Abstract
This work proposes two fault tolerant quantum key distribution (QKD) protocols. Each of which is robust under one kind of collective noises: collective-dephasing noise and collective-rotation noise, respectively. Due to the use of the entanglement swapping of Greenberger–Horne–Zeilinger (GHZ) state as well as the decoy logical qubits, the new protocols provide the best qubit efficiency among the existing fault tolerant QKD protocols over the same collective-noise channel. The receiver simply performs two Bell measurements to obtain the raw key. Moreover, the proposed protocols are free from several well-known attacks and can also be secure over a lossy channel.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
1 Introduction
The quantum key distribution (QKD) is one of the most important research topics in quantum cryptography. In a QKD protocol, a secret key is determined by one communicant (Alice) and then distributed to the other communicant (Bob) through the transmission of quantum signals. Since the first QKD protocol presented by Bennett and Brassard [1] in 1984 (also known as BB84), a variety of QKD protocols have been proposed [2–7].
However, in practice, quantum channels introduce noises (such as vibration, thermal fluctuation, and the imperfection of the fiber) to the communication qubits. And the noises influence both the correctness and efficiency of communication. Since qubits travel inside a time window which is shorter than the variation of the noise sources [8], these qubits will all be affected by the same noise, which is known as the collective noise.
The collective noise types are among the dominant noise sources in quantum communications. There are two types of collective noises: collective-dephasing noise and collective-rotation noise. The effects of these two types of noises are illustrated by the following transformations. When the polarization photons \(\left| 0 \right\rangle \) and \(\left| 1 \right\rangle \) undergo the transformations of collective-dephasing noise (or collective-rotation noise), they become: \(\left| 0 \right\rangle \rightarrow \left| 0 \right\rangle \) and \(\left| 1 \right\rangle \rightarrow e^{i\theta }\left| 1 \right\rangle \) (or \(\left| 0 \right\rangle \rightarrow \cos \theta \left| 0 \right\rangle +\sin \theta \left| 1 \right\rangle \) and \(\left| 1 \right\rangle \rightarrow -\sin \theta \left| 0 \right\rangle +\cos \theta \left| 1 \right\rangle \) under the transformations of collective-rotation noise), where \(\left| 0 \right\rangle \) and \(\left| 1 \right\rangle \) represent the horizontal and vertical polarization states respectively, and the fluctuation of the noise with time is represented by the parameter \(\theta \).
Decoherence-free subspaces (DFS) [9–12], which have the property of being invariant under collective noises, are frequently used to combat these types of noises. For instance, the Bell states \(\left| {\Psi ^{+}} \right\rangle =\frac{1}{\sqrt{2}}\left( {\left| {01} \right\rangle +\left| {10} \right\rangle } \right) \) and \(\left| {\Psi ^{-}} \right\rangle =\frac{1}{\sqrt{2}}\left( {\left| {01} \right\rangle -\left| {10} \right\rangle } \right) \) are unchanged by propagating through a collective-dephasing noise channel [8]. On the other hand, the Bell states \(\left| {\Phi ^{+}} \right\rangle =\frac{1}{\sqrt{2}}\left( {\left| {00} \right\rangle +\left| {11} \right\rangle } \right) \) and \(\left| {\Psi ^{-}} \right\rangle =\frac{1}{\sqrt{2}}\left( {\left| {01} \right\rangle -\left| {10} \right\rangle } \right) \) are unchanged by propagating through a collective-rotation noise channel [8]. Hence, these states can form two noiseless subspaces (i.e., DFS), one for each type of noise.
Several quantum protocols [8, 13–25] have been developed to remove the effects of collective noises in QKD [8, 13–18], quantum secret sharing (QSS) [19–22], quantum secure direct communication (QSDC) [23, 24], and quantum dialogue (QD) [25]. In 2008, Li et al. [8] proposed two QKD protocols using DFS over two collective-noise channels, where a 1-bit key is transmitted via a 4-particle state. In 2009, Xiu et al. [15] presented two QKD protocols immune to collective noises also using DFS, where a two-bit key is transmitted via a 6-particle state. After that, Li et al. [16] presented two two-step QKD schemes against two kinds of collective noises, respectively. Li and Li [17] also used two-step communication strategy to design QKD over two collective-noise channels. However, these protocols [16, 17] are insecure under Trojan horse attacks [26–30].
Different from the above schemes, this paper presents two QKD protocols based on entanglement swapping. By merely using two Bell measurements, two unrelated 3-particle Greenberger–Horne–Zeilinger (GHZ) states are able to build up an entanglement correlation. The entanglement swapping of these two 3-particle GHZ states allows two participants to share an entanglement relation of the Bell states even if the channels between them are subject to collective noises. In our proposed schemes, to generate a raw key, the participants only need to perform Bell measurement without performing any local unitary operations. Moreover, no classical information is required to negotiate the key except for the eavesdropping check. Compared to the other related QKD protocols [8, 15–17], our approach has the following advantages:
-
1.
The proposed protocols are secure under several well-known attacks.
-
2.
The proposed protocols can prevent the Trojan-horse attacks because one-step photon transmission is adopted.
-
3.
The proposed protocols are robust over both kinds of collective-noise channels as well as a lossy quantum channel.
-
4.
The qubit efficiency of our QKD protocols is the highest among the existing QKD protocols [8, 15–17] due to the use of the decoy logical qubits.
The rest of this paper is organized as follows. Section 2 describes the preliminaries of this paper. Section 3 presents the fault tolerant QKD schemes. Section 4 gives an efficiency analysis on the proposed schemes. Section 5 analyzes the security of the proposed protocols. Finally, Sect. 6 summarizes our results.
2 Preliminaries
This section includes three subsections. Sections 2.1 and 2.2 give definitions to the logical qubits resistant to the collective-dephasing noise and the collective-rotation noise, respectively. Section 2.3 illustrates the entanglement swapping of GHZ states and GHZ-like states, respectively.
2.1 The logical qubit immune to collective-dephasing noise
In order to avoid the collective-dephasing noise, two logical qubits \(\left| {0_{dp} } \right\rangle \) and \(\left| {1_{dp} } \right\rangle \) can be constructed from two physical qubits \(\left| 0 \right\rangle \left| 1 \right\rangle \) and \(\left| 1 \right\rangle \left| 0 \right\rangle \), respectively, where the subscript “\(dp\)” indicates the logical qubit resistant to the collective-dephasing noise. The superpositions of \(\left| {0_{dp} } \right\rangle \) and \(\left| {1_{dp} } \right\rangle \), which can be denoted as \(\left| {+_{dp} } \right\rangle =\frac{1}{\sqrt{2}}\left( {\left| {0_{dp} } \right\rangle +\left| {1_{dp} } \right\rangle } \right) \) (\(=\frac{1}{\sqrt{2}}\left( {\left| 0 \right\rangle \left| 1 \right\rangle +\left| 1 \right\rangle \left| 0 \right\rangle } \right) )\) and \(\left| {-_{dp} } \right\rangle =\frac{1}{\sqrt{2}}\left( {\left| {0_{dp} } \right\rangle -\left| {1_{dp} } \right\rangle } \right) \) (\(=\frac{1}{\sqrt{2}}\left( {\left| 0 \right\rangle \left| 1 \right\rangle -\left| 1 \right\rangle \left| 0 \right\rangle } \right) )\), are also immune to the collective-dephasing noise.
It is obvious that GHZ state \(\left| G \right\rangle _{123}\) \(=\frac{1}{\sqrt{2}}\left( {\left| 0 \right\rangle _1 \left| {10} \right\rangle _{23} +\left| 1 \right\rangle _1 \left| {01} \right\rangle _{23} } \right) =\frac{1}{\sqrt{2}}\left( \left| 0 \right\rangle _1\right. \left. \left| {1_{dp} } \right\rangle _{23} +\left| 1 \right\rangle _1 \left| {0_{dp} } \right\rangle _{23} \right) \) is invariant when the 2nd and the 3rd qubits are transmitted through the collective-dephasing noise channel.
2.2 The logical qubit immune to collective-rotation noise
To combat the collective-rotation noise, two logical qubits can be defined as \(\left| {0_r } \right\rangle =\left| {\Phi ^{+}} \right\rangle (=\frac{1}{\sqrt{2}}\left( {\left| {00} \right\rangle +\left| {11} \right\rangle } \right) )\) and \(\left| {1_r } \right\rangle =\left| {\Psi ^{-}} \right\rangle (=\frac{1}{\sqrt{2}}\left( {\left| {01} \right\rangle -\left| {10} \right\rangle } \right) )\), respectively, where the subscript “\(r\)” indicates the logical qubit resistant to collective-rotation noise. Here, \(\left| {\Phi ^{+}} \right\rangle \) and \(\left| {\Psi ^{-}} \right\rangle \) are the only two of the four Bell states that will not change their states after rotating the qubits’ phases. The superpositions of the two logical qubits, denoted as \(\left| {+_r } \right\rangle =\frac{1}{\sqrt{2}}\left( {\left| {0_r } \right\rangle +\left| {1_r } \right\rangle } \right) \) \(\big (\!\!\!=\!\!\frac{1}{\sqrt{2}}\left( {\left| {\Phi ^{+}} \right\rangle +\left| {\Psi ^{-}} \right\rangle } \right) \!\!\big )\) and \(\left| {-_r } \right\rangle =\frac{1}{\sqrt{2}}\left( {\left| {0_r } \right\rangle -\left| {1_r } \right\rangle } \right) \) \(\big (\!\!=\!\!\frac{1}{\sqrt{2}}\left( {\left| {\Phi ^{+}} \right\rangle -\left| {\Psi ^{-}} \right\rangle } \right) \!\!\big )\), are also resistant to the collective-rotation noise.
It is obvious that GHZ-like state \(\left| L \right\rangle _{123} =\frac{1}{2}\left( {\left| {001} \right\rangle -\left| {010} \right\rangle +\left| {100} \right\rangle +\left| {111} \right\rangle } \right) _{123} =\frac{1}{\sqrt{2}}\left( {\left| 0 \right\rangle _1 \left| {1_r } \right\rangle _{23} +\left| 1 \right\rangle _1 \left| {0_r } \right\rangle _{23} } \right) \) is invariant when the 2nd and the 3rd qubits are transmitted through the collective-rotation noise channel.
2.3 The entanglement swapping using GHZ states and GHZ-like states
In this section, we describe the process of the entanglement swapping using GHZ states and GHZ-like states, respectively. The entanglement swapping can be performed between two GHZ states as follows. Let us first prepare two GHZ states, \(\left| G \right\rangle _{123} =\frac{1}{\sqrt{2}}\left( {\left| {010} \right\rangle +\left| {101} \right\rangle } \right) _{123} \) and \(\left| G \right\rangle _{456} =\frac{1}{\sqrt{2}}\left( {\left| {010} \right\rangle +\left| {101} \right\rangle } \right) _{456} \), where the subscript \(i\) denotes the \(i\)th qubit of \(\left| G \right\rangle _{123} \) and \(\left| G \right\rangle _{456} \). These two GHZ states are individually entangled. That is, there is no entangled relationship between the 1st and the 4th qubits, the 2nd and the 5th qubits, or the 3rd and the 6th qubits, respectively. If, however, one performs the Bell measurements on the 2nd and the 5th qubits and also on the 3rd and the 6th qubits, respectively. Then, the 1st and the 4th qubits become a Bell state. That is, a correlation of entanglement is established between the 1st and the 4th qubits.
As an example, after performing the entanglement swapping between the two GHZ states \(\left| G \right\rangle _{123} =\frac{1}{\sqrt{2}}\left( {\left| {010} \right\rangle +\left| {101} \right\rangle } \right) _{123} \) and \(\left| G \right\rangle _{456} =\frac{1}{\sqrt{2}}\left( {\left| {010} \right\rangle +\left| {101} \right\rangle } \right) _{456} \), the state of \(\left| G \right\rangle _{123} \otimes \left| G \right\rangle _{456} \) becomes the following.
If Bell measurement results of the 2nd and the 5th qubits and the 3rd and the 6th qubits are \(\left| {\Phi ^{+}} \right\rangle _{25} \left| {\Phi ^{+}} \right\rangle _{36} \) or \(\left| {\Phi ^{-}} \right\rangle _{25} \left| {\Phi ^{-}} \right\rangle _{36} \), then the correlation of entanglement on the 1st and the 4th qubits is \(\left| {\Phi ^{+}} \right\rangle _{14} \). According to Eq. (1), one can easily infer the correlation of entanglement of the 1st and the 4th qubits based on the Bell measurement results of the 2nd and the 5th qubits and the 3rd and the 6th qubits.
Obviously, the entanglement swapping also can be done by using two GHZ-like states \(\left| L \right\rangle _{123} =\frac{1}{2}\left( {\left| {001} \right\rangle -\left| {010} \right\rangle +\left| {100} \right\rangle +\left| {111} \right\rangle } \right) _{123} \) and \(\left| L \right\rangle _{456} =\frac{1}{2}\left( \left| {001} \right\rangle -\left| {010} \right\rangle \right. \left. +\left| {100} \right\rangle +\left| {111} \right\rangle \right) _{456} \) as shown in Eq. (2).
3 Proposed quantum key distribution protocols
This section presents two QKD protocols. Each one is designed to be resistant to a particular type of collective noises.
3.1 Quantum key distribution over a collective-dephasing noise channel
Let Alice and Bob be two communicants in a QKD protocol, and the four Bell states \(\left| {\Phi ^{+}} \right\rangle , \left| {\Phi ^{-}} \right\rangle , \left| {\Psi ^{+}} \right\rangle \text{ and } \left| {\Psi ^{-}} \right\rangle \) represent two-bit information “00”, “01”, “10” and “11”, respectively. The proposed QKD protocol resistant to the collective-dephasing noise is described below (see also Fig. 1).
-
Step 1.
Alice prepares a sequence of 2\(n\) GHZ states, \(S=\{s_{1}, s_{2},{\ldots },s_{2n}\}\), where \(s_{i}=\left\{ {q_1^i , q_2^i , q_3^i } \right\} , i=1,2,{\ldots },2n\). Each GHZ state is in \(\left| G \right\rangle =\frac{1}{\sqrt{2}}\left( {\left| {010} \right\rangle +\left| {101} \right\rangle } \right) _{123} \). She takes the second qubits and the third qubits from all GHZ states to form a new sequence \(S_B =\left\{ {q_2^i , q_3^i } \right\} \), and the first qubits to form the other sequence \(S_A =\left\{ {q_1^i } \right\} \), for \(i=1,2,{\ldots }, 2n\). Alice also prepares \(m\) logical qubits from \(\left\{ {\left| {0_{dp} } \right\rangle , \left| {1_{dp} } \right\rangle , \left| {+_{dp} } \right\rangle \text{ and } \left| {-_{dp} } \right\rangle } \right\} \) as decoy logical qubits. She randomly inserts these decoy logical qubits into \(S_B\) to get \({S}^{\prime }_B \) and sends it to Bob.
-
Step 2.
After confirming that Bob has received the sequence, Alice announces the positions, the measurement results and the measurement bases of the decoy logical qubits. Bob will then measure the corresponding check sets for eavesdropping check. If there is no eavesdropper, then the protocol will continue to the next step, otherwise they will terminate the protocol and start it again.
-
Step 3.
Alice measures the qubits \(\left\{ {q_1^{2j-1} , q_1^{2j} } \right\} \), and Bob measures the qubits \(\left\{ {q_2^{2j-1} , q_2^{2j} } \right\} \) and \(\left\{ {q_3^{2j-1} , q_3^{2j} } \right\} \) with Bell measurements as shown in Eq. (1), for \(j=1,2,{\ldots },n\). Alice’s measurement result (\(MR_{A})\) of the Bell state represents two bits of the classical information. That is, “00” if the result is \(\left| {\Phi ^{+}} \right\rangle \); “01” if \(\left| {\Phi ^{-}} \right\rangle \); “10” if \(\left| {\Psi ^{+}} \right\rangle \); and “11” if \(\left| {\Psi ^{-}} \right\rangle \). Then, Bob can obtain Alice’s raw key according to his measurement results (\(MR_{B})\). That is, “00” if the result is \(\left| {\Phi ^{+}} \right\rangle \left| {\Phi ^{+}} \right\rangle \) or \(\left| {\Phi ^{-}} \right\rangle \left| {\Phi ^{-}} \right\rangle \); “01” if \(\left| {\Phi ^{+}} \right\rangle \left| {\Phi ^{-}} \right\rangle \) or \(\left| {\Phi ^{-}} \right\rangle \left| {\Phi ^{+}} \right\rangle \); “10” if \(\left| {\Psi ^{+}} \right\rangle \left| {\Psi ^{+}} \right\rangle \) or \(\left| {\Psi ^{-}} \right\rangle \left| {\Psi ^{-}} \right\rangle \); and “11” if \(\left| {\Psi ^{+}} \right\rangle \left| {\Psi ^{-}} \right\rangle \) or \(\left| {\Psi ^{-}} \right\rangle \left| {\Psi ^{+}} \right\rangle \). Finally, if the transmission between Alice and Bob is secure, then they can distil a private key with the privacy amplification process [31, 32] on the raw key.
An eavesdropper who did not know in advance each decoy logical qubit’s state and its position cannot retrieve Alice’s raw key without being detected. Furthermore, since all qubits are transmitted in one step only, the proposed scheme is free from Trojan horse attacks. More details of the security analysis will be given in Sect. 5.
3.2 Quantum key distribution over a collective-rotation noise channel
Alternatively, for the QKD protocol over a collective-rotation noise channel, Alice can generate the GHZ-like state \(\left| L \right\rangle =\frac{1}{2}\left( {\left| {001} \right\rangle -\left| {010} \right\rangle +\left| {100} \right\rangle +\left| {111} \right\rangle } \right) _{123} \), and also prepare decoy logical qubits randomly chosen from \(\left\{ {\left| {0_r } \right\rangle ,\left| {1_r } \right\rangle ,\left| {+_r } \right\rangle ,\left| {-_r } \right\rangle } \right\} \) instead in Step 1 of the previous protocol. Furthermore, the entanglement swapping of the GHZ-like states can be distinguished by the Bell measurements as shown in Eq. (2). Following the same procedure in Sect. 3.1, by using the GHZ-like states, the proposed QKD protocol can be resistant to the collective-rotation noise.
4 Efficiency analysis
Table 1 compares several important features of fault tolerant QKDs including Li et al.’s scheme [8], Xiu et al.’s scheme [15], Li et al.’s scheme [16] and Li and Li’s scheme [17] with the proposed schemes. Suppose that \(\eta =\frac{c}{q}\) is the qubit efficiency of a quantum protocol, where \(c\) is the total number of shared classical bits and \(q\) is the total number of qubits generated in the protocols [24, 30, 33–36]. Let us assume that half of the qubits transmitted in the public discussion step of the protocol are used for detecting the presence of eavesdroppers, and half of the transmitted qubits are used to check for the Trojan horse attacks.
In Li et al.’s scheme [8], Alice has to generate \(n\) 4-particle states, and each 4-particle state can carry one key bit. One round of public discussion is used in Li et al.’s QKD. Therefore, the qubit efficiency of Li et al.’s protocol is \(\frac{n}{4n}\times \frac{1}{2}=\frac{1}{8}=12.5\,\% \).
In Xiu et al.’s scheme [15], Alice has to generate \(n\) 6-particle states, and each 6-particle state can carry two key bits. One round of public discussion is used in Xiu et al.’s QKD. Therefore, the qubit efficiency of Xiu et al.’s protocol is \(\frac{2n}{6n}\times \frac{1}{2}=\frac{1}{6}=16.67\,\% \).
In Li et al.’s scheme [16], Alice has to generate \(n \)GHZ states, and each GHZ state can carry two key bits. Two rounds of public discussions are used in Li et al.’s QKD, and half of the transmitted qubits are used to check for the Trojan horse attacks. Therefore, the qubit efficiency of Li et al.’s protocol is \(\frac{2n}{3n}\times \frac{1}{2}\times \frac{1}{2}\times \frac{1}{2}=\frac{1}{12}=8.33\,\% \).
In Li and Li’s scheme [17], Alice has to generate \(n\) Bell states, and each Bell state can carry one key bit. Two rounds of public discussions are used in Li and Li’s QKD, and half of the transmitted qubits are used to check for the Trojan horse attacks. Therefore, the qubit efficiency of Li and Li’s protocol is \(\frac{n}{2n}\times \frac{1}{2}\times \frac{1}{2}\times \frac{1}{2}=\frac{1}{16}=6.25\,\% \).
In the proposed QKD protocol over a collective-dephasing noise channel, each two GHZ states can be used to encode two key bits. Since Alice has to prepare 2\(n\) GHZ states (i.e., 6\(n\) qubits) and 2\(n\) decoy logical qubits (i.e., 4\(n\) qubits), the qubit efficiency of the proposed QKD protocol is \(\frac{2n}{6n+4n}=\frac{1}{5}=20\,\% \). The same qubit efficiency with 20 % is calculated in the proposed QKD protocol over a collective-rotation noise channel by using GHZ-like states. Obviously, the qubit efficiency of our QKD protocol is the highest among the existing QKD protocols [8, 15–17] due to the use of the decoy logical qubits.
5 Security analysis
This section analyzes two well-known attacks, the intercept-and-resend attack and the entanglement-and-measure attack, against the proposed protocols. Then, the situation of a lossy quantum channel is discussed to show that the proposed protocols are also secure under this case.
5.1 Security against intercept-and-resend attack
The eavesdropper, Eve, may try to intercept and measure the sequences \({S}_B^{\prime } \) in Step 1 of Sect. 3 to deduce Alice’s raw key, and then send a bunch of forged logical qubits to Bob. However, according to Step 2 of Sect. 3, the decoy logical qubits are randomly inserted in the transmitted sequences \({S}_B^{\prime } \). Thus, without knowing the positions of these decoy logical qubits in advance, some errors will later be detected during the public discussion if Eve launches the intercept-and-resend attack. For example, consider only one specific decoy logical qubit, \(\left| {0_L } \right\rangle (=\frac{1}{\sqrt{2}}\left( {\left| {+_L } \right\rangle +\left| {-_L } \right\rangle } \right) )\) in \({S}_B^{\prime }\), where subscript “\(L\)” denotes the logical state resistant to the collective noise. Then, when performing the intercept-and-resend attack, Eve has to forge the decoy logical qubit. Since four decoy logical qubits \(\left| {0_L } \right\rangle , \left| {1_L } \right\rangle , \left| {+_L } \right\rangle \) and \(\left| {-_L } \right\rangle \) are possible candidates for Eve to choose, if she chooses the right decoy logical qubit \(\left| {0_L } \right\rangle \), she will pass the eavesdropping check. If, however, she chooses \(\left| {1_L } \right\rangle \) as the decoy logical qubit, then she cannot pass the eavesdropping check. If, on the other hand, she chooses \(\left| {+_L } \right\rangle \) and \(\left| {-_L } \right\rangle \) as the decoy logical qubits of different basis, she will pass the eavesdropping check with a probability of \(\frac{1}{2}\), where \(\left| {+_L } \right\rangle =\frac{1}{\sqrt{2}}\left( {\left| {0_L } \right\rangle +\left| {1_L } \right\rangle } \right) \) and \(\left| {-_L } \right\rangle =\frac{1}{\sqrt{2}}\left( {\left| {0_L } \right\rangle -\left| {1_L } \right\rangle } \right) \). In total, Eve has a probability of \(\frac{1}{2}\left( {=\frac{1}{4}+2\times \frac{1}{4}\times \frac{1}{2}} \right) \) to pass the checking process for each decoy logical qubit. Thus, the detection rate can be computed as \(1-\left( {\frac{1}{2}} \right) ^{n}\), if there are \(n\) decoy logical qubits. The detection probability would converge to 1 when \(n\) is large enough.
Without considering the public discussion in the proposed protocols, one can also evaluate the information which will be revealed by Eve through this attack based on the information theory [37]. In order to compute Alice’s raw key, Eve has to perform the Bell measurement on each two logical qubits. Then, three possible situations could occur: (1) none of the logical qubits is a decoy; (2) one of the logical qubits is a decoy; (3) both logical qubits are decoys. The following analysis thus is based on these three cases.
-
(1)
None of the logical qubits is decoy
Without loss of generality, consider a pair of GHZ states, \(\left| G \right\rangle _{123} \otimes \left| G \right\rangle _{456} \), prepared by Alice in the protocol over a collective-dephasing noise channel. Since none of the logical qubits is a decoy, the logical qubits for Eve are the (2nd, 3rd) and the (5th, 6th) qubits of the original GHZ states, \(\left| G \right\rangle _{123} \otimes \left| G \right\rangle _{456} \). After Eve performs the Bell measurement on both the (2nd, 5th) and the (3rd, 6th) qubits, the result will correspond to one of Bell measurement results of Alice as shown in Eq. (3). Based on Eq. (3), each result occurs with a probability of 25 % (\(=\frac{1}{4})\). For example, if the measurement result of Eve is \(\left\{ {\left| {\Phi ^{+}} \right\rangle _{25} \left| {\Phi ^{+}} \right\rangle _{36} ,\left| {\Phi ^{-}} \right\rangle _{25} \left| {\Phi ^{-}} \right\rangle _{36} } \right\} \) (\(\left\{ {\left| {\Phi ^{+}} \right\rangle _{25} \left| {\Phi ^{-}} \right\rangle _{36} ,\left| {\Phi ^{-}} \right\rangle _{25} \left| {\Phi ^{+}} \right\rangle _{36} } \right\} , \left\{ {\left| {\Psi ^{+}} \right\rangle _{25} \left| {\Psi ^{+}} \right\rangle _{36} ,\left| {\Psi ^{-}} \right\rangle _{25} \left| {\Psi ^{-}} \right\rangle _{36} } \right\} \), or \(\left\{ \left| {\Psi ^{+}} \right\rangle _{25}\right. \left. \left| {\Psi ^{-}} \right\rangle _{36} ,\left| {\Psi ^{-}} \right\rangle _{25} \!\left| {\Psi ^{+}} \right\rangle _{36} \right\} )\), then Alice’s measurement result is \(\left| {\Phi ^{+}} \right\rangle _{14} \) (\(\left| {\Phi ^{-}} \right\rangle _{14}, \left| {\Psi ^{+}} \right\rangle _{14} \), or \(\left| {\Psi ^{-}} \right\rangle _{14} )\), which implies the raw key is “00” (“01”, “10”, or “11”). Now suppose Shannon entropy, \(E=-\sum \nolimits _i {\rho _i \log _2 } \rho _i \), is introduced hereafter, where \(\rho _i \) is the probability distribution. The entropy \(E_1 \) can be computed as \(E_1 =-4\times \frac{1}{4}\log \frac{1}{4}=2\).
-
(2)
One of the logical qubit is a decoy
If one of the logical qubits intercepted by Eve is a decoy, the (7th, 8th) qubits, then the decoy one can be either in the state \(\left| {0_L } \right\rangle =\left| {01} \right\rangle , \left| {1_L } \right\rangle =\left| {10} \right\rangle , \left| {+_L } \right\rangle =\left| {\Psi ^{+}} \right\rangle \) or \(\left| {-_L } \right\rangle =\left| {\Psi ^{-}} \right\rangle \) with the same probability. Suppose the other logical qubit intercepted by Eve is the (2nd, 3rd) qubits of GHZ states \(\left| G \right\rangle _{123} \otimes \left| G \right\rangle _{456} \). After Eve performs the Bell measurement on both the (2nd, 7th) and the (3rd, 8th) qubits, the result will correspond to one of Bell measurement results of Alice as shown in Eqs. (4), (5), (6) and (7), respectively. As in Eqs. (4) and (5), when the decoy is in \(\left| {0_L } \right\rangle \) (or \(\left| {1_L } \right\rangle )\), the probability of getting each Alice’s result is 6.25 % (\(=\frac{1}{16})\). For instance, if the measurement result of Eve is \(\left| {\Phi ^{+}} \right\rangle _{27} \left| {\Phi ^{+}} \right\rangle _{38} \) or \(\left| {\Phi ^{-}} \right\rangle _{27} \left| {\Phi ^{-}} \right\rangle _{38} \), then Alice’s measurement result is \(\left| {\Phi ^{+}} \right\rangle _{14} \) with 6.25 % probability. Conversely, when the decoy is in \(\left| {+_L } \right\rangle \) (or \(\left| {-_L } \right\rangle )\), the probability of getting each Alice’s result is 3.125 % (\(=\frac{1}{32})\) as shown in Eqs. (6) and (7). For instance, if the measurement result of Eve is \(\left| {\Phi ^{+}} \right\rangle _{27} \left| {\Phi ^{+}} \right\rangle _{38} \) or \(\left| {\Phi ^{-}} \right\rangle _{27} \left| {\Phi ^{-}} \right\rangle _{38} \), then Alice’s measurement result is \(\left| {\Phi ^{+}} \right\rangle _{14} \) with 3.125 % probability. Furthermore, since the original GHZ states are \(\left| G \right\rangle _{123} \otimes \left| G \right\rangle _{456} \), there are only four situations in Eqs. (4) and (5), and eight situations in Eqs. (6) and (7), that are consistent to the entanglement swapping results of \(\left| G \right\rangle _{123} \otimes \left| G \right\rangle _{456} \), in which Eve will obtain useful information. That is, if Alice’s measurement result is \(\left| {\Phi ^{+}} \right\rangle _{14} (\left| {\Phi ^{-}} \right\rangle _{14} , \left| {\Psi ^{+}} \right\rangle _{14} \), or \(\left| {\Psi ^{-}} \right\rangle _{14} )\), then Eve’s measurement result is\(\left\{ {\left| {\Phi ^{+}} \right\rangle _{27} \left| {\Phi ^{+}} \right\rangle _{38} ,\left| {\Phi ^{-}} \right\rangle _{27} \left| {\Phi ^{-}} \right\rangle _{38} } \right\} \) \(\big (\left\{ {\left| {\Phi ^{+}} \right\rangle _{27} \left| {\Phi ^{-}} \right\rangle _{38} ,\left| {\Phi ^{-}} \right\rangle _{27} \left| {\Phi ^{+}} \right\rangle _{38} } \right\} , \left\{ \left| {\Psi ^{+}} \right\rangle _{27}\right. \left. \left| {\Psi ^{+}} \right\rangle _{38} ,\left| {\Psi ^{-}} \right\rangle _{27} \left| {\Psi ^{-}} \right\rangle _{38} \right\} , \text{ or } \left\{ {\left| {\Psi ^{+}} \right\rangle _{27} \left| {\Psi ^{-}} \right\rangle _{38} ,\left| {\Psi ^{-}} \right\rangle _{27} \left| {\Psi ^{+}} \right\rangle _{38} } \right\} \big )\). Hence, the entropy \(E_2 \) can be computed as \(E_2 =\frac{1}{2}\left( {-4\times \frac{1}{16}\log \frac{1}{16}} \right) +\frac{1}{2}\left( {-8\times \frac{1}{32}\log \frac{1}{32}} \right) =1.125\).
-
(3)
Both logical qubits are decoys
If both logical qubits are decoys, then their measurement results are independent with the entanglement swapping. Remember that the original GHZ states prepared by Alice are \(\left| G \right\rangle _{123} \otimes \left| G \right\rangle _{456} \). Alice performs the Bell measurement on the (1st, 4th) qubits, the probability of getting the measurement result \(\left| {\Phi ^{+}} \right\rangle \) (\(\left| {\Phi ^{-}} \right\rangle , \left| {\Psi ^{+}} \right\rangle \), or \(\left| {\Psi ^{-}} \right\rangle )\) is 25 % (\(=\!\!\frac{1}{4})\). In order to obtain the corresponding Bell measurement results with Alice, Eve performs the Bell measurement on both decoys (\(D_{1}, D_{4}\)) and (\(D_{2}, D_{3}\)) qubits, the probability of getting the measurement result \(\left| {\Phi ^{+}} \right\rangle \left| {\Phi ^{+}} \right\rangle \) or \(\left| {\Phi ^{-}} \right\rangle \left| {\Phi ^{-}} \right\rangle \) is \(\frac{1}{4}\left( {=\!\!\frac{1}{16}\left( {\frac{1}{4}\times 8+\frac{1}{8}\times 16} \right) } \right) \) as shown in Eqs. (8) and (9). Hence, Eve can obtain the correct product state \(\left| {\Phi ^{+}} \right\rangle \left| {\Phi ^{+}} \right\rangle \left| {\Phi ^{+}} \right\rangle \) or \(\left| {\Phi ^{+}} \right\rangle \left| {\Phi ^{-}} \right\rangle \left| {\Phi ^{-}} \right\rangle \) with a probability of \(\frac{1}{16}\left( {=\!\!\frac{1}{4}\times \frac{1}{4}} \right) \). Therefore, the entropy \(E_3 \) can be computed as \(E_3 =-4\times \frac{1}{16}\log \frac{1}{16}=1\).
Based on the above three situations, if Eve intercepts two logical qubits, then she can obtain the combinations of two states with either (logical qubit, logical qubit), (logical qubit, decoy), (decoy, logical qubit) or (decoy, decoy). Thus, the probability for three situations is \(\frac{1}{4}, \frac{1}{2}\) and \(\frac{1}{4}\), respectively. To summarize, the entire entropy \(E_T \) (\(=\frac{1}{4}\times E_1 +\frac{1}{2}\times E_2 +\frac{1}{4}\times E_3 =1.3125\)) can be computed, i.e., Eve can reveal 1.3125 bits by performing the intercept-resend attack. However, this attack will eventually be detected in the public discussion of decoy logical qubits. Even if the eavesdropper passes the public discussion, one can still perform the privacy amplification process [31, 32] on the transmitted information to avoid the information leakage problem.
5.2 Security against entangle-and-measure attack
In this attack, we assume that Eve has unlimited computing power and technology except for being limited by the laws of quantum mechanics [20, 38, 39]. In order to capture the transmitted information, Eve prepares some auxiliary qubits, and then she intercepts \({S}_B^{\prime }\) and entangles these auxiliary qubits with the intercepted \({S}_B^{\prime } \) by performing unitary operation \(U_{E}\), where \(U_{E}\) satisfies \(U_E^\dagger U_E =U_E U_E^\dagger =I\). Eve measures these auxiliary qubits in hope that she can obtain useful information. In the proposed schemes, however, once Eve makes the auxiliary qubits to obtain useful information about the decoy logical qubits, she will disturb the decoy logical qubits and being detected in the public discussion. Thus, the proposed protocols are free from the entangle-and-measure attack. A similar analysis is described in [24].
5.3 Security under a lossy quantum channel
This subsection shows that the proposed protocols are also secure under a lossy channel, i.e., the quantum channel between Alice and Bob is lossy. We also assume that Eve has the capability of establishing an ideal channel with any user. In order to derive Alice’s raw key, Eve intercepts the logical qubits transmitted from Alice to Bob, retains some logical qubits (e.g. \(y\) logical qubits) to herself, as if these \(y\) qubits have been lost in a lossy channel, and sends the substitute \(y\) logical qubits to Bob through an ideal channel. If the intercepted logical qubits are not decoy logical qubits, then Eve can measure the logical qubits in Bell basis. The measurement result will correspond to Alice’s key bits.
However, the proposed protocols are secure against this kind of attack because Alice and Bob use the received logical qubits to do the public discussion and to share the raw key. The probability to detect 1-qubit modification is 50 % (the same as Sect. 5.1). The detection probability is \(1-\left( {\frac{1}{2}} \right) ^{y}\), if \(y\)-qubit is substituted. While \(y\) is large enough, the detection probability is approximately 100 %. Thus, our protocols are still secure under this case. If there are only a few qubits being disturbed, then classical error correction codes and message authentication codes can be applied. However, this is not the focus of this paper.
6 Conclusion
This paper proposes two QKD protocols which are resistant to one kind of collective noises: the collective-dephasing noise and the collective-rotation noise, respectively. Moreover, the security analysis shows that the proposed protocols can avoid several well-known attacks and are still secure under the lossy quantum channel. Based on Bell measurements, an entanglement can be constructed from two independent GHZ state systems. Furthermore, by applying the decoy logical qubits and the entanglement swapping on constructing QKD protocols, the qubit efficiency of the proposed schemes can reach 20 %, which provides the best qubit efficiency among the existing QKD protocols.
References
Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Presented at the Proceedings of IEEE International Conference on Computers Systems and Signal Processing. Bangalore, India (1984)
Hwang, T., Lee, K.C.: EPR quantum key distribution protocols with potential 100 % qubit efficiency. IET Inf. Secur. 1(1), 43–45 (2007)
Shih, H.C., Lee, K.C., Hwang, T.: New efficient three-party quantum key distribution protocols. IEEE J. Sel. Top Quantum 15(6), 1602–1606 (2009)
Hwang, T., Lee, K.C., Li, C.M.: Provably secure three-party authenticated quantum key distribution protocols. IEEE Trans. Depend. Secur. 4(1), 71–80 (2007)
Hwang, T., Hwang, C.C., Tsai, C.W.: Quantum key distribution protocol using dense coding of three-qubit W state. Euro. Phys. J. D 61(3), 785–790 (2011)
Deng, F.G., Long, G.L., Wang, Y., Xiao, L.: Increasing the efficiencies of random-choice-based quantum communication protocols with delayed measurement. Chin. Phys. Lett. 21(11), 2097–2100 (2004)
Zhang, Z.J., Man, Z.X., Shi, S.H.: An efficient multiparty quantum key distribution scheme. Int. J. Quantum Inf. 3(3), 555–560 (2005)
Li, X.H., Deng, F.G., Zhou, H.Y.: Efficient quantum key distribution over a collective noise channel. Phys. Rev. A 78(2), 022321 (2008)
Zanardi, P., Rasetti, M.: Noiseless quantum codes. Phys. Rev. Lett. 79(17), 3306 (1997)
Knill, E., Laflamme, R., Viola, L.: Theory of quantum error correction for general noise. Phys. Rev. Lett. 84(11), 2525 (2000)
Kwiat, P.G., Berglund, A.J., Altepeter, J.B., White, A.G.: Experimental verification of decoherence-free subspaces. Science 290(5491), 498–501 (2000)
Kempe, J., Bacon, D., Lidar, D., Whaley, K.: Theory of decoherence-free fault-tolerant universal quantum computation. Phys. Rev. A 63(4), 042307 (2001)
Boileau, J.C., Gottesman, D., Laflamme, R., Poulin, D., Spekkens, R.W.: Robust polarization-based quantum key distribution over a collective-noise channel. Phys. Rev. Lett. 92(1), 017901 (2004)
Sun, Y., Wen, Q.Y., Gao, F., Zhu, F.C.: Robust variations of the Bennett–Brassard 1984 protocol against collective noise. Phys. Rev. A 80(3), 032321 (2009)
Xiu, X.M., Dong, L., Gao, Y.J., Chi, F.: Quantum key distribution protocols with six-photon states against collective noise. Opt. Commun. 282(20), 4171–4174 (2009)
Li, X.H., Zhao, B.K., Sheng, Y.B., Deng, F.G., Zhou, H.Y.: Fault tolerant quantum key distribution based on quantum dense coding with collective noise. Int. J. Quantum Inf. 7(8), 1479–1489 (2009)
Li, C.Y., Li, Y.S.: Fault-tolerate quantum key distribution over a collective-noise channel. Int. J. Quantum Inf. 8(7), 1101–1109 (2010)
Cabello, A.: Six-qubit permutation-based decoherence-free orthogonal basis. Phys. Rev. A 75(2), 020301 (2007)
Zhang, Z.J.: Robust multiparty quantum secret key sharing over two collective-noise channels. Phys. A 361(1), 233–238 (2006)
Sun, Y., Wen, Q.Y., Zhu, F.C.: Improving the multiparty quantum secret sharing over two collective-noise channels against insider attack. Opt. Commun. 283(1), 181–183 (2010)
Gu, B., Mu, L.L., Ding, L.G., Zhang, C.Y., Li, C.Q.: Fault tolerant three-party quantum secret sharing against collective noise. Opt. Commun. 283(15), 3099–3103 (2010)
Yang, C.-W., Tsai, C.-W., Hwang, T.: Thwarting intercept-and-resend attack on Zhang’s quantum secret sharing using collective rotation noises. Quantum Inf. Process. 11(1), 113–122 (2012)
Yang, C.-W., Tsai, C.-W., Hwang, T.: Fault tolerant two-step quantum secure direct communication protocol against collective noises. Sci. China Phys. 54(3), 496–501 (2011)
Yang, C.-W., Hwang, T.: Improved QSDC protocol over a collective-dephasing noise channel. Int. J. Theor. Phys. 51(12), 3941–3950 (2012)
Yang, C.-W., Hwang, T.: Quantum dialogue protocols immune to collective noise. Quantum Inf. Process. 12(6), 2131–2131 (2013)
Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1–2), 23–25 (2006)
Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72(4), 044302 (2005)
Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack (vol 72, art no 044302, 2005). Phys. Rev. A 73(4), 049901 (2006)
Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74(5), 054302 (2006)
Yang, C.-W., Hwang, T., Luo, Y.-P.: Enhancement on “quantum blind signature based on two-state vector formalism”. Quantum Inf. Process. 12(1), 109–117 (2013)
Bennett, C.H., Brassard, G., Crepeau, C., Maurer, U.M.: Generalized privacy amplification. IEEE Trans. Inf. Theory 41(6), 1915–1923 (1995)
Bennett, C.H., Brassard, G., Robert, J.M.: Privacy amplification by public discussion. SIAM J. Comput. 17(2), 210–229 (1988)
Lin, J., Hwang, T.: An enhancement on Shi et al’.s multiparty quantum secret sharing protocol. Opt. Commun. 284(5), 1468–1471 (2011)
Lin, J., Tseng, H.-Y., Hwang, T.: Intercept-resend attacks on Chen et al’.s quantum private comparison protocol and the improvements. Opt. Commun. 284(9), 2412–2414 (2011)
Chong, S.-K., Tsai, C.-W., Hwang, T.: Improvement on “quantum key agreement protocol with maximally entangled states”. Int. J. Theor. Phys. 50(6), 1793–1802 (2011)
Hwang, T., Hwang, C.-C., Yang, C.-W., Li, C.-M.: Revisiting Deng et al’.s multiparty quantum secret sharing protocol. Int. J. Theor. Phys. 50(9), 2790–2798 (2011)
Shannon, C.E.: Communication theory of secrecy system. Bell Syst. Tech. J. 28, 656–715 (1949)
Boström, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89(18), 187902 (2002)
Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 2050–2056 (1999)
Acknowledgments
We would like to thank the anonymous reviewers for their very valuable comments, which greatly enhanced the clarity of this paper. We would also like to thank the National Science Council of Republic of China, for thefinancial support of this research under Contract No. NSC 100-2221-E-006-152-MY3.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yang, CW., Hwang, T. Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channels. Quantum Inf Process 12, 3207–3222 (2013). https://doi.org/10.1007/s11128-013-0593-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11128-013-0593-x