A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes
- 187 Downloads
In 1984, Bennett and Brassard designed the first quantum key distribution protocol, whose security is based on quantum indeterminacy. Since then, there has been growing research activities, aiming in designing new, more efficient and secure key distribution protocols. The work presents a novel hybrid quantum key distribution protocol. The key distribution is derived from both quantum and classical data. This is why it is called hybrid. The protocol applies extended unitary operations derived from four basic unitary operations and distributed fountain codes. Compared to other protocols published so far, the new one is more secure (provides authentication of parties and detection of eavesdropping) and efficient. Moreover, our protocol still works over noisy and lossy channels.
KeywordsExtended unitary operations Fountain codes Eavesdropping detection Authentication EPR pairs Key distribution protocols
The authors are grateful to the two anonymous reviewers for their valuable comments and suggestions to improve the presentation of this paper. Also, they would like to thank Prof. Gao Fei from Beijing University of Posts and Telecommunications for helping them to improve this paper. Hong Lai has been supported in part by an International Macquarie University Research Excellence Scholarship (iMQRES). Josef Pieprzyk was supported by Australian Research Council grant DP0987734. This work is also supported by the National Basic Research Program of China (973 Program) (Grant No. 2010CB923200), the National Natural Science Foundation of China (No. 61377067). The work is also supported by Fund of State Key Laboratory of Information Photonics and Optical Communications (Beijing University of Posts and Telecommunications), P. R. China.
- 1.Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. In: Proceedings of the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, Nov. 20–22. IEEE Computer Society Press, pp. 124–134 (1994)Google Scholar
- 3.Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175-179. IEEE, New York (1984)Google Scholar
- 10.Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: A quantum key distribution and identification protocol based on entanglement swapping. arXiv:quant-ph/0412014v1 2 Dec 2004.
- 18.Duligall, J.L., Godfrey, M.S., Lynch, A., Munro, W.J., Harrison, K.A., Rarity, J.G.: Low cost quantum secret key growing for consumer transactions. In: Proceedings of the International Quantum Electronics Conference, pp. 4387012–4387012 (2007)Google Scholar
- 21.Byers, J.W., Luby, M., Mitzenmacher, M., Rege A.: A digital fountain approach to reliable distribution of bulk data. In: Steenstrup, Martha (ed.) In: Proceedings of the ACM SIGCOMM ’98 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM ’98), pp. 56–67. ACM, New York, NY, USA,Google Scholar
- 23.Lin, Y., Liang, B., Li, B.: Data persistence in large-scale sensor networks with decentralized fountain codes. In: INFOCOM 2007. In: 26th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 6–12 May 2007, Anchorage, Alaska, USA. pp. 1658–1666, IEEE (2007)Google Scholar