Controlling the key by choosing the detection bits in quantum cryptographic protocols

Eavesdropping detection is an indispensable process of most quantum cryptographic protocols. By publishing and comparing part of the shared bits, called as detection bits, the participants can check whether there exists an eavesdropper. Generally, the detection bits are chosen randomly. Consequently...

Full description

Saved in:
Bibliographic Details
Published inScience China. Information sciences Vol. 58; no. 11; pp. 196 - 206
Main Authors Liu, Bin, Gao, Fei, Huang, Wei, Li, Dan, Wen, QiaoYan
Format Journal Article
LanguageEnglish
Published Beijing Science China Press 01.11.2015
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Eavesdropping detection is an indispensable process of most quantum cryptographic protocols. By publishing and comparing part of the shared bits, called as detection bits, the participants can check whether there exists an eavesdropper. Generally, the detection bits are chosen randomly. Consequently, the secret bits, i.e., the rest bits, are also random. Then, what if the detection bits are chosen non-randomly? Can the participant who chooses the detection bits make the secret bits to be a predetermined string he expected?This paper focuses on the participants' key control capability when they choose the detection bits selectively in two-party quantum communication protocols. Concretely, we analyze the participants' key control capability in different situations of different proportions of the detection bits. And we prove that the participants can predetermine, with high probability, any part of the secret bits of which the length is smaller than that of the detection bits. The above result has various potential applications in quantum cryptographic protocols.Obviously, utilizing this non-random selection of the detection bits, one can realize the function of a deterministic quantum key distribution protocol through a random one if the number of the detection bits is not smaller than that of the secret bits. What is more, we find that quite a few quantum key agreement protocols cannot guarantee the fairness of the key in the sense that the participant who chooses the detection bits can control the key somewhat.
Bibliography:11-5847/TP
eavesdropping detection,deterministic quantum key distribution,quantum key agreement,quantum information,quantum cryptography
Eavesdropping detection is an indispensable process of most quantum cryptographic protocols. By publishing and comparing part of the shared bits, called as detection bits, the participants can check whether there exists an eavesdropper. Generally, the detection bits are chosen randomly. Consequently, the secret bits, i.e., the rest bits, are also random. Then, what if the detection bits are chosen non-randomly? Can the participant who chooses the detection bits make the secret bits to be a predetermined string he expected?This paper focuses on the participants' key control capability when they choose the detection bits selectively in two-party quantum communication protocols. Concretely, we analyze the participants' key control capability in different situations of different proportions of the detection bits. And we prove that the participants can predetermine, with high probability, any part of the secret bits of which the length is smaller than that of the detection bits. The above result has various potential applications in quantum cryptographic protocols.Obviously, utilizing this non-random selection of the detection bits, one can realize the function of a deterministic quantum key distribution protocol through a random one if the number of the detection bits is not smaller than that of the secret bits. What is more, we find that quite a few quantum key agreement protocols cannot guarantee the fairness of the key in the sense that the participant who chooses the detection bits can control the key somewhat.
ISSN:1674-733X
1869-1919
DOI:10.1007/s11432-015-5413-8