

  14. Scheidl, T., Ursin, R., Fedrizzi, A., Ramelow, S., et al.: Feasibility of 300 km quantum key distribution with entangled states. New J. Phys. 11, 085002 (2009)

    Article  ADS  Google Scholar 

  15. Rosenberg, D., Peterson, C.G., Harrington, J.W., et al.: Practical long-distance quantum key distribution system using decoy levels. New J. Phys. 11, 045009 (2009)

    Article  ADS  Google Scholar 

  16. Dixon, A.R., Yuan, Z.L., Dynes, J.F., et al.: Continuous operation of high bit rate quantum key distribution. Appl. Phys. Lett. 96, 161102 (2010)

    Article  ADS  Google Scholar 

  17. Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distance. Science 283, 2050 (1999)

    Article  ADS  Google Scholar 

  18. Mayers, D.: Quantum key distribution and string oblivious transfer in noisy channels. In: Adv. in Cryptology-Proceedings of Crypto’96, p. 343. Springer, New York (1996)

    Google Scholar 

  19. Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution prorotol. Phys. Rev. Lett. 85, 441 (2000)

    Article  ADS  Google Scholar 

  20. Lütkenhaus, N.: Security against individual attacks for realistic quantum key distribution. Phys. Rev. A 61, 052304 (2000)

    Article  ADS  Google Scholar 

  21. Brassard, G., Lütkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330–1333 (2000)

    Article  ADS  Google Scholar 

  22. Hwang, W.Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003)

    Article  ADS  Google Scholar 

  23. Hwang, W.Y., Koh, I.G., Han, Y.D.: Quantum cryptography without public announcement of bases. Phys. Lett. A 244, 489 (1998)

    Article  ADS  MATH  Google Scholar 

  24. Ji, S.W., Lee, H.W., Long, G.L.: Secure quantum key expansion between two parties sharing a key. J. Korean Phys. Soc. 51, 1245 (2007)

    Article  ADS  Google Scholar 

  25. Hwang, W.Y., Wang, X.B., Matsumoto, K., Kim, J., Lee, H.W.: Shor-Preskill-type security proof for quantum key distribution without public announcement of bases. Phys. Rev. A 67, 012302 (2003)

    Article  ADS  Google Scholar 

  26. Hwang, W.Y., Ahn, D., Hwang, S.W.: Eavesdropper’s optimal information in variations of Bennett–Brassard 1984 quantum key distribution in the coherent attacks. Phys. Lett. A 279, 133 (2001)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  27. Wen, K., Long, G.L.: Modified Bennett-Brassard 1984 quantum key distribution protocol with two-way classical communications. Phys. Rev. A 72, 022336 (2005)

    Article  ADS  MATH  Google Scholar 

  28. Lin, S., Liu, X.F.: A modified quantum key distribution without public announcement bases against photon-number-splitting attack. Int. J. Theor. Phys. 51, 2514 (2012)

    Article  MATH  Google Scholar 

Download references

Acknowledgements

This research was supported by Research Project of Education Department of Heilongjiang Province (12511107).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yun-yan Yang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yang, Yy., Luo, Lz. & Yin, Gs. A New Secure Quantum Key Expansion Scheme. Int J Theor Phys 52, 2008–2016 (2013). https://doi.org/10.1007/s10773-012-1424-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-012-1424-z

Keywords

Navigation