\begin{document}$ K = {K_0} \oplus {K_1} \oplus \cdots \oplus {K_{k - 1}}$\end{document}. The protocol resists external eavesdropping by inserting decoy states and conducting two security checks. Furthermore, we present an example by assigning certain values to parameters for illustrative purpose. Finally, QKA protocol mainly involves two types of attacks: participant attack and external attack. The external attack can be divided into Trojan attack, intercept-resend attack, and entangle-measure attack. To demonstrate the security of the scheme, we analyze the two types of attacks. The results show that the scheme can effectively resist the attack from internal participants and external eavesdroppers. However, the premise of our protocol is based on the ideal quantum channel. In practical applications, particles are usually affected by noise in the process of quantum channel transmission. Therefore, how the agreement adapts itself to a more complicated environment is our main work in the future."> Multi-party quantum key agreement based on <i>d</i>-level GHZ states - 必威体育下载

Search

Article

x

留言板

姓名
邮箱
手机号码
标题
留言内容
验证码

downloadPDF
Citation:

    Tang Jie, Shi Lei, Wei Jia-Hua, Yu Hui-Cun, Xue Yang, Wu Tian-Xiong
    PDF
    HTML
    Get Citation
    Metrics
    • Abstract views:5157
    • PDF Downloads:101
    • Cited By:0
    Publishing process
    • Received Date:27 May 2020
    • Accepted Date:30 June 2020
    • Available Online:30 September 2020
    • Published Online:20 October 2020

      返回文章
      返回
        Baidu
        map