scispace - formally typeset
Search or ask a question
Author

Kong-Ni Zhu

Bio: Kong-Ni Zhu is an academic researcher from Nanchang University. The author has contributed to research in topics: Quantum cryptography & Key distribution. The author has an hindex of 1, co-authored 1 publications receiving 14 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: Two semi-quantum identification protocols with single photons involving two parties, i.e., quantum Alice and classical Bob, are presented and quantum Alice can verify the identity of classical Bob without the classical measurement ability.
Abstract: To ensure communication security, it is necessary to verify the identities of the communicators. Two semi-quantum identification protocols with single photons involving two parties, i.e., quantum Alice and classical Bob, are presented. In the first semi-quantum identification protocol, classical Bob can authenticate quantum Alice’s identity without the help of an authenticated classical channel. As for the second one, quantum Alice can verify the identity of classical Bob without the classical measurement ability. Semi-quantum identification is significant to ensure the security of semi-quantum key distribution, semi-quantum secret sharing and so on. The proposed two identification protocols against common attacks can be employed in several existing semi-quantum key distribution protocols based on single photons to resist the man-in-the-middle attack.

32 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The history and current state-of-the-art in semi-quantum research is surveyed, including security proof methods and how classical post-processing can be used to counteract users' inability to perform certain quantum operations.
Abstract: Semi-quantum communication, a model introduced by Boyer et al. (Phys Rev Lett 99:140501, 2007), involves the use of fully quantum users and semi-quantum, or “classical” users. These restricted users are only allowed to interact with the quantum channel in a limited manner. Originally introduced to study the key-distribution problem, semi-quantum research has since expanded, and continues to grow, with new protocols, security proof methods, experimental implementations, and new cryptographic applications beyond key distribution. Research in the field of semi-quantum cryptography requires new insights into working with restricted protocols and, so, the tools and techniques derived in this field can translate to results in broader quantum information science. Furthermore, other questions such as the connection between quantum and classical processing, including how classical information processing can be used to counteract a quantum deficiency in a protocol, can shed light on important theoretical questions. This work surveys the history and current state of the art in semi-quantum research. We discuss the model and several protocols offering the reader insight into how protocols are constructed in this realm. We discuss security proof methods and how classical post-processing can be used to counteract users’ inability to perform certain quantum operations. Moving beyond key distribution, we survey current work in other semi-quantum cryptographic protocols and current trends. We also survey recent work done in attempting to construct practical semi-quantum systems including recent experimental results in this field. Finally, as this is still a growing field, we highlight, throughout this survey, several open problems that we feel are important to investigate in the hopes that this will spur even more research in this topic.

37 citations

Journal ArticleDOI
TL;DR: The proposed semi-quantum key agreement protocol employs the four-particle cluster state, whose large persistency of entanglement could ensure the feasibility and the security of the protocol.
Abstract: A semi-quantum key agreement protocol is proposed to allow one quantum participant and two classical ones to negotiate the final shared secret key equally. The protocol employs the four-particle cluster state, whose large persistency of entanglement could ensure the feasibility and the security of the protocol. The security of the proposed semi-quantum key agreement protocol against various attacks including the external eavesdropper’s attacks and the participant’s attacks is discussed. Furthermore, in comparison with the previous quantum key agreement and semi-quantum key agreement protocols, the proposed semi-quantum key agreement protocol contains more classical parties, requires less quantum channels, and needs no external assistance.

22 citations

Journal ArticleDOI
20 Aug 2020
TL;DR: It is shown that, similar to the fully quantum key distribution case, high-dimensional systems can increase the noise tolerance in the semiquantum case and several general security results are proved which are applicable to other (S)QKD protocols (both high- dimensional ones and standard qubit-based protocols) utilizing a two-way quantum channel.
Abstract: A semiquantum key distribution (SQKD) protocol allows two users, one of whom is restricted in their quantum capabilities to being nearly classical, to establish a shared secret key, secure against an all-powerful adversary. The study of such protocols helps to answer the fundamental question of “how quantum” must a protocol be to gain an advantage over classical communication. In this article, we design a new SQKD protocol using high-dimensional quantum states and conduct an information theoretic security analysis. We show that, similar to the fully quantum key distribution case, high-dimensional systems can increase the noise tolerance in the semiquantum case. Furthermore, we prove several general security results which are applicable to other (S)QKD protocols (both high-dimensional ones and standard qubit-based protocols) utilizing a two-way quantum channel.

20 citations

Journal ArticleDOI
TL;DR: A novel quantum authentication protocol based on entanglement swapping of Bell states, in which it can ensure two users to simultaneously authenticate each other, and can prevent the third party from knowing the secret key shared in prior between the two users.
Abstract: In this paper, we present a novel quantum authentication protocol based on entanglement swapping of Bell states, in which it can ensure two users to simultaneously authenticate each other. With the help of a semi-honest third party, our protocol can realize mutual identity authentication by utilizing Bell states and applying Pauli operators. In addition, this protocol can prevent the third party from knowing the secret key shared in prior between the two users. Finally, the analysis results show that this protocol is secure and efficient.

20 citations