Introduction

The task of cryptograph is to ensure that only the legitimate users like Alice and Bob can read the secret message in the secure communication, which the unauthorized users like Eve cannot read. Researchers are dedicated to developing reliable and secure cryptographic protocols. With the rapid development of information technology and quantum physics1, quantum cryptography has become an important and attractive field. Quantum cryptography is based on the quantum mechanics, which is definitely different from the classical digital cryptographic system, and has much higher performance of security. With the rapid development of quantum mechanics in the past years, quantum information has been prosperous and fascinating.

Quantum mechanics offers some unique capabilities for the processing of the information, such as quantum computation and quantum communication. In the last decade, scientists have made dramatic progress in the field of quantum communication. The quantum key distribution (QKD), which task is to create a private key between two remote authorized users, is one of the most remarkable applications of quantum mechanics. Importantly, Gottesman, Lo, Lütkenhaus and Preskill (henceforth referred to as GLLP) proved the security of QKD when Alice’s and Bob’s devices are flawed, as is the case in practical implementations2. In addition, a device-independent QKD (DI-QKD) and measurement-device-independent QKD (MDI-QKD) was proposed. MDI-QKD protocol is fully practicable with current technology and attracted a lot of scientific attention from theoretical side3,4,5,6,7.

In 1984, C. H. Bennett and G. Brassard presented the pioneer quantum key distribution protocol, called BB84 protocol now8. This protocol has received lots of attention since it was come up. IBM and Montreal university first completed the experiment of quantum cryptography in 19899, which verified the BB84 protocol from the aspect of experiment. In ref. 10, the communication distance extended to more than 1 km by use of polarized photons. Now the distance of key distribution can reach up to 200 km, and there are some other developments with quantum key distribution, such as refs 11, 12, 13, 14, 15, 16.

In recent years, a novel concept, quantum secure direct communication (QSDC) was put forward and studied by groups of researchers. It allows two remote parties to communicate directly without creating a private key in advance and using it to encrypt the secret message. Thus, the sender should confirm whether the channel is secure before he encodes his message on the quantum states because the message cannot be discarded, unlike that in QKD protocols. Many QSDC protocols have been proposed, including the protocols without using entanglement17,18,19, the protocols using entanglement20,21,22,23,24,25,26,27 and the two-way QSDC protocols28,29,30,31,32,33,34,35,36,37. The QSDC protocol can also be used in some special environments as first proposed by Boström et al.38 and Deng et al.20. In ref. 38, Boström and Felbinger presented a famous QSDC protocol which is called “Ping-pong” protocol. But researchers have found much vulnerability39,40,41,42 in the “Ping-pong” protocol.

A new quantum key distribution protocol was proposed in this paper, which based on entanglement and dense coding. However, in the new protocol, there is a serious problem that is the storage time limit during the actual operation. At present, the world record of quantum state storage time is only 3 ms at Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics. Considering the storage time limit, a grouping quantum key distribution protocol based on entanglement and dense coding, which does not need to store quantum states in process, is proposed. What’s more, the securities of these two protocols are analyzed.

Results

New QKD Protocol

Referring to the BB84 protocol and “Ping-pong” protocol, a new one step quantum key distribution protocol is proposed, which based on entanglement and dense coding. The entanglement mechanism is introduced to improve the security and the dense coding mechanism is introduced to increase the efficiency of transformation. For simplicity, we suppose that the new quantum key distribution protocol based on entanglement and dense coding in this paper is referred to as EQKD.

Now let us give an explicit process for EQKD. For easily understanding the process of EQKD, Table 1 shows an example.

  1. 1

    Alice prepares a large enough number of classical bits N in sequence, and numbers the bits in the order Alice generates them.

  2. 2

    Alice prepares enough EPR states in sequence based on the order of classical bit N and dense coding mechanism, and forms a series of particles S in order. Meanwhile, Alice remembers the entanglement states and the location information of every EPR states that the numbers of each EPR quantum bit in sequence S. Then Alice transfers the sequence S to Bob by quantum channel.

  3. 3

    After Bob received the sequence S that Alice sent, Alice tells Bob the location information of every EPR states by classical channel.

  4. 4

    Bob extracts every EPR states on the basis of location information of every EPR states, and then makes the Bell basis measurement accordingly.

  5. 5

    Bob picks up a part of measurement results randomly as decoy photons and tells Alice the location information of the decoy photons. Alice tells Bob the original location information of the decoy photons. Then Bob compares his decoy photons with the original location information. If there is no eavesdropper, the error rate is lower than the threshold value, the quantum channel is deemed safe, and the generated raw key can be used. Otherwise, the generated raw key should be discarded, the communication is over.

  6. 6

    Confirming the safety of channel, Bob and Alice negotiates about the remaining measurement results and performs the correction and privacy amplification, then obtains the finial key.

Table 1 The example of EQKD.

The quantum state in Table 1 is referred to the 0th bit and the 6th bit in the classical bits forming state. The four Bell states are shown as follows:

Suppose that the eavesdropper Eve uses the simplest intercept and retransmission scheme, which means that Eve intercepts the quantum bits that Alice transfers to Bob, and makes the Bell measurement to any two particles of all quantum bits randomly, then prepares quantum bits based on the measurement results and transfers to Bob. According to the Heisenberg’s uncertainty principle and no-clone theory, the Eve’s operation has to cause a certain error rate for Bob’s measurement. Because that Eve does not know the EPR location information of the quantum bits in EQKD protocol, the longer the quantum bits, the higher the error rate of Eve chooses the EPR location information randomly. Therefore, as long as the quantum sequence is long enough, the EQKD protocol is absolutely safe, and Eve cannot obtain any information. Then we can say that the EQKD protocol is asymptotically secure.

Mini Protocol

One of the technical difficulties that have been unable to overcome is the ultrashort storage time of quantum state. All protocols that need to store quantum states in process have some limitations on the operability. The EQKD protocol which is proposed in this paper requires storing quantum states in process, so the operability of EQKD is low. On the basis of above facts, a grouping quantum key distribution protocol based on entanglement and dense coding, which does not need to store quantum states in process, is proposed in this paper. For simplicity, we suppose that the grouping quantum key distribution protocol based on entanglement and dense coding in this paper is referred to as MEQKD.

Every four bits of all classical bits is divided into a group in the MEQKD protocol and two EPR states is prepared for every group according to the entanglement and dense coding. Then the key information is transferred to Bob group by group. After receiving all groups in order, Bob obtains the final key.

Now let us give an explicit process for MEQKD. For easily understanding the process of MEQKD, Table 2 shows the process that every group is transferred to Bob.

  1. 1

    Alice prepares a large enough number of classical bits N in sequence and every four bits of sequence N is divided into a group in order.

  2. 2

    Alice picks up one group in order, and numbers the four bits into (1, 2, 3, 4). If all groups are took out, then go to the step (6); if all groups are not finished, then go to the step (3).

  3. 3

    Alice prepares two EPR states in sequence based on the order of four bits of current group and dense coding mechanism, and forms a series of particles S. Meanwhile, Alice remembers the entanglement and the location information {(1, 2), (3, 4)} or {(1, 3), (2, 4)} of every EPR states. Then Alice transfers the sequence S to Bob by quantum channel.

  4. 4

    After confirming that he received the sequence S, Bob randomly chooses one location information {(1, 2), (3, 4)} or {(1, 3), (2, 4)} to extract every EPR states, and then makes the Bell basis measurement accordingly.

  5. 5

    After Bob finished measurement, Alice tells Bob the location information of every EPR states of current group by classical channel. If the location information that Bob chose is not right, then the generated key of current group is discarded; otherwise, Bob decodes the generated key of current group by dense coding mechanism, and adds them to the whole raw key. The process goes to step (2).

  6. 6

    Bob picks up a part of whole raw key randomly as decoy photons and tells Alice the location information of the decoy photons. Alice tells Bob the original location information of the decoy photons. Then Bob compares his decoy photons with the original location information. If there is no eavesdropper, the error rate is lower than 46.875%, the quantum channel is deemed safe, and the generated raw key can be used. Otherwise, the generated raw key should be discarded, the communication is over.

  7. 7

    Confirming the safety of channel, Bob and Alice negotiates about the remaining raw key and performs the correction and privacy amplification, then obtains the finial key.

Table 2 The Example of the process that every group is transferred to Bob.

The quantum state in Table 2 is referred to the 1th bit and the 3th bit in the classical bits forming state.

The principle of the MEQKD protocol is similar to BB84, especially the random choose of EPR location information of every group, so the security of MEQKD protocol seems to be similar to that of BB84 protocol. In the MEQKD protocol, Bob chooses one of the EPR location information {(1, 2), (3, 4)} or {(1, 3), (2, 4)} to perform Bell measurement. The right probability of choosing EPR location information is 0.5, the probability of accurate measurement is 1. So the failure probability of choosing EPR location information is 0.5, according to the Heisenberg’s uncertainty principle, Bob will obtain a random result, and the probability of accurate measurement is 1/4 × 1/4 = 1/16 = 0.0625. Therefore, when there is no eavesdropper, the probability of right quantum bits which Bob can get is 1/2+1/2 × 1/16 = 17/32 = 0.5312543,44. Alice and Bob picks up one part of measurement results that chooses the same EPR location information and compares them via the classical channel, if the error rate is lower than the threshold value, the quantum channel can be seemed safe.

Discussion

The family of individual attacks describes the most constrained attacks that have been studied. An important subfamily of individual attacks is the intercept-resend (IR) attacks, which Eve intercepts the quantum signal flying from Alice to Bob, performs a measurement on it, and, conditioned on the result she obtains, she prepares a new quantum signal that she sends to Bob. In the MEQKD protocol, this produces errors in the key Alice and Bob share. As Eve has no knowledge of EPR location information {(1, 2), (3, 4)} or {(1, 3), (2, 4)} sent by Alice is encoded in, she can only guess which qubit pairs to measure in, in the same way as Bob. If she chooses correctly, she measures the correct Bell state as sent by Alice, and resends the correct Bell state to Bob.

However, if she chooses incorrectly, the state she measures is random and the two qubits are not entangled, and the state sent to Bob cannot be the same as the state sent by Alice. Because there are two Bell states and every Bell state has four types (, , , ), Bob gets the correct probability is 1/4 × 1/4 = 1/16. If Bob then measures this two Bell states in the same location Alice sent, he also gets a random result, and the correct probability is also1/4 × 1/4 = 1/16.

The Tables 3 and 4 show examples of this type of attack. In group 1 of Table 3, Eve selects right location, and Bob also selects the right location, the result is right. In group 2 of Table 3, Eve selects wrong location, and Bob select the right location, but the result of Bell states is wrong, so the keys are error. In group 3 of Table 4, Eve selects wrong location, and Bob select the right location, but one of the Bell state is right, the other Bell state is wrong, so the keys are error. In group 4 of Table 4, Eve selects wrong location, and Bob select the right location, but the result of Bell states is right, so the keys are right, probability of this situation is 1/16.

Table 3 The example of intercept and resend attack(a).
Table 4 The example of intercept and resend attack(b).

The probability Eve chooses the incorrect EPR location is 50% (assuming Alice chooses randomly), and if Bob measures this intercepted Bell states with the same location Alice sent he gets a random Bell state result, i.e., an incorrect result with probability of 15/16 = 93.75%. The probability two intercepted Bell state generate an error in the key string is then 50% × 93.75% = 15/32 = 46.875%.

If Alice and Bob publicly compare n groups of their key bits (thus discarding them as key bits, as they are no longer secret) the probability they find disagreement and identify the presence of Eve is Pd = 1 − (17/32)n. So to detect an eavesdropper with probability of Pd = 0.999999999, Alice and Bob need to compare n = 33 key bits, while Alice and Bob need to compare n = 72 key bits in BB84 protocol.

Through the above analysis, the EQKD protocol is asymptotically secure, but the process that stores the quantum bits has some limitations on the operability. In the MEQKD protocol, the eavesdropper will introduce error rate of 46.875%.

Since Alice and Bob preserve only the part of the information that the same base they use when MEQKD protocol attacked by individual attacks, while in this part of the information, it is the probability of 1/2 to take the same base without introducing errors at this moment when Eve is eavesdropping; Simultaneously, it is the probability of 1/2 to take the different base and introducing errors with the probability of 15/32 at this moment, so the final result of the error rate is 15/32 = 46.875%. When Eve is eavesdropping, Eve gets 0 with the probability of 17/32 and gets 1 with the probability of 15/32 if Alice sends message 0; Similarly, Eve obtains 1 with the probability of 17/32 and obtains 0 with the probability of 15/32 if Alice sends message 1. Then, , , , thus we can get the mutual information:

Although it does not meet the mutual information relations of privacy amplification, it will bring a greater error rate because that the mutual information is obtained by Eve’s eavesdropping in the process of all qubits transmitted. As long as setting a reasonable error rate upper limit (the upper limit is less than 46.875%), the communication processes that exceed the upper limit are canceled, and for the communication processes that the error rate do not exceed the upper limit, we are still able to ensure secure communication.

For MEQKD protocol, the amount of information that Eve obtained by coherent attack satisfies the following formula:

where D is QBER, Pi_1,i_2,…,i_N is the probability of the composition of the new quantum state when Eve’s detector obtained the quantum states i_1, i_2,…, i_N at the time of coherent measuring. And the mutual information of Alice and Bob is:

According to the conditions of error correction and privacy amplification I(A, B) > I(A, E), it must meets I(A, B) > I(A, E) at this time to achieve the purpose of secure communication, then the error rate D needs to satisfy the following formula:

We can get the error rate upper limit D0 ≈ 11%.

In order to ensure security of MEQKD protocol for coherent attacks, we need to make the error rate D < 11%. With respect to individual attacks, the error rate upper limit is lower.

Compared with “Ping-pong” protocol, MEQKD has two merits, one is the MEQKD needs not to store the qubit, the other is that MEQKD only needs one step. The “Ping-pong” protocol requires two steps: the first step is Alice sends to Bob, another step is Bob sends it back to Alice. While MEQKD requires only one step, namely, Alice sends it to Bob, so called one step.

One of the localizations is that the preparation of Bell state used in the protocol is more difficult than the preparation of the single photon, while we believe that the problem will be solved with the advancement of technology.

The project is only a theoretical model and we do not consider the non-ideal conditions such as imperfect devices and noisy situations. In the further work, the experiment of this protocol will be made in Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics. The other QKD and QSDC protocol will be researched and the security of these protocols in noise channel and ideal channel will be analyzed.

Additional Information

How to cite this article: Li, J. et al. One Step Quantum Key Distribution Based on EPR Entanglement. Sci. Rep. 6, 28767; doi: 10.1038/srep28767 (2016).