• Chinese Journal of Quantum Electronics
  • Vol. 32, Issue 4, 452 (2015)
Haihong WANG1、2、*, Shengmei ZHAO2, and Longyan GONG1、2
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • show less
    DOI: 10.3969/j.issn.1007-5461.2015.04.011 Cite this Article
    WANG Haihong, ZHAO Shengmei, GONG Longyan. A quantum key distribution protocol based on challenge-response mechanism[J]. Chinese Journal of Quantum Electronics, 2015, 32(4): 452 Copy Citation Text show less
    References

    [3] Wootters W K, Zurek W H. A single quantum cannot be cloned[J]. Nature, 1982, 299(588): 802-803.

    [4] Mayers D. Unconditional security in quantum cryptography[J]. Journal of the ACM, 2001, 48(3): 351-406.

    [6] Ma X C, Sun S H, Jiang M S, et al. Gaussian-modulated coherent-state measurement-device-independent quantum key distribution[J]. Phys. Rev. A, 2014, 89(4): 1-9.

    [7] Liu Y, Chen T Y, Wang L J, et al. Experimental measurement-device-independent quantum key distribution[J]. Phys. Rev. Lett., 2013, 111(13): 130502.

    [8] Bennett C H, Brassard G. Quantum cryptography: Public-key distribution and coin tossing[C]. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Banglore, 1984.

    [9] Bennett C H, Bessette F, Brassard G, et al. Experimental quantum cryptography[J]. Journal of Cryptography, 1992, 5: 3-28.

    [10] Ekert A K. Quantum cryptography based on Bell theorem[J]. Phys. Rev. Lett., 1991, 67(6): 661-663.

    [11] Bennett C H. Quantum cryptography using any two nonorthogonal states[J]. Phys. Rev. Lett., 1992, 68(21): 3121-3124.

    [12] Bruss D. Optimal eavesdropping in quantum cryptography with six states[J]. Phys. Rev. Lett., 1998, 81(14): 3018-3021.

    [13] Liu C, Zhang S, Zhao L, et al. Differential-phase-shift quantum key distribution using heralded narrow-band single photons[J]. Opt. Expr., 2013, 21(8): 9505-9513.

    [14] Hwang W Y. Quantum key distribution with high loss: Toward global secure communication[J]. Phys. Rev. Lett., 2003, 91(5): 7091-7095.

    [15] Serna E H. Quantum key distribution from a random seed[J]. arXiv preprint, 2013, arXiv: 1311.1582.

    [17] Wei Zhengjun, Wan Wei, Wang Jindong, et al. A new differential phase shift quantum key distribution system with Faraday- Michelson interferometer[J]. Acta Physica Sinica, 2011, 60(9): 411-417.

    [18] Zhang C M, Li M, Huang J Z, et al. Fast implementation of length-adaptive privacy amplification in quantum key distribution[J]. Chin. Phys. B, 2014, 23(9): 90310-90315.

    [19] Fred Fung C H, Ma X F, Chau H F, et al. Quantum key distribution with delayed privacy amplification and its application to the security proof of a two-way deterministic protocol[J]. Quan. Phys., 2012, 85(3): 032308.

    [20] Mala H. Biclique-based cryptanalysis of the block cipher squre[J]. Information Security, 2014, 8(3): 207-212.

    [21] Gong L Y, Pan J X, Liu B B, et al. A novel one-time password mutual authentication scheme on sharing renewed finite random sub-passwords[J]. Journal of Computer and System Sciences, 2013, 79(1): 122-130.

    WANG Haihong, ZHAO Shengmei, GONG Longyan. A quantum key distribution protocol based on challenge-response mechanism[J]. Chinese Journal of Quantum Electronics, 2015, 32(4): 452
    Download Citation