中国物理B ›› 2009, Vol. 18 ›› Issue (6): 2143-2148.doi: 10.1088/1674-1056/18/6/006

• • 上一篇    下一篇

Quantum key distribution series network protocol with M-classical Bobs

谭勇刚1, 张现周2, 公伟贵2, 任振忠2, 郭笑天2   

  1. (1)Physics and Information Engineering College, Luoyang Normal College, Luoyang 471022, China; (2)Physics and Information Engineering College, Henan Normal University, Xinxiang 453007, China
  • 收稿日期:2008-06-27 修回日期:2008-09-24 出版日期:2009-06-20 发布日期:2009-06-20
  • 基金资助:
    Project supported by the National Natural Science Foundation of China (Grant No 10774039).

Quantum key distribution series network protocol with M-classical Bobs

Zhang Xian-Zhou(张现周)a)†, Gong Wei-Gui(公伟贵)a)‡, Tan Yong-Gang(谭勇刚)b), Ren Zhen-Zhong(任振忠)a), and Guo Xiao-Tian(郭笑天)a)   

  1. a Physics and Information Engineering College, Henan Normal University, Xinxiang 453007, China; b Physics and Information Engineering College, Luoyang Normal College, Luoyang 471022, China
  • Received:2008-06-27 Revised:2008-09-24 Online:2009-06-20 Published:2009-06-20
  • Supported by:
    Project supported by the National Natural Science Foundation of China (Grant No 10774039).

摘要: Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, we present a quantum key distribution (QKD) protocol to distribute secure key bits among one quantum party and numerous classical parties who have no quantum capacity. We prove that our protocol is completely robust, i.e., any eavesdropping attack should be detected with nonzero probability. Our calculations show that our protocol may be secure against Eve's symmetrically individual attack.

关键词: quantum key distribution, symmetrical attack, network protocol

Abstract: Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, we present a quantum key distribution (QKD) protocol to distribute secure key bits among one quantum party and numerous classical parties who have no quantum capacity. We prove that our protocol is completely robust, i.e., any eavesdropping attack should be detected with nonzero probability. Our calculations show that our protocol may be secure against Eve's symmetrically individual attack.

Key words: quantum key distribution, symmetrical attack, network protocol

中图分类号:  (Quantum cryptography and communication security)

  • 03.67.Dd
03.67.Lx (Quantum computation architectures and implementations)