2018
DOI: 10.1038/s41598-018-21658-6
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Group Multi-party Quantum Key Agreement

Abstract: This paper presents a novel dynamic group multi-party Quantum Key Agreement (DGMQKA) protocol, achieved by a multicast transmission method. The proposed method is able to achieve arbitrary number of groups and members under the same resources. In addition, it can be dynamically adjusted by joining a new member, combining two groups into one group, revoking an old member and dividing one group into two groups, for different and complex situations. Furthermore, the proposed protocol can be of help to research in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 81 publications
0
3
0
Order By: Relevance
“…Although eavesdroppers can be detected in intercept-and-resend attacks, there is a possibility that they will use unitary operation to entangle a random particle on the decoy particles and measure the random particle in the Z -basis or the X -basis to steal the secret 39 , 40 . In the following, an eavesdropper performs unitary operation to entangle a particle on the decoy particles in states .…”
Section: Resultsmentioning
confidence: 99%
“…Although eavesdroppers can be detected in intercept-and-resend attacks, there is a possibility that they will use unitary operation to entangle a random particle on the decoy particles and measure the random particle in the Z -basis or the X -basis to steal the secret 39 , 40 . In the following, an eavesdropper performs unitary operation to entangle a particle on the decoy particles in states .…”
Section: Resultsmentioning
confidence: 99%
“…By this means, the message receiver can confirm that the transmitter signed the message legitimately, while the attacker cannot identify the signature and cannot forge it, because QSDC secures the quantum channel. Similarly, if the particles of each entangled states are held by two different users [439] or even more than two users [440]- [442], then every one in the group has the right to modify a key by applying his/her operation to the qubits in hand and the final key is jointly determined by all members.…”
Section: The Cryptographic Applications Of Point-to-point Qsdc Protocolsmentioning
confidence: 99%
“…[439], [440] Three-party QSDC with GHZ states [66] [441], [442] of high-security communication. Thus QSDC is eminently suitable for a wide variety of quantum cryptographic tasks, which require a direct transport of deterministic information over the quantum channel.…”
Section: Two-step Quantum Key Agreementmentioning
confidence: 99%
“…In 2010, Chong and Hwang [17] proposed a quantum group key distribution scheme based on BB84 in which the key is formed by consent of all participants. Recently, Chou et al [18] proposed a dynamic multi‐party group key distribution scheme which is able to achieve arbitrary number of groups and users under the same resources.…”
Section: Introductionmentioning
confidence: 99%