999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Improved Multi-party Quantum Key Agreement with Four-qubit Cluster States

2022-11-10 02:28:28HusseinAbulkasimEatedalAlabdulkreemandSafwatHamad
Computers Materials&Continua 2022年10期

Hussein Abulkasim,Eatedal Alabdulkreem and Safwat Hamad

1Faculty of Science,New Valley University,El-Kharga&the Academy of Scientific Research and Technology,Cairo,Egypt

2College of Computer and Information Sciences,Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia

3Faculty of Computer and Information Sciences,Ain Shams University,Cairo,Egypt

Abstract:Quantum key agreement is a promising key establishing protocol that can play a significant role in securing 5G/6G communication networks.Recently,Liu et al.(Quantum Information Processing 18(8):1-10,2019)proposed a multi-party quantum key agreement protocol based on four-qubit cluster states was proposed.The aim of their protocol is to agree on a shared secret key among multiple remote participants.Liu et al.employed four-qubit cluster states to be the quantum resources and the X operation to securely share a secret key.In addition,Liu et al.’s protocol guarantees that each participant makes an equal contribution to the final key.The authors also claimed that the proposed protocol is secure against participant attack and dishonest participants cannot generate the final shared key alone.However,we show here that Liu et al.protocol is insecure against a collusive attack,where dishonest participants can retrieve the private inputs of a trustworthy participant without being caught.Additionally,the corresponding modifications are presented to address these security flaws in Liu et al.’s protocol.

Keywords:Quantum key agreement;5G/6G communication networks;collusive attacks;quantum cryptography

1 Introduction

The recent advancement of quantum technology threatens the ability of classical cryptosystems,including 5G/6G communication networks to secure data and communications against growing security attacks[1,2].In this context,the concept of quantum cryptography or quantum key distribution (QKD) was introduced by Bennet and Brassard[3].Thanks to the principle of quantum physics,quantum cryptography can provide unconditional security solutions whose security has been proven by[4].These solutions may be adopted to secure 5G/6G communication networks[5-7].Subsequently,scholars focused their attention and passion on quantum communication and quantum cryptography,and various quantum protocols were investigated,including quantum secure direct communication[8,9],quantum secret sharing[10-13],quantum teleportation[14],quantum private computation[15-17],quantum signature[18],quantum key agreement (QKA)[19-23],and so on.Currently,QKA is one of the most significant aspects that may be used to generate a secured shared key between two or more distance users using a public quantum channel.It differs from the QKD protocol,which predetermines the key and then distributes it to the users in that no user or subgroup can independently identify the shared key.

In 2004,Zhou et al.[19]presented the pioneering work of the QKA protocol.Several QKA schemes have also been introduced throughout time[20-23].In the same year,another QKA protocol was proposed based on entangled quantum states.Unfortunately,as Chong et al.[24]pointed out,it was not a true QKA protocol since malicious users may derive the final shared key independently and entirely.In 2010,a QKA protocol based on the BB84 protocol was suggested,which is proved to be secure against inside and outside attacks[24].In 2014,the authors in[25]developed an efficient twouser QKA protocol using four-qubit cluster quantum states.However,the authors could not extend their protocol to the multi-party case.The multi-party case of the QKA protocol is more complicated,but it is more suitable for real applications.As a result,the multi-party case of the QKA protocol has gotten a lot of interest[26-33].

Recently,Liu et al.[34](Liu-QKA protocol)presented an interesting multi-party QKA protocol with four-qubit quantum cluster states.Their protocol adopted the four-qubit quantum cluster state as a quantum resource and a unitary operation to generate and share a secure key.Liu-QKA protocol generated and shared quantum key with high efficiency.The authors claimed that their protocol is secure against the outsider and participant attacks.However,our work shows that Liu-QKA protocol cannot resist the collusive attack.Two or more malicious participants can drive the private inputs of the honest ones and execute the protocol without being caught.The rest of this manuscript is organized as follows.A review of Liu-QKA protocol is presented in Section 2.Sections 3 introduces the suggested attack strategy on Liu=-QKA protocol and the suggested improvement.Finally,Section 4 concludes this work.

2 Review of Liu-QKA Protocol

This subsection introduces a brief background of Liu-QKA protocol.

2.1 Preliminaries

The relationship between secret key of parties and the evolved 4-qubit cluster is indicated in Tab.1.

Table 1:The relationship between the secret key of parties and the evolved 4-qubit cluster

2.2 Liu-QKA Protocol

3 Collusive Attack on Liu-QKA Protocol and Improvement

We show in this section that Liu-QKA Protocol is vulnerable to a collusive attack,in which two dishonest players can obtain the secret information of an honest participant.Then,to address this flaw,an improvement is provided.

3.1 The Collusive Attack on Liu-QKA Protocol

Figure 1:(a),(b),and (c) represent an example of the three-party Liu-QKA protocol,while (d)represents the collusive attack on Liu-QKA’s protocol of three participants

3.2 Improvement on Liu-QKA Protocol

4 Conclusion

Liu et al.presented an interesting quantum key agreement protocol with four-qubit cluster quantum states,which could be used as an unconditional security solution for enhancing the security of 5G/6G networks against the increasing cyber-attacks.However,this work shows that Liu et al.’s protocol is vulnerable to collusive attacks,where dishonest participants can conspire together to obtain the private information of a trustworthy participant without being caught.With the help of a third party,we suggested an additional process to protect participants’private data from leakage.Finally,an improvement is suggested to address the security loopholes in Liu et al.’s protocol.

Acknowledgement:The authors acknowledge the Academy of Scientific Research &Technology(ASRT)in Egypt for their financial support.

Funding Statement:This project was financially supported by the Academy of Scientific Research and Technology(ASRT)in Egypt,under the project of Science Up,Grant no.6626.

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 免费国产不卡午夜福在线观看| 欧美中文字幕一区| 欧美一级高清片久久99| 宅男噜噜噜66国产在线观看| 欧美综合区自拍亚洲综合天堂| 国产福利免费在线观看| 91麻豆精品视频| 久久综合色天堂av| 91视频精品| 小蝌蚪亚洲精品国产| 国产欧美在线观看视频| 97视频免费在线观看| 日韩最新中文字幕| 国产在线视频欧美亚综合| 亚洲浓毛av| 欧美国产在线看| 国产亚洲欧美另类一区二区| …亚洲 欧洲 另类 春色| 亚洲一区二区三区香蕉| 91精品综合| 亚洲色无码专线精品观看| 中文无码精品A∨在线观看不卡| 日韩欧美国产中文| 蜜桃视频一区二区| 欧美中文字幕无线码视频| 色窝窝免费一区二区三区| 热热久久狠狠偷偷色男同| 国产性猛交XXXX免费看| 亚洲高清在线播放| 91亚瑟视频| 无码福利视频| 新SSS无码手机在线观看| 欧美特黄一免在线观看| 中文成人无码国产亚洲| 国产原创自拍不卡第一页| 国产成人亚洲精品色欲AV| 欧美日韩理论| 丁香六月激情综合| 很黄的网站在线观看| 91网在线| 538精品在线观看| 在线色国产| 国产中文在线亚洲精品官网| 国产成人区在线观看视频| 亚洲精品片911| 日韩精品无码免费一区二区三区| 伊人久久久久久久久久| 18禁色诱爆乳网站| 亚洲无限乱码| 91小视频在线观看免费版高清| 久久久久亚洲AV成人网站软件| 中文字幕无码电影| 久操中文在线| 亚洲人成在线精品| 成人一级免费视频| 久久精品国产精品一区二区| 91福利片| 高清无码一本到东京热| 国产18在线播放| 伊人久久大香线蕉影院| 中文字幕天无码久久精品视频免费 | 九九视频免费看| 国产精品 欧美激情 在线播放| 激情六月丁香婷婷四房播| 女人18一级毛片免费观看| 国产原创第一页在线观看| 5388国产亚洲欧美在线观看| 久久免费视频6| 久久精品无码国产一区二区三区| 五月天久久婷婷| 午夜国产精品视频| 91亚洲影院| 人人爱天天做夜夜爽| 中国国产高清免费AV片| 91亚洲视频下载| 蜜臀AV在线播放| 日韩欧美国产综合| 日韩精品无码免费专网站| 欧美日韩成人在线观看| 国产免费黄| 国产色网站| 精品视频一区二区观看|