QKD based on symmetric entangled Bernstein-Vazirani

06/07/2021
by   Michael Ampatzis, et al.
0

This paper introduces a novel entanglement-based QKD protocol, that makes use of a modified symmetric version of the Bernstein-Vazirani algorithm, in order to achieve a secure and efficient key distribution. Two variants of the protocol, one fully symmetric and one semi-symmetric, are presented. In both cases, the spatially separated Alice and Bob share multiple EPR pairs, one qubit of the pair each. The fully symmetric version allows both parties to input a secret key from the irrespective location and, finally, acquire in the end a totally new and original key, an idea which was inspired by the Diffie-Hellman key exchange protocol. In the semi-symmetric version, Alice sends her chosen secret key to Bob (or vice versa). Furthermore, their performance against an eavesdropper's attack is analyzed. Finally, in order to illustrate the operation of the protocols in practice, two small scale but detailed examples are given.

READ FULL TEXT

page 10

page 13

page 14

04/28/2022

A symmetric extensible protocol for quantum secret sharing

This paper introduces the Symmetric Extensible Quantum Secret Sharing pr...
04/09/2021

A Novel Provably Secure Key Agreement Protocol Based On Binary Matrices

In this paper, a new key agreement protocol is presented. The protocol u...
10/20/2020

On the lightweight authenticated semi-quantum key distribution protocol without Trojan horse attack

Recently, Tsai et al. (Laser Phys. Lett. 17, 075202, 2020) proposed a li...
05/18/2022

Anonymous conference key agreement in linear quantum networks

Sharing multi-partite quantum entanglement between parties allows for di...
01/03/2018

Deep Random based Key Exchange protocol resisting unlimited MITM

We present a protocol enabling two legitimate partners sharing an initia...
10/12/2021

Hide and seek with quantum resources: New and modified protocols for quantum steganography

Steganography is the science of hiding and communicating a secret messag...
03/13/2019

Learning Symmetric and Asymmetric Steganography via Adversarial Training

Steganography refers to the art of concealing secret messages within mul...