Abstract
We present an efficient quantum key distribution protocol with a certain entangled state to solve a special cryptographic task. Also, we provide a proof of security of this protocol by generalizing the proof of modified of Lo-Chau scheme. Based on this two-user scheme, a quantum cryptography network protocol is proposed without any quantum memory.
Similar content being viewed by others
Introduction
Suppose Alice, a mother, wishes to control the correspondence among her son Bob and his friends. It means that if and only if attained her permissibility, Bob can correspond with his friends. However, the fellows’ communication is wanted to be secret to Alice. What can they do?
Classical cryptography provides an answer that is known as cryptography network. The primary task of cryptography is to enable two or more parties to mask confidential messages, such that the transmitted data are illegible to any unauthorized party, an eavesdropper called Eve. Usually this is done by using shared secret keys. However, in classical physics, there is nothing to prevent an eavesdropper from monitoring the key distribution channel passively, without being caught by the legitimate users. The recent development of quantum key distribution (QKD)1,2,3,4,5,6,7,8,9,10,11,12 can cover this major loophole of classical cryptography. It is based on the fundamental postulate of quantum physics that “every measurement perturbs a system”.
The first scheme for quantum cryptography, presented by Bennett and Brassard1, uses four states of single photons polarized along different directions, and various other types of quantum crypto-system have since been suggested. The other well-known concept for QKD is the Ekert scheme2 which is based on entangled pairs and uses the generalized Bell’s inequality13,14 to establish security. There are variant schemes utilizing Einstein-Podolsky-Rosen (EPR) correlations6,15, and proposed schemes based on two nonorthogonal states4, a variate of the four-state scheme16,17 and some ones based on orthogonal states18,19. Furthermore, some have been demonstrated experimentally20,21,22,23,24,25,26,27,28,29,30,31.
There are also theoretical proposals for QKD between more than two parties based on Greenberger-Horne-Zeilinger (GHZ) states32,33, and a first experiment has already been performed34.
If some practical techniques were to become widespread, however, it would have to be effective over a quantum cryptography network. Bihan et al.35 proposed the time-reserved EPR protocol which combined with quantum memories to build a quantum cryptography network. In a series of publications Townsend et al.36 have shown how the properties of passive optical networks (PONs) can be exploited to give one-to-any and any-to-any key distribution using quantum cryptography on branch- and loop-configuration networks. Recently, we have presented a conditional efficient multiuser quantum cryptography network scheme37 with three nonorthogonal states, which involves EPR source, a quantum random number generator and optical switches, and therefore well fits the status of the current experimental technology.
In this paper, we propose a QKD scheme with a certain entanglement of three qubits to solve the above-mentioned special cryptographic task. Combined with the idea presented by Lo et al.17, the efficiency of this scheme can be increased to tend to 100%. Suppose the center Alice creates pairs of particles in the entangled state |ABC〉 (seeing below), and sends a sequence of particles B and C out of each pairs to the two users Bob and Carol, and the corresponding particles A are left to herself. They choose their bases independently with different probabilities and perform measurements on their particles. And then, Alice broadcasts the results of measurements, which the two users announce their bases actually chosen via the classical channel to establish a common key between them. As two parties are much more likely to be using the same basis, thus reducing the fraction of discarded data, a significant gain in efficiency is achieved. To ensure our scheme is secure, we divide the accepted data into various subsets according to the bases employed and estimate an error rate for each subset separately. We then show that such a refined error analysis is sufficient in ensuring the security of our scheme against a biased eavesdropping strategy. The proof is based on the technique in Shor-Preskill’s proof of the security of another schemes38. Remarkably, we can establish a multi-user quantum cryptography network based on this scheme without quantum memory.
This paper is organized as follows. In the next section, an efficient two-user QKD scheme is proposed with a certain entanglement of three qubits. By considering a simple biased eavesdropping strategy by Eve, we note that analysis is sufficient in ensuring the security against this eavesdropping attack. Then, we consider the most general type of eavesdropping strategy allowed by quantum mechanics and prove that our scheme is unconditional secure. In addition, the constraint on the probability is derived. In Sec. III, using a series of certain entanglement, a quantum cryptography network is established based on the QKD scheme. Finally, we give a brief discussion and conclusion in Sec. IV.
Results
Efficient Two-User QKD Scheme
We choose a two-user scenario by way of example (See Table 1). In our scheme, there are three parties: the center, Alice and the users, Bob and Carol. Alice prepares pairs of particles in a certain entangled state
Particles B and C are sent to Bob and Carol, and the corresponding particle A is left for herself. There are two types of measurements that the receivers may perform: they may measure along the rectilinear basis, thus distinguishing between particles in the states |0〉 and |1〉. Alternatively, they may measure along the diagonal basis, thus distinguishing between the states and .
Three parties are connected by a quantum channel and a classical public channel. The quantum channel consists usually of an optical fiber. The public channel, however, can be any communication link. So how does this scheme work?
-
1
Alice, Bob, and Carol pick a number , 0 < ≤ 1 and make it value public. The constraint on will be discussed in Part D.
-
2
Alice prepares a sequence of pairs of particles in the entangled state |ABC〉, and sends particles B to Bob and particles C to Carol, and the corresponding particles A for herself.
-
3
If she allows the communications between the two users, Alice performs measurements along rectilinear basis (i.e., {|0〉, |1〉}), which can yield two possible results 0 and 1, therefore can potentially reveal one bit of information, and then registers the outcome of the measurements.
-
4
For each particle, Bob (Carol) has two types of measurements. One measurement is along rectilinear basis, and the other is along diagonal basis (i.e., ). He chooses between the two types with probabilities 1 − and , respectively. If he detects particle B (C) in the state |0〉 or , the result is 0; else, the measurement yields the result 1, and potentially reveals one bit of information. He writes down his measurement bases and the results of the measurements. The ensemble of these bits registered by both Bob and Carol is the raw key.
-
5
After exchanging enough particles, Alice broadcasts over the public channel the results based on her measurements.
-
6
Now Bob and Carol tell each other the sequence of bases they used, but not the results that they obtained, and keep only the bits corresponding to the same basis. There are two cases in which Alice obtains the measurement result 0 or 1. For each of these cases, both Bob and Carol are much more likely to choose the rectilinear basis and obtain correlated bits, thus achieving a significant gain in efficiency. This is a modified Ekert QKD scheme between Bob and Carol. If Alice yields “1”, the two users share a pair of particles in one of the EPR state . Because of the anti-correlations, in order to obtain identical keys, either of them should invert all bits of the key. Else, the pair of particles is in the state . Therefore, they would not do anything. Obviously, the key is secret to the center. In one word, the sifted key is generated with the total probability (1 − )2 + which goes to 1 as goes to zero. However, due to imperfections in the transmission, and to a potential eavesdropper, there will be some errors.
-
7
Bob and Carol throw away the useless cases when they have used incompatible bases. Since the total probabilities for the two users to obtain the results “0” and “1” are equal, the ensemble of these bits of the remaining cases is a sifted key. Therefore, the remaining cases are kept for further analysis and to generate the secret key.
-
8
Bob and Carol divide up the accepted data into two subsets according to the actual bases. In one subset where the two users both use the rectilinear basis, they randomly pick a fixed number say m1 particles and publicly compare their measurement results. The number of mismatches r1 (here, mismatch means the bit values of measurements are not correlated) tells them the estimated error rate . Similarly, in the other subset where they both use the diagonal basis, they pick a fixed number say m2 particles and publicly compare their measurement results. The number of mismatches r2 gives the estimated error rate . Note that the test samples m1 and m2 are sufficiently large, the estimated error rates e1 and e2 should be rather accurate. Now they demand that e1 and e2 < emax where emax is a prescribed maximal tolerable error rate. If these independent constraints are satisfied, they proceed to the next steps. Otherwise, they throw away the bit values of measurement and re-start the whole procedure. Notice that the constraints e1 and e2 < emax are more stringent than the original naive prescription (here is the average error rate). We will discuss it in detail in Part B.
-
9
If the error rates are not too high, they can use classical information processing techniques, such as error correlation and privacy amplification (seeing ref. 38), to reduce the error rates to zero, while reducing the information obtained by Eve to zero as well.
From the discussion in the step 6, we know that the efficiency of the sifted key can tend to 100%. However, after some classical error correction and privacy amplification, the efficiency of the secret key cannot achieve 100%, and it depends on the error rate which is generated by both eavesdropping and intrinsic noise due to experimental imperfections. Suppose we use a classical linear code C(k, N, d) with N bits, having 2k code words and minimum distance d as an error correction39. And the code of minimum distance d > 2t is necessary if t errors are to be corrected. In what follows, we will make use of two simple bounds, the Hamming or sphere-packing bound introduced by Hamming in 1950 and the Gilbert-Varshamov bound. In the limit of large N, it takes the form
where ζ → 0 as N → ∞, and H(x) is the entropy function
So the secret key’s rate approaches , and still more efficient than that of other schemes (For example, shown in ref. 33, the efficiency after error correction tends to ).
For each particle, as the choices of bases used by Bob and Carol are unknown to the eavesdropper, Eve, any interaction by her will unavoidably modify the transmission and introduce some errors. She has eavesdropping attack as below: (i) with a probability p1(p2) measures the state along the rectilinear (diagonal) basis and re-sends a particle according to the result of her measurement to the user; (ii) with a probability 1 − p1 − p2 does nothing.
Consider the error rate e1 for the case where both Bob and Carol use the rectilinear basis. For the biased eaves-dropping strategy under current consideration, errors occur only if Eve uses the diagonal basis. This happens with a conditional probability p2. In this case, the polarization of the particle is randomized, thus giving an error rate is
Similarly, errors for the case where both Bob and Carol use the diagonal basis happen with a conditional probability p1. Thus, the error rate for this case is given
Therefore, the users will find that, for the biased eavesdropping attack, the average error rate
Suppose Eve always eavesdrops only along rectilinear basis (i.e., p1 = 1, p2 = 0), then
as tends to 0, which is similar with the result of ref. 17. This means that if Eve is always eavesdropping along the rectilinear basis, with a naive error analysis prescribed as e < emax Bob and Carol will fail to detect eavesdropping by Eve.
To ensure the security of our scheme, it is crucial to employ a refined data analysis: the accepted data are further divided into various subsets according to the actual bases, and the error rate of each subset is computed separately. From Eqs (4 and 5), we can see that these error rates e1 and e2 depend on Eve’s eavesdropping strategy, but not on the value of . So the refined data analysis guarantees the security of the present scheme against the biased eavesdropping attack.
In this part, we provide a proof of security of our QKD scheme against the most general type of attack that is allowed by quantum mechanics, by generalizing the proof of modified Lo-Chau EPR scheme proposed by Shor and Preskill38, who related the security of the QKD to entanglement purification protocols40 and Calderbank-Shor-Steane (CSS) codes41,42 for privacy amplification and error correction.
In our scheme, if the center allows the communication between the two users, she measures her particles with the rectilinear basis. Then, between Bob and Carol, the QKD is equal to a modified EPR scheme38,43. The users demand that both bit- and phase-flip error rates, e1 and e2 of the channel must be sufficiently small,
Then, it has been proved that both error rates of the signal are also small enough to allow the CSS code to correct.
We remark that the proof of our scheme is based on the proof of the modified Lo-Chau EPR scheme38, and the error correction and privacy amplification procedure that we use are exactly the same as in Shor-Preskill’s proof. The point is the following: Once the error rate is shown to be correctable by a quantum (CSS) code, the procedure for error correction and privacy amplification in their proof can be carried over directly to our scheme.
From the above discussion, we remark that the Ekert QKD scheme is a special case of our scheme where . In a general case, however, the bases used by the two users are compatible with a probability (1 − )2 + , which goes to 1 as goes to zero, either. From Part B, we know the value of should be small but can not be zero. The main constraint on is that there should be enough particles for an accurate estimation of the error rates e1 and e2. We assume that N pairs of particles are chosen by Alice, i.e., N particles are transmitted from Alice to Bob and Carol, respectively. On average, only N belong to the case where both Bob and Carol choose the diagonal basis. To estimate e2 reasonably and accurately, one need to make sure that this number N is larger than the some fixed number say m2. The key point to note is that this number m2 depends on e2 and the desires accuracy of the estimation but not on N. (Indeed, the number m2 can be computed from classical statistical analysis). So
As N tends to ∞, can tend to zero, but never reach it. And the efficiency of this scheme is asymptotic 100%.
Multiparty QKD Scheme
We now generalize the two-party efficient QKD scheme to a multiparty one. Let us suppose that the center Alice prepares pairs of particles in the certain entangled state:
where the n-particle entanglement is the cat state , and (Here, means that a operation is performed on the ith qubit of the state |cat〉n by Alice, and i ∈ {1…n}), and n ≥ 3. She sends a sequence of particles j to each party Pj (j = 1…n) and leaves the corresponding particles A for herself. If she allows the n users to distribute a common key among themselves, Alice measures her particles along the rectilinear basis. Similar to the two-party scheme, each party Pj chooses his bases between the rectilinear and diagonal basis independently with the probability 1 − and respectively, and performs measurement. After exchanging enough particles, Alice broadcasts over the public channel the sequence of measurement results and on which qubit is put a operator “σx”. Then, each party also announces the sequence of bases he uses, but not the results that he obtains. There are two cases in which they keep the results of the measurement for a secret key: if all of them choose the rectilinear basis, the bits are kept for establishing a key; if only two of them use the same bases, and the others all use the diagonal basis, the bits are used to ensure the security of the channel connecting with them. Similar to the two-party scheme, to establish a common key, the ith user would invert all bits or not based on Alice’s results. Therefore, the users take on an error analysis to detect whether or not there is any eavesdropper. If the error rate is enough smaller, they carry out the last step, which is reconciliation and privacy amplification. Hence, a common key among n parties is established with the total probability (1 − )n. The security of the cryptography network is based on the fundamental postulate of quantum physics that “a nonorthogonal state cannot be cloned”.
Now we choose a three-party scenario by way of example and it will become evident that there are many parties that will work equally well. The scheme works in the following way:
-
1
The center Alice prepares a sequence of pairs of particles in the four-particle entangled state , where , and (here, suppose Alice choose that i = 2). Then, she sends particles B, C and D to the users Bob, Carol and David, and leaves the corresponding particle A for herself.
-
2
If she allows to establish a common key among the three parties, she measures her sequence of particles with the rectilinear basis, and then each user chooses his bases between the rectilinear and diagonal basis independently with the probability 1 − and , respectively, and performs measurement.
-
3
After Alice broadcasts her results and the number i which equals to 2, and the users also announce their bases, they choose the bits kept for a secret key in two cases. In one case, the users all use the rectilinear basis, they keep the bit as a raw key based on the results of Alice’s measurement. It means that if Alice broadcasts the result “1”, Carol would invert all her bits; else, the users do nothing with the bits. In the other case, one of them chooses the diagonal basis, and the other two use the same bases (rectilinear or diagonal), the bits are used to check the security of the communication channel. From Table 2, we find that, in the case, the bits of the two users which use the same bases are correlated. Therefore, they publicly compare their results of measurement and estimate the error rates. If the error rates are not too large, they proceed to the next steps. Otherwise, they throw away the data and restart the whole procedure. In Table 2, we give an example to explain the refined error analysis. And the key is secret to the center. In one word, the sifted key is generated with the total probability (1 − )3 which goes to 1 as goes to zero. Obviously, the probability can never be zero (seeing Sec. II).
-
4
For the first case mentioned above, similar to the two-party scheme, the users randomly pick a fixed number say m particles and broadcast their measurement results, then estimate the error rate , where r is the number mismatches. If the constraint e < emax, they go to the last step, reconciliation and privacy amplification to reduce the error rate. This error analysis is ensuring the security at the cryptography network against both eavesdropping and intrinsic noise.
Discussion
In the two-user scheme, pairs of particles for QKD are in the certain entangled state . This has density operator .
Tracing out the first qubit, we find the reduced density operator of the system (the second and third qubits),
Notice that this state is a mixed state. So if and only if the center Alice measures her particles and announces the measurement results, the two users can distribute a common key. However, once Alice measures her qubits, the left ones are in one of the EPR states (|Φ+〉 or |Ψ+〉) and then between Bob and Carol, the QKD is equal to a modified EPR scheme38,43. The key is proved to be unknown to Alice. It is evident that works well in the multiuser scheme. Furthermore, in that multiuser scheme, because of the cyclic symmetry of the state , we can check the channel between any two of the users by an error analysis. In summary, we propose a QKD scheme with some certain entanglement of three qubits to solve a special cryptographic task. Combined with the idea presented by Lo et al.17, the efficiency of this scheme can be increased to tend to 100%. To make the scheme secure against the dominant basis eavesdropping attack, it is crucial to have a refined error analysis in place of a naive error analysis. Then we provide a proof of security of our new QKD scheme against the most general type of attack by generalizing Shor and Preskill’s proof of security of the other schemes38. Furthermore, based on the scheme, we have shown that a certain entangled state can be used to distribute a common key among multi-user, in such a way that a quantum cryptography network can be established without any quantum memory. The security of the cryptography network is based on the fundamental postulate of quantum physics that “a nonorthogonal state cannot be cloned”. Also, an error analysis ensure the security of the communication channel between any two of the users.
Additional Information
How to cite this article: Xue, P. et al. Efficient multiuser quantum cryptography network based on entanglement. Sci. Rep. 7, 45928; doi: 10.1038/srep45928 (2017).
Publisher's note: Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
References
Bennett, C. H. & Brassard, G. In proceedings of IEEE International Conference on Computers 20, 175 (1984).
Ekert, A. K. Quantum cryptography based on Bells theorem. Phys. Rev. Lett. 67, 661 (1992).
Bennett, C. H., Brassard, G. & Mermin, N. D. Quantum cryptography without Bells theorem. Phys. Rev. Lett. 68, 557 (1992).
Bennett, C. H. Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121 (1992).
Bennett, C. H., Bessette, F., Brassard, G., Savail, L. & Smolin, J. Experimental quantum cryptography. J. Cryptol. 5, 3 (1992).
Jennewein, T., Simon, C., Weihs, G., Weinfurter, H. & Zeilinger, A. Quantum cryptography with entangled photons. Phys. Rev. Lett. 84, 4729 (2000).
Naik, D. S., Peterson, C. G., White, A. G., Berglund, A. J. & Kwiat, P. G. Entangled state quantum cryptography: Eavesdropping on the ekert protocol. Phys. Rev. Lett. 84, 4733 (2000).
Tittel, W., Brendel, J., Zbinden, H. & Gisin, N. Quantum cryptography using entangled photons in energy-time Bell states. Phys. Rev. Lett. 84, 4737 (2000).
Koashi, M. & Imoto, N. Quantum cryptography based on two mixed states. Phys. Rev. Lett. 77, 2137 (1996).
Xue, P., Li C. F. & Guo, G. C. Efficient quantum-key-distribution scheme with nonmaximally entangled states. Phys. Rev. A 64, 032305 (2001).
Xue, P., Li, C. F. & Guo, G. C. Addendum to “efficient quantum-key-distribution scheme with nonmaximally entangled states. Phys. Rev. A 65, 034302 (2002).
Xue, P. & Guo, G. C. Scheme for preparation of multipartite entanglement of atomic ensembles. Phys. Rev. A 67, 034302 (2003).
Bell, J. S. Physics (Long Isl& City, N. Y.) 1, 195 (1965).
Clauser, J. F., Horne, M. A., Shimony, A. & Holt, R. A. Proposed experiment to test local hidden-variable theories. Phys. Rev. Lett. 23, 880 (1969).
Ekert, A. K., Rarity, J. G., Tapster, P. R. & Palma, G. M. Practical quantum cryptography based on two-photon interferometry. Phys. Rev. Lett. 69, 1293 (1992).
Ardehali, M., Chau, H.-F. & Lo, H.-K. Efficient quantum key distribution. arXiv: quant-ph/9803007.
Lo, H.-K., Chau, H.-F. & Ardehali, M. Efficient quantum key distribution scheme & a proof of its unconditional security. J. of Cryptology 18, 133–165 (2005).
Goldenberg, L. & Vaidman, L. Quantum cryptography based on orthogonal states. Phys. Rev. Lett. 75, 1239 (1995).
Koashi, M. & Imoto, N. Quantum cryptography based on split transmission of one-bit information in two steps. Phys. Rev. Lett. 79, 2383 (1997).
Muller, A., Breguet, J. & Gisin, N. Experimental demonstration of quantum cryptography using polarized photons in optical fibre over more than 1 km. Europhys. Lett. 23, 383 (1993).
Townsend, P. D. Secure key distribution system based on quantum cryptography. Electron. Lett. 30, 809 (1994).
Franson, J. D. & Ilves, H. Quantum cryptography using optical fibers. Appl. Opt. 33, 2949 (1994).
Hughes, R. J., Morgan, G. L. & Peterson, C. G. Quantum key distribution over a 48 km optical fibre network. J. Mod. Opt. 47, 533 (2000).
Buttler, W. T., Hughes, R. J., Lamoreaux, S. K., Morgan, G. L., Nordholt, J. E. & Peterson, C. G. Daylight quantum key distribution over 1.6 km. Phys. Rev. Lett. 84, 5652 (2000).
Jacobs, B. C. & Franson, J. D. Quantum cryptography in free space. Opt. Lett. 21, 1854 (1996).
Lim, C., Korzh, B., Martin, A., Bussières, F., Thew, R. & Zbinden, H. Detector-device-independent quantum key distribution. Appl. Phys. Lett. 105, 221112 (2014).
Jouguet, P., Kunz-Jacques, S., Leverrier, A., Grangier, P. & Diamanti, E. Experimental demonstration of long-distance continuous-variable quantum key distribution. Nat. Photo. 7 378–381 (2013).
Guan, J.-Y. et al. Experimental passive round-robin differential phase-shift quantum key distribution. Phys. Rev. Lett. 114, 180502 (2015).
Sasaki, T., Yamamoto, Y. & Koashi, M. Practical quantum key distribution protocol without monitoring signal disturbance. Nature (London) 509, 475–479 (2014).
Qian, Y. J., Shen, Z., He, G. Q. & Zeng, G. H. Quantum-cryptography network via continuous-variable graph states. Phys. Rev. A 86, 052333 (2012).
Lo, H. K., Curty, M. & Tamaki, K. Secure quantum key distribution Nat. Photo. 8,595–604 (2014).
Zuckowski, M., Zeilinger, A., Horne, M. & Weifurter, H. Quest for GHZ states. Acta Phys. Pol. A 93, 187 (1998).
Hillery, M., Buzek, V. & Berthiaume, A. Quantum secret sharing. Phys. Rev A 59, 1829 (1999).
Tittel, W., Zbinden, H. & Gisin, N. Quantum secret sharing. Phys. Rev. A 63, 042301 (2001).
Bihan, E., Huttner, B. & Mor, T. Quantum cryptographic network based on quantum memories. Phys. Rev. A 54, 2651 (1996).
Townsend, P. D., Phoenix, S. J. D., Blow, K. J. & Barnett, S. M. Design of quantum cryptography systems for passive optical networks. Electron. Lett. 30, 1875 (1994).
Xue, P., Li, C. F. & Guo, G. C. Conditional efficient multiuser quantum cryptography network. Phys. Rev. A 65, 022317 (2002).
Shor, P. W. & Preskill, J. Simple proof of security of the bb84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000).
Gottesman, D. Class of quantum error-correcting codes saturating the quantum hamming bound. Phys. Rev. A 54, 1862 (1996).
Bennett, C. H., DiVincenzo, D. P., Smolin, J. A. & Wootters, W. K. Mixed-state entanglement & quantum error correction. Phys. Rev. A 54, 3824 (1996).
Calderbank, A. R. & Shor, P. Good quantum error-correcting codes exist. Phys. Rev. A 54, 1098 (1996).
Steane, A. Good quantum error-correcting codes exist. Proc. R. Soc. London A 452, 2551 (1996).
Lo, H. K. & Chau, H. F. Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050 (1999).
Acknowledgements
We acknowledge support by NSFC (Nos 11474049 and 11674056), NSFJS (No. BK20160024), and the Open Fund from State Key Laboratory of Precision Spectroscopy, East China Normal University.
Author information
Authors and Affiliations
Contributions
P.X. developed the theory, supervised K.W. & X.W., & wrote most of the paper. K.W. & X.W. checked the numerical simulations. All authors reviewed the manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing financial interests.
Rights and permissions
This work is licensed under a Creative Commons Attribution 4.0 International License. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in the credit line; if the material is not included under the Creative Commons license, users will need to obtain permission from the license holder to reproduce the material. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/
About this article
Cite this article
Xue, P., Wang, K. & Wang, X. Efficient multiuser quantum cryptography network based on entanglement. Sci Rep 7, 45928 (2017). https://doi.org/10.1038/srep45928
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/srep45928
This article is cited by
-
Sender-controlled measurement-device-independent multiparty quantum communication
Frontiers of Physics (2022)
-
Participant attack on the deterministic measurement-device-independent quantum secret sharing protocol
Science China Physics, Mechanics & Astronomy (2021)
-
Deterministic measurement-device-independent quantum secret sharing
Science China Physics, Mechanics & Astronomy (2020)
-
A self-adjusting quantum key renewal management scheme in classical network symmetric cryptography
The Journal of Supercomputing (2020)
-
Maximal entanglement and switch squeezing with atom coupled to cavity field and graphene membrane
Quantum Information Processing (2020)
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.