arXiv Analytics

Sign in

arXiv:1510.08249 [quant-ph]AbstractReferencesReviewsResources

Comment on 'Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement'

Jun Gu, Tzonelih Hwang

Published 2015-10-28Version 1

Designing a quantum key agreement (QKA) protocol is always a challenging task, because both the security and the fairness properties have to be considered simultaneously. Recently, Zhu et al. (Quantum Inf Process 14(11): 4245-4254) pointed out that Shukla et al.'s QKA protocol (Quantum Inf Process 13(11): 2391-2405) has some security flaws (which lead to the Participant Attack). Moreover, they proposed an improvement to avoid these weaknesses. However this study points out that the improved protocol also suffers from a colluding attack, i.e., two dishonest participants in the protocol can collaborate to manipulate the final secret key without being detected.

Related articles: Most relevant | Search more
arXiv:quant-ph/0504126 (Published 2005-04-17, updated 2005-04-25)
Faithful and deterministic teleportation of an arbitrary $N$-qubit state using and identifying only Bell states
arXiv:quant-ph/0208015 (Published 2002-08-02, updated 2002-08-06)
Optimal Teleportation Based on Bell Measurement
arXiv:1111.4273 [quant-ph] (Published 2011-11-18, updated 2012-07-25)
Retraction of "Near-Deterministic Discrimination of All Bell States with Linear Optics," Phys. Rev. Lett. 107, 080403 (2011) and Erratum Phys. Rev. Lett. 107, 219901 (2011)