DeepAI AI Chat
Log In Sign Up

Comment on "Quantum key agreement protocol"

by   Nayana Das, et al.

The first two party Quantum Key Agreement (QKA) protocol, based on quantum teleportation, was proposed by Zhou et al. (Electronics Letters 40.18 (2004): 1149-1150). In this protocol, to obtain the key bit string, one of the parties use a device to obtain inner product of two quantum states, one being unknown, and the other one performs Bell measurement. However, in this article, we show that it is not possible to obtain a device that would output the inner product of two qubits even when only one of the qubit is unknown. This is so because existence of such device would imply perfectly distinguishing among four different states in a two-dimensional vector space. This is not permissible in quantum mechanics. Furthermore, we argue that existence of such a device would also imply violation of the “No Signalling Theorem" as well. Finally, we also comment that this protocol is not a valid key agreement protocol at all.


page 1

page 2

page 3

page 4


Two attacks and counterattacks on the mutual semi-quantum key agreement protocol using Bell states

Recently, a mutual semi-quantum key agreement protocol using Bell states...

Collusion attack and counterattack on the quantum key agreement via non-maximally entangled cluster states

Recently, Li et al. (Int J Theor Phys: DOI: 10.1007/s10773-020-04588-w, ...

Breaking universal limitations on quantum conference key agreement without quantum memory

Quantum conference key agreement is an important cryptographic primitive...

An efficient and secure two-party key agreement protocol based on chaotic maps

Secure communication is a matter of genuine concern that includes means ...

On the Security of an Unconditionally Secure, Universally Composable Inner Product Protocol

In this paper we discuss the security of a distributed inner product (DI...

Anonymous conference key agreement in linear quantum networks

Sharing multi-partite quantum entanglement between parties allows for di...

On the Complexity of Two-Party Differential Privacy

In distributed differential privacy, the parties perform analysis over t...