Secure multiparty quantum key agreement against collusive attacks

被引:0
|
作者
Hussein Abulkasim
Atefeh Mashatan
Shohini Ghose
机构
[1] Ryerson University,Ted Rogers School of Information Technology Management
[2] New Valley University,Faculty of Science
[3] Wilfrid Laurier University,Department of Physics and Computer Science
[4] University of Waterloo,Institute for Quantum Computing
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Quantum key agreement enables remote participants to fairly establish a secure shared key based on their private inputs. In the circular-type multiparty quantum key agreement mode, two or more malicious participants can collude together to steal private inputs of honest participants or to generate the final key alone. In this work, we focus on a powerful collusive attack strategy in which two or more malicious participants in particular positions, can learn sensitive information or generate the final key alone without revealing their malicious behaviour. Many of the current circular-type multiparty quantum key agreement protocols are not secure against this collusive attack strategy. As an example, we analyze the security of a recently proposed multiparty key agreement protocol to show the vulnerability of existing circular-type multiparty quantum key agreement protocols against this collusive attack. Moreover, we design a general secure multiparty key agreement model that would remove this vulnerability from such circular-type key agreement protocols and describe the necessary steps to implement this model. The proposed model is general and does not depend on the specific physical implementation of the quantum key agreement.
引用
收藏
相关论文
共 50 条
  • [41] Novel multiparty quantum key agreement protocol with GHZ states
    Guang-Bao Xu
    Qiao-Yan Wen
    Fei Gao
    Su-Juan Qin
    Quantum Information Processing, 2014, 13 : 2587 - 2594
  • [42] Novel multiparty quantum key agreement protocol with GHZ states
    Xu, Guang-Bao
    Wen, Qiao-Yan
    Gao, Fei
    Qin, Su-Juan
    QUANTUM INFORMATION PROCESSING, 2014, 13 (12) : 2587 - 2594
  • [43] A verifiable multiparty quantum key agreement based on bivariate polynomial
    Li, Lei
    Li, Zhi
    INFORMATION SCIENCES, 2020, 521 : 343 - 349
  • [44] An efficient eCK secure certificateless authenticated key agreement scheme with security against public key replacement attacks
    Daniel, Renu Mary
    Rajsingh, Elijah Blessing
    Silas, Salaja
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 : 156 - 172
  • [45] Device-independent quantum key distribution secure against collective attacks
    Pironio, Stefano
    Acin, Antonio
    Brunner, Nicolas
    Gisin, Nicolas
    Massar, Serge
    Scarani, Valerio
    NEW JOURNAL OF PHYSICS, 2009, 11
  • [46] Long-distance quantum key distribution secure against coherent attacks
    Frohlich, Bernd
    Lucamarini, Marco
    Dynes, James F.
    Comandar, Lucian C.
    Tam, Winci W. -S.
    Plews, Alan
    Sharpe, Andrew W.
    Yuan, Zhiliang
    Shields, Andrew J.
    OPTICA, 2017, 4 (01): : 163 - 167
  • [47] A SECURE GROUP COMMUNICATION USING NON-INTERACTIVE KEY COMPUTATION IN MULTIPARTY KEY AGREEMENT
    Kalaiselvi, S.
    Begum, S. Jabeen
    ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 568 - 572
  • [48] Multiparty key agreement protocols
    Pieprzyk, J
    Li, CH
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 2000, 147 (04): : 229 - 236
  • [49] Multi-party Quantum Key Agreement Protocol for Detection of Collusive Attacks in each Sub-Circle Segment by Headers
    Shyam R. Sihare
    International Journal of Theoretical Physics, 61
  • [50] Multi-party Quantum Key Agreement Protocol for Detection of Collusive Attacks in each Sub-Circle Segment by Headers
    Sihare, Shyam R.
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2022, 61 (07)