Key Agreement Attack

Huang, W. et al. An effective multi-party quantum key chord with collective recognition. Sci. 7, 15264 (2017). Liu18 indicated: that existing MQKA protocols can be categorized according to the topology of transmission of quantum photons into three types: complete-graph type17,20, circular type19,21,22,23,24,25,25,26,27,28,39,31,32,34 (also known as travel mode) and tree type35. In the first type, each participant sends each other participant a photo gallery containing the information of their secret key. In the second type, each participant sends only one sequence that is served in turn by each of the other participants and sent back to the other participant who prepares them. The third type is that a participant creates a sequence of very dimensional photon states (for example. B of GHZ) and sends one of its particles to each other participant. Because the mode of travel is more efficient than the full graph type and is easier to perform compared to the tree type, it has attracted a comprehensive study. In 2013, Sun et al. introduced a travel-mode MQKA19 protocol to improve the effectiveness of Liu et al.20`s MQKA protocol.

In 2014, Shukla et al. proposed a MQKA protocol in travel mode, based on reflection body measurements and chimes21. In 2015, Zhu et al. proposed the attack strategy to defeat the Shukla et al. protocol and proposed an improved version 22. In 2018, Abulkasim stressed that the Wang and Mas23 protocol were vulnerable to attacks from participants and proposed an improved protocol24. Meanwhile, Cao and Ma have proposed two MQKA protocols that should be immune to collusive attack25; They also presented a MQKA protocol based on non-orthogonal quantum wrapped pairs34. In addition, some protocols based on more dimensional quantum states were presented, such as.B. brown states of five qubits26, G-Like28 conditions and four symmetrical qubitS W29. A widespread mechanism for repelling these attacks is the use of digitally signed keys, which must be secured for integrity: if Bob`s key is signed by a trusted third party guarantor of his identity, Alice can have great confidence that a signed key she receives is not an attempt to intercept Eve.

If Alice and Bob have an infrastructure with public keys, they can digitally sign a Diffie Hellman key or exchange a Diffie Hellman public key.

Comments are closed.