1. Introduction
2. Multiparty SQKA protocols without entanglement
2.1. Protocol 1: the symmetric three-party SQKA protocol without entanglement
– REFLECT: with half of the probability, Bob reflects the qubit back to Alice without any change. | |
– MEASURE-RESEND: with a probability of $\tfrac{3}{8}$, Bob measures the coming qubit in the classical basis and resends the same state back to Alice. His measurement results are denoted as K1, R1, and R2, with the length of the bits strings $| {K}_{1}| \geqslant N$, $| {R}_{1}| \geqslant N$, and $| {R}_{2}| \geqslant N$. | |
– DISCARD-PREPARE-RESEND: with a probability of $\tfrac{1}{8}$, Bob discards the coming qubit. He prepares a new state in $\{\left|0\right\rangle ,\left|1\right\rangle \}$ according to his secret key KB in the first N position and sends it back to Alice. |
– She measures REFLECT qubits in the bases she prepared to check the security of their quantum channel. She compares her measurement results with the initial states. They abort the protocol if the error rate is larger than a pre-defined threshold. | |
– She measures MEASURE-RESEND qubits in the classical basis. She takes the first N bits of her measurement results as K1 and the following 2N bits as R1 and R2, where K1 will be used by Alice to encrypt KA for Bob, and R1 and R2 by classical players Bob and Charlie to encrypt their KB and KC for each other. | |
– She measures DISCARD-PREPARE-RESEND qubits in the classical basis. She will get Bob’s secret key KB from the first N bits. |
2.2. Protocol 2: the asymmetric three-party SQKA protocol without entanglement
– REFLECT: with a probability of $\tfrac{\tau }{4N+\tau }$. | |
– MEASURE-RESEND: with a probability of $\tfrac{3N}{4N+\tau }$. | |
– DISCARD-PREPARE-RESEND: with a probability of $\tfrac{N}{4N+\tau }$. |
2.3. Protocol 3: the asymmetric multiparty SQKA protocol without entanglement
– REFLECT: with a probability of $\tfrac{\tau }{2N(M-1)+2N+\tau }$, Bobi reflects the qubit back to Alice. | |
– MEASURE-RESEND: with a probability of $\tfrac{2N(M-1)+N}{2N(M-1)+2N+\tau }$, Bobi measures the coming qubit in the classical basis and resends the same state back to Alice. Their measurement results are denoted as Ki with $| {K}_{i}| \geqslant N$, and a set of (M − 1) bits strings ${R}_{1}^{(i)},{R}_{2}^{(i)},\cdots ,{R}_{j}^{(i)},\cdots ,{R}_{M}^{(i)}$ with $j\in [1,M]$, $j\ne i$ and $| {R}_{j}^{(i)}| \geqslant 2N$. Similar to Protocol 1, Ki will be used by Alice to encrypt KA to Bobi, while ${R}_{j}^{(i)}$ will be used by classical players to securely exchange their keys with other classical players. | |
– DISCARD-PREPARE-RESEND: with a probability of $\tfrac{N}{2N(M-1)+2N+\tau }$, Bobi discards the coming qubit and prepares a new state in $\{\left|0\right\rangle ,\left|1\right\rangle \}$ according to his secret key ${K}_{{B}_{i}}$ and sends it back to Alice. |
– She measures REFLECT qubits to check the security of their quantum channel. | |
– She measures MEASURE-RESEND qubits in the classical basis. Alice takes the first N bits as Ki. She takes following 2N bits as ${R}_{j}^{(i)}$ for j = 1 to M and $j\ne i$. | |
– She measures DISCARD-PREPARE-RESEND qubits in the classical basis and gets Bobi's secret key ${K}_{{B}_{i}}$ from the first N bits. |
3. Security
3.1. Security of quantum channels
3.2. Security of player’s private keys
3.3. Fairness against dishonest players
4. Discussions and conclusions
Table 1. Qubits efficiencies of our SQKA protocols, where M is the number of classical players, N is the length of each player’s secret key, and τ is the length of the REFLECT qubits used for security detection. |
Protocol 1 | Protocol 2 | Protocol 3 | |
---|---|---|---|
Key length: s | N | N | N |
Qubits costs: q | 32N | 16N + 4τ | $4{M}^{2}N+2M\tau $ |
Classical costs: c | 22N | 14N + 2τ | $4{M}^{2}N-{MN}+M\tau $ |
Efficiency: η | $\approx \tfrac{1}{54}$ | $\approx \tfrac{N}{30N+6\tau }$ | $\approx \tfrac{N}{8{M}^{2}N-{MN}+3M\tau }$ |
Table 2. Comparisons of quantum requirements in our SQKA protocols and the SQKA protocol in [44], where M is the number of classical players and ‘RQ’ represents reordering qubits. |
[44] | Protocol 1 | Protocol 2 | Protocol 3 | |
---|---|---|---|---|
Number of players | 2 | 3 | 3 | $M+1\geqslant 3$ |
Quantum states | Bell states | single-photons | single-photons | single-photons |
RQ for classical players | Yes | No | No | No |