Abstract
E-commerce, a type of trading that occurs at a high frequency on the internet, requires guaranteeing the integrity, authentication, and nonrepudiation of messages through long distance. As current e-commerce schemes are vulnerable to computational attacks, quantum cryptography, ensuring information-theoretic security against adversary’s repudiation and forgery, provides a solution to this problem. However, quantum solutions generally have much lower performance compared to classical ones. Besides, when considering imperfect devices, the performance of quantum schemes exhibits a notable decline. Here, we demonstrate the whole e-commerce process of involving the signing of a contract and payment among three parties by proposing a quantum e-commerce scheme, which shows resistance of attacks from imperfect devices. Results show that with a maximum attenuation of 25 dB among participants, our scheme can achieve a signature rate of 0.82 times per second for an agreement size of approximately 0.428 megabit. This proposed scheme presents a promising solution for providing information-theoretic security for e-commerce.
Quantum e-commerce can offer information-theoretic security with the resistance of imperfect devices and privacy leakage.
INTRODUCTION
Developing algorithms and quantum attacks threaten the security of classic cryptography (1–4). Because the security of current cryptographic schemes tends to rely on computationally hard mathematical problems (5–8), information-theoretic security against unlimited computational power has been a hot topic. Quantum mechanics law is one of the approaches (9–14). Quantum key distribution (QKD), which is the most mature application field of quantum technology, offers two remote users unconditionally secure keys (9, 10). Combined with one-time pad, QKD successfully guarantees the confidentiality of messages.
Secure identification is another important application domain in the realm of the quantum internet (15), which can help guarantee the security during financial transactions. E-commerce, as an indispensable part of daily life, requires identification of the parties and nonrepudiation of the contract. A commitment among different participants is required to guarantee the validity of a transaction. The security of classical e-commerce schemes tends to be based on public-key cryptography algorithms (5–8), which is only secure assuming the limited computation power, and there lacks an effective solution to defend against external attacks. In addition, the presence of dishonest participants may render the contract invalid. Cryptography contains four main information security objectives, confidentiality, integrity, authenticity, and nonrepudiation (16). The integrity, authenticity, and nonrepudiation of messages need to be assured in an e-commerce scheme. The integration of QKD with one-time pad, only promising confidentiality for messages, fails to accomplish this task. Quantum digital signatures (QDS) can provide information-theoretic security for the last three primitives and thus is suitable for e-commerce scenarios.
QDS was proposed first at 2001 (17). The original version has many impractical experimental requirements, which made its implementation impossible with available technology. With the development in the next decade, the requirements of swap test and quantum memory are removed (18–20). Nevertheless, their security analyses were based on secure quantum channels. In 2016, two schemes were proposed independently to solve this problem (21, 22). Triggered by the two protocols and developments in QKD (23–33), many achievements have been made theoretically (34–40) and experimentally (41–48).
Previous QDS schemes are inefficient when it comes to multibit cases, and their performances are far from classical solutions. Recently, a new scheme, based on secret sharing, one-time pad, and one-time universal hashing (OTUH), has been proposed (14). This scheme can sign an arbitrarily long document with a relatively short signature, whose performance outperforms all previous protocols. Furthermore, a variant of this scheme reduces the requirements on keys (49), in which the privacy amplification steps are removed. Besides, security proof of previous schemes tends to be based on assumptions on the ideal devices, and there has been a lack of QDS schemes with the ability to solve the loopholes from imperfect devices. To enhance the robustness to imperfect devices, our key generation process (KGP) draws on the development of QKD (23, 50–63). Four-phase measurement device–independent (MDI) QKD (63) is secure against possible source flaws and outperforms other protocols in key rate, and KGP of our scheme based on this protocol retains its advantage.
Here, we present a quantum solution for e-commerce scenarios by proposing an efficient quantum e-commerce scheme based on the ideas mentioned above, which offers security advantages over classical schemes. Motivated by the OTUH scheme (14, 49) and four-phase MDI-QKD (63), our scheme is able to sign multibit documents with high efficiency while mitigating the impact of imperfect devices and thus improves the overall security and practicality of the scheme. The signature rate is only limited by the minimum key rate of KGP between different participants and merchant. Our experimental implementation on a multiuser quantum network successfully signs a 0.428-megabit (Mb) agreement 0.82 times per second with a maximum attenuation of 25 dB between a participant and a merchant. We also characterize the imperfections of the sources experimentally. Our work contributes to the further development of e-commerce in the quantum era by providing a practical and efficient solution with enhanced security.
RESULTS
Protocol description
In a classical e-commerce scenario, a third party (TP) is always required and assumed as trusted. Thus, only those with high authority can be a TP, leading to a requirement of centralized systems. Here, we propose a three-party quantum e-commerce protocol with no assumptions on TP. The only requirement is that the majority of the three parties must be honest, which is a basic requirement of all three-party protocols. In the protocol, we describe a scenario where Client buys a product from Merchant through a network, and TP is an arbiter to help finish the whole process successfully. In the network with numerous nodes, TP can be an arbitrary party because there are no assumptions on it. A decentralized system can be realized based on our proposed three-party protocol. A schematic of the quantum e-commerce protocol is shown in Fig. 1A. The step-by-step procedure is comprehensively elucidated below and shown in Fig. 1B.
Fig. 1. Illustrations depicting the process and network of quantum e-commerce.
(A) Illustration of the process of quantum e-commerce. We consider the three-party scenario where Client buys a product from Merchant. TP is introduced as an arbiter to prevent either Merchant or Client from cheating. Merchant shares two sequences of coherent quantum states with Clinet and TP, respectively. Merchant then generates the contract with all information of the e-commerce and obtains a signature through a hash function and keys distilled by his sequences. Thereafter, Merchant sends the contract and signature to Client. Client, if agreeing with the contract, will send the contract, signature, and keys distilled by his consequence to TP. TP will then send keys distilled by his own sequence back to Client. Both Client and TP independently verify the signature through their own and received keys by hash functions. Client will pay the money to TP if he verifies the signature. TP will transfer the money to Merchant if he also passes the signature. (B) Flow chart of the protocol. Details of the procedure are explained in the protocol description step by step. (C) Diagram of users in quantum networks.
(i) Distribution: Four-phase MDI-KGP is used here to generate raw keys, and the form of quantum states is , where θi is the modulated phase and ∣α∣2 is the intensity of pulses. Details about KGP can be seen in Materials and Methods. Merchant prepares two sequences of coherent states ∣X1〉 and ∣X2〉 and keeps the phase of every state. Client also prepares a sequence ∣Y1〉, and the TP prepares ∣Y2〉. Through a Merchant-Client quantum channel, Merchant sends ∣X1〉 and Client sends ∣Y1〉 to an untrusted intermediate Eve who performs interference measurements on the received pulses with a 50:50 beam splitter (BS) and two single-photon detectors and announces the detection results m1. Likewise, ∣X2〉 and ∣Y2〉 are sent to an untrusted intermediate through the Merchant-TP channel, and the detection results m2 are announced.
(ii) Signature: To sign a contract, Merchant distills a 3n-bit key from ∣X1〉 and m1. He will select states in ∣X1〉 that successfully intervene with that in ∣Y1〉 according to the detection results m1. He also communicates with Client through an authenticated channel to sift the keys and lastly chooses a 3n-bit substring to form . Likewise, Merchant distills a 3n-bit key from ∣X2〉 and m2.
The keys and are used to generate the signature of the contract. The signature is generated through a universal hash function , with a length of n-bit, where C is the contract containing all details including timestamp and the identity of Merchant and Client. The function Hash is composed of a linear feedback shift register (LFSR) Toeplitz functions. Details are shown in Materials and Methods.
(iii) Transference: Merchant sends the contract and signature {C, Sig} to Client. If Client agrees with the contract, then he distills a key , following the rules same as that of Merchant. He then sends to TP. TP also obtains . He will send his key to Client after he receives .
(iv) Verification and payment: Both Client and TP independently verify the signature by calculating and comparing the result with Sig. If the result is identical to Sig, the signature is successfully passed. Client will pay the money to TP if he verifies the signature. TP, after receiving the payment, will transfer the money to Merchant if he passes the signature. Otherwise, he will return the money to Client and announce that the contract is aborted.
In the distribution step, the participants essentially share correlated and secret quantum states. The secrecy of the interpreted keys, together with one-time hashing, protects the security of the program against Client’s tampering attacks. Note that the distribution step is different from QKD. Privacy amplification is removed because secrecy leakage of keys can be tolerated in signature tasks through OTUH (49). The transference step guarantees that Client and TP obtain the same final keys. Merchant’s repudiation attacks are prevented by TP because TP will always make the correct judgment if Client is honest.
In a traditional digital payment scheme, the TP is assumed trusted and corresponding to a central authority. Previous quantum-digital authentication/payment schemes follow this centralized structure where the security is guaranteed by the trusted central authority (12). In the proposed scheme, the assumption on the third party is removed and the security is guaranteed by the majority of honest parties. Under this structure, the status of the three parties is equal, and thus, the TP can be decentralized in real implementations. Compared with classical solutions, the proposed quantum e-commerce requires additional quantum channels of Merchant-Client and Merchant-TP while providing information-theoretic security and decentralized character, thus mitigating the burden of the authority and risk of insider attacks. The proposed scheme has great potential in a future block chain payment system.
Security analysis
The proposed scheme is a three-party protocol without strong assumptions on TP. In other words, the three parties have equal status, and the final decision is made by voting principle if disagreement happens. It must be assumed that, at most, one party can be malicious. Otherwise, malicious parties can cooperate to finish the attack by controlling the voting result. In security analysis, we consider four cases: honest abort, Merchant’s repudiation attack, Client’s forgery attack, and TP’s forgery attack.
Robustness
If Merchant and Client (or TP) share different key bits after the distribution stage, the protocol will be aborted even if the users are all honest. That is, an honest run abortion occurs. In the protocol, Merchant and Client (TP) perform error correction on their final keys, with a failure probability of no more than ϵEC. The correctness of classical information transference is protected by classical information technology such as authenticated channels, whose failure probability is set as no more than ϵ′. The probability that Merchant and Client share different final key is no more than ϵEC + ϵ′, and the same for Merchant and TP. Thus, the robustness bound is ϵrob = 2ϵEC + 2ϵ′. Because ϵ′ is a parameter of classical communication, we assume it as ϵ′ = 10−10 in the simulation.
Repudiation
In a repudiation attack, Merchant attempts to let Client accept the contract, while TP rejects it so that he can successfully deny the contract. For Merchant’s repudiation attacks, Client and TP are both honest and symmetric and thus hold the same new key strings. They will make the same decision for the same contract and signature. Repudiation attacks succeed only when errors occur in one of the transference steps. The repudiation bound is ϵrep = 2ϵ′.
Forgery
In Client’s forgery attack, Client will tamper the contract and attempts to let TP accept the tampered contract forwarded to him. According to our protocol, TP accepts the contract if and only if TP obtains the same result as Sig through one-time hash functions. Actually, this is the same as an authentication scenario where Client is the attacker attempting to forge the information sent from Merchant to TP. TP also has the motivation to perform forgery attack. He may attempt to intercept the contract C and tamper the information of price in it. If Client agrees with the tampered (higher) price, then TP can earn the price difference secretly. This is the same as an authentication scenario where TP is the attacker attempting to forge the information sent from Merchant to Client. Thus, Client and TP’s forgery attacks are equivalent, and we only analyze Client’s in the following.
In the hash function, ,
is actually divided into three n-bit substrings. Here, we rewrite it as to keep consistent with that in Materials and Methods. Define = Hmin(X∣B)ρ as the min-entropy of X and B, where X ∈ {x2, x3, x4} and B represents Client’s guessing for X. We can estimate through parameters in the distribution stage. More details are shown in Materials and Methods. Then, we can bind the probability that the attacker correctly guesses X when using an optimal strategy according to the definition of min-entropy (64)
| (1) |
Thereafter, we can obtain the failure probability of an authentication scenario where Client is the attacker attempting to forge the information sent from Merchant to TP, which is equivalent to the forgery bound in our scheme (49)
| (2) |
The number of malicious parties is no more than one, i.e., at most one of the above cases happens. Thus, the total security bound, i.e., the maximum failure probability of the protocol, is ϵtot = max {ϵrob, ϵrep, ϵfor}.
From the analysis above, it is obvious that ϵrob and ϵrep are constant, while ϵfor is determined by the parameter n. In a practical implementation, the users will select a suitable value for n so that ϵtot satisfies the security requirement. The signature rate of the protocol is SR = nx/3n, where nx is the total counts under the X basis. We remark that in the analysis we assume that the delay of classical communication is negligible and only consider the quantum rate.
Experimental demonstration
We provide a proof-of-principle demonstration of the entire process here. The scenario considered involves transactional activities between Merchant and Client, with the requirement of a TP to facilitate the purchase transaction. The network consists of two TPs, denoted as TP1 and TP2, and two clients, denoted as Client1 and Client2. As illustrated in Fig. 1C, the channel loss between the Merchant and Client is a constant value of 20 dB, whereas the channel loss between the Merchant and TP1 is 15 dB and that between the Merchant and TP2 is 25 dB. Note that we added single-mode optical fiber spools (G.652.D) between the Merchant and Client2 (shown in Fig. 2). Specifically, in the Sagnac loop, the lengths of fiber spools are as follows: 2072 m (0.73 dB) between Merchant and Eve, 2013 m (0.67 dB) between Client2 and Eve, and 1064 m (0.46 dB) between Merchant and Client2. Additional channel attenuation is introduced through variable optical attenuators (VOAs). As there are no assumptions on TP, in practical networks, there can be multiple TPs present.
Fig. 2. Experimental setup of KGP between Merchant and Client2.
Here, we take KGP between Merchant and Client2 as an example. The pulses are generated by a pulsed laser with an extincation ratio of over 30 dB and then split into two pulse sequences with a 50:50 BS. The pulses entering the loop are subjected to modulation by the phase modulator (PM) operated by either Merchant or Client. Monitor module consists of a dense wavelength division multiplexing (DWDM), a BS, and a photon detector (PD). After phase modulation, these two pulses interfere in the Eve’s BS and are detected by two superconducting nanowire single-photon detectors D1 and D2. Both the connections between Merchant and Eve and Client and Eve involve 2 km of optical fiber, and the total attenuation is 20 dB, achieved through VOA. Besides, there is an insertion of 1 km of optical fiber between Merchant and Client2. Cir, circulator; PC, polarization controller.
The signature process requires key generation and distribution between Merchant-Client and Merchant-TP, which is facilitated by KGP. In this work, we consider the KGP based on four-phase MDI-QKD (63), which remains robust against imperfect devices. The system’s source flaws are characterized before KGP, including optical power fluctuation, extinction ratio of polarization, phase shift, and pattern effects, and are quantified through a detailed measurement process outlined in the Supplementary Materials. The keys used for signature are generated in a plug-and-play system (26, 63), and the global phase of pulses is stabilized by a Sagnac loop. We take KGP between Merchant and Client2 as an example. Note that the experimental setups for KGP of other groups are similar to this one, with the difference being the removal of the optical fibers and polarization controllers in participants’ sites.
As depicted in Fig. 2, optical pulses modulated by users are generated by an untrusted TP, Eve, and the pulses are separated into two identical pulses. Merchant (Client2) modulates the clockwise (anticlockwise) pulses. The probability of selecting X basis px is 90% and that of Y basis py is 10%. They encode the pulses according to the values of logic bits. After appropriate attenuation, quantum states ∣eiθα〉 are successfully generated, where θ is the phase modulated by two participants, and the intensity of the pulse is ∣α∣2. The use of the Sagnac loop has helped to solve the problem of phase locking, but it has also introduced security concerns due to the possibility of pulses generated by a TP. Therefore, a monitoring module has been added to the participant side to filter and monitor the intensity of the incident pulses, aiming to enhance the security of the system. Because of resource limitations, we did not include dense wavelength division multiplexings in the system and instead opted to replace the photon detectors with power meters during implementation. We would like to emphasize that these modifications have little impact on the results.
Two VOAs are placed between Merchant and Eve and between Client2 and Eve, respectively, to simulate the additional attenuation caused by the communication channels. After interference at Eve’s BS, the results are detected by D1 and D2. The time window is selected on the basis of detection data, whose length is 2 ns. The detection efficiency ηd1 of D1 is 84.4%, and the dark count rate pd1 is 4.4 Hz. For D2, the detection efficiency ηd2 is 85.5%, and the dark count rate pd2 is 2.5 Hz. After error correction, Merchant gets , and Client gets . The same is for Merchant and TP, where Merchant gets and TP gets .
For demonstration, we sign a file with a size of 0.428 Mb, which is approximately the size of Amazon Web Services Customer Agreement (428,072 bits) (65). Merchant generates the signature Sig by and sends it and contract to Client. If Client agrees with the contract, then she (or he) will forward {Sig, } to TP. LFSR-based Toeplitz function is used, and a detailed description can be seen in Materials and Methods. Upon receiving the signature and contract, TP sends his key to Client. Then, Client and TP verify the signature independently by comparing the result of
to Sig. If the signature is successfully verified by both parties, Client will send money to TP, who will in turn pay the Merchant. Otherwise, the contract will be aborted.
Experimental results
Before KGP, we need to characterize the relative parameters corresponding to source flaws of this system. Similar to (63), we denote optical power fluctuation, phase shift, extinction ratio of polarization, and pattern effect ξ, δ, tanθ, and ψ, respectively. Note that although Trojan horse attacks (THAs) can be resisted in the schemes of two independent users, they cannot be resisted in the plug-and-play system, and we set the parameter of THAs to μ = 10−7 (66). Results are shown in Table 1.
Table 1. Four parameters related to the imperfection of realistic sources.
The parameters included the optical power fluctuation ξ, phase shift δ, the extinction ratio of polarization tanθ, pattern effect ψ, and THAs μ. Note that THAs cannot be quantified during our implementation, and we set it to a typical value 10−7 (66).
| ξ | δ | tanθ | ψ | |
|---|---|---|---|---|
| Merchant - TP1 | 0.76% | 0.038 | 10−2.92 | 5.58 × 10−3 |
| Merchant - Client1 | 0.72% | 0.035 | 10−3 | 5.89 × 10−3 |
| Merchant - TP2 | 0.62% | 0.035 | 10−2.98 | 6.91 × 10−3 |
| Merchant - Client2 | 0.65% | 0.037 | 10−3.07 | 7.35 × 10−3 |
The channel loss between Merchant and Client is fixed at 20 dB. The channel loss between Merchant and TP is set to two scenarios: 15 and 25 dB. During KGP, the system frequency is 100 MHz, and for each pair of participants, the system operates for 100 s. Signature rate under different losses (without fiber spools) is shown in Fig. 3A. As a proof-of-principle demonstration, we conducted KGP among different participants within a system. Sagnac loop in the system is used for stabilizing the global phase between two participants, and the bit error rate can be kept around 0.10%. In the scenario where the total length of optical fibers within the loop is approximately 5 km, the bit error rate can still be maintained at around 0.70%. Detailed data are shown in Table 2. Because of the consideration of imperfect sources, the increasing rate of phase error rate is higher compared to protocols of the same type. For Client1, when signing a 0.428-Mb size document, if TP1 is chosen as the TP, the key formed within 100 s can be used for signing 1183 times, while if TP2 is chosen, the number of signature times is 82. Because of the lower signature rate in the case of selecting TP2 (25 dB), for Client2, the number of signature times remains at 82 when choosing TP2. As shown in Fig. 3B, for the same key generation rate, a higher security level implies a smaller signing file size. There exists a trade-off between the security level and the size of the signed file. Besides, a minor increase in the signature key length can result in a substantial increase in the size of the signed files, which demonstrates its ability to sign multibit files. The signature rates of the three-party system are limited by the minimum key rate of KGP among the three parties. In practical scenarios, participants can store the keys in advance to reduce the time required for signature generation.
Fig. 3. Results of demonstration.
(A) Signature rate R under different losses. The total number of pulses sent is 1010. (B) The relationship between security level and different sizes of files with a key of the same length. The boundary line represents the scenario where the generation rate of keys per second is sufficient to sign a 0.428-Mb file at a security level of 5 × 10−10 10 times with the same error rate under a 20-dB attenuation. In our implementation, a 0.428-Mb document can be signed 11.83 times while maintaining the 5 × 10−10 security level. Furthermore, with the keys generated within 1 s, a document of 0.102-terabit can be signed 10 times at a security level of 4 × 10−10 (ϵrob = 4 × 10−10).
Table 2. Summary of experimental data.
We tested the signature rate between different users. The number of total pulses sent is N = 1010. The intensity of pulses μ, the experimental bit error rate under X basis and Y basis and , the total number of leaked bits of information during error correction leakEC, and signature rate SR are included in the table.
| Participants | μ | LeakEC | SR | |||
|---|---|---|---|---|---|---|
| Merchant - TP1 | 7.40 × 10−3 | 0.10% | 0.07% | 23.0% | 185,875 | 60.10 |
| Merchant - Client1 | 4.20 × 10−3 | 0.10% | 0.06% | 28.0% | 59,209 | 11.83 |
| Merchant - TP2 | 2.30 × 10−3 | 0.10% | 0.10% | 37.3% | 18,129 | 0.82 |
| Merchant - Client2 | 2.40 × 10−3 | 0.69% | 0.55% | 25.6% | 168,844 | 4.47 |
DISCUSSION
We demonstrate the whole process of quantum e-commerce, which guarantees the one-time of purchase with information-theoretic security. As the length of the signature increases, the probability of cheating approaches zero. The QDS scheme can complete multiple contract signatures within 1 s, further narrowing the gap between quantum and classical schemes.
We have considered a real-world scenario where Merchant and Client need to carry out a transaction and establish a consensus to complete it. TP is introduced to finish the process. Unlike the classical setup where TPs are usually considered trustworthy by default, there are no assumptions on TP. We take the Amazon Web Services Customer Agreement (65) with the size of 428,072 bits and demonstrate the underlying principles of the process. Note that the size of the contract affects the final performance instead of the content. The signature rates of the system are limited by the minimum key rate of KGP among the three parties. Consequently, for Client1, the signature rate of a 0.428-Mb document can reach 11.83 times/s when choosing TP1 and 0.82 times/s with TP2, and for Client2, the signature rate can reach 4.47 times/s when choosing TP1 and 0.82 times/s with TP2.
The proposed quantum e-commerce scheme, using QDS, offers a solution for ensuring message authenticity and integrity in the presence of imperfect keys and devices. The elimination of privacy amplification reduces the computational resources and running time of postprocessing. Furthermore, a thorough experimental characterization of source flaws in the scheme is conducted. This feature distinguishes our scheme as a practical solution for addressing the issue of imperfect keys and devices in the field of quantum communication. The proposed scheme also demonstrates robustness against security levels and finite-size effects, making it highly compatible with future quantum networks and suitable for a variety of applications.
In summary, the proposed scheme can accomplish the task of e-commerce with practical devices and outperforms other quantum protocols. We have validated the effectiveness of our scheme through the demonstration of an e-commerce scenario, involving a transaction between Merchant and Client that required a consensus to complete. It presents a promising approach to ensuring message authenticity and integrity in the presence of imperfect keys and devices.
MATERIALS AND METHODS
We characterized the expression for basis-dependent states using our protocol. First, an ideal scenario is presented. Then, we discuss how to jointly consider different realistic source flaws (SPFs, side channels, THAs, and state correlations) to describe the basis-dependent states.
Four-phase MDI-KGP between Merchant and Client
During implementation, Merchant, Client, and TP send their quantum states to the intermediates who perform interference measurements on the received pulses and announce the outcomes. These three parties will later distill their keys through their quantum states, and measurement results are announced by the intermediates. This process, in detail, is equivalent to four-phase MDI-KGP between Merchant and Client and between Merchant and TP. Here, we give a brief introduction to four-phase MDI-KGP in Merchant-Client channel to show the details of steps 1 to 3 in the protocol description.
1) Preparation. Both of Merchant and Client randomly choose the X and Y bases with probabilities px (0 < px < 1) and py = 1 − px, respectively. For X basis, Merchant encodes a coherent state with the logic bit , where ∣α∣2 is the intensity of the optical pulse. For Y basis, Merchant prepares a coherent state according to random logic bit . Client prepares his own state or according to the same rule. Then, Merchant and Client send their optical pulses to an untrusted relay, Eve, through insecure quantum channels.
2) Measurement. Eve performs interference measurements on the received pulses with a 50:50 BS and two single-photon detectors, denoted as D1 and D2, and records the detection results. Those where one and only one detector clicks are defined as an effective measurement.
3) Sifting. Merchant and Client repeat steps 1 and 2 for N times. is all Merchant’s states in direct product state. Likewise, is all Client’s states in direct product state. Eve announces the location of all effective measurements and which detector (D1 or D2) clicks. For every effective measurement announced by Eve, if D2 clicks, Client will flip his corresponding logic bit ( or ). Merchant and Client will only keep their logical bits of effective measurements and discard other bits. Then, they disclose their basis choices for effective measurements through authenticated classical channels and further classify their key bits with basis information.
4) Parameter estimation. Merchant and Client publicize all their bits in the Y basis to calculate the bit error rate and also obtain the number of counts nx and ny under X and Y bases, respectively.
5) Key distillation. Merchant and Client perform error correction on the remaining keys under the X basis with εcor-correctness to obtain the final keys.
Merchant then randomly disturbs the orders of his final key string and publicizes the new order to Client through authenticated channels. Subsequently, Client changes the orders of his key strings according to the order announced by Merchant. Last, Merchant and Client divide their final keys into 3n-bit strings, each of which is used to sign a message. Each of , , , and is one string.
LFSR-based Toeplitz hash functions
In the protocol, we use universal hash functions to generate the signature. Concretely, we choose LFSR-based Toeplitz hash function. In the description of the proposed scheme, we combine the process of exclusive OR (XOR) encryption on hash value into the hash function and express it as Hash(C, k) for simplicity. To show details of this function, we rewrite is as Hash(C, k) = Hash(x1, x2, x3, x4), where C = x1 ∈ {0, 1}∣C∣ corresponds to the contract and k = (x2, x3, x4) ∈ {0, 1}3n corresponds to keys in step 2 of the protocol. The lengths of (x2, x3, x4) are all n-bit. Denote the length of x1 as m, i.e., ∣C∣ = m. Then
| (3) |
where Hnm = f(x2, x3) is a LFSR-based Toeplitz matrix determined by x2 and x3. The random string x2 maps a random irreducible polynomial p(x) = xn + pn−1xn−1 +…+ p1x + p0 in Galois Field (2) [GF(2)] of order n that decide the structure of LFSR. Details of generating a random irreducible polynomial can be found in the Supplementary Materials. Another random string x3 = (an, an−1, …, a2, a1)T, ai ∈ {0, 1} is the initial state. LFSR will expand the initial state into a matrix Hnm with n rows and m columns. The structure of LFSR can be represented as an n × n matrix
The structure of LFSR-based Toeplitz matrix can be represented through W as Hnm = (x3, Wx3, …, Wm−1x3) (67).
Calculation details
Here, we give an introduction to the calculation details of KGP used in the scheme. According to (63), only key bits under the X basis are used to form secure key bits. Because the privacy amplification step is removed in our scheme, the total unknown information of the l-bit string such as xi, i ∈ {2,3,4} in LFSR-based Toeplitz hash functions considering finite-key effect is given by
| (5) |
where nx is the total counts under the X basis. is the upper bound of the phase error rate of all counts in an n-bit string. is the number of leaked bits of information during the error correction, where f is the error correction efficiency, and is the bit error rate in X basis. is the binary Shannon entropy function. can be given by
where represents the statistical fluctuation of the random sampling without replacement, with A = max {l, k} and (68), and is the upper bound of phase error rate. Ep satisfies the following inequality (63, 69)
| (7) |
where Δ quantifies the imbalance of Alice’s and Bob’s quantum coins according to their basis selection. represents the bit error rate in the Y basis. In the symmetric scenario, the relation between Δ and fidelity can be simplified as (70)
where Q is the gain and δθ, δX, and δY are free variables, the values of which range from 0 to 2π. Besides, ∣ΨZ,δZ⟩ is . ∣ΨiZ⟩ means that the state is prepared under the Z basis (Z ∈ {X, Y}) with the bit value i (i ∈ {1,0}). The fidelity with imperfect sources can be expressed as
| (8) |
where ϵ, μ, θ, and δ represent pulse correlations, THAs, side channels in the polarization space, and phase shift, respectively. Note that α′ is the actual intensity of pulses. According to the formulas above, we can get Δ.
Considering the finite key effect, we use the bound of the concentration inequality (63, 71) to derive the upper bound of Ep. The inequality is
| (9) |
where ξ1, …, ξn is a sequence of Bernoulli random variables and . , where ϵF is the failure probability. is the number of bit errors in the Y basis, and the upper bound of the expectation value is my + Δny. Thus, and then can be calculated according to Eq. 7. Therefore, . Then, estimate the upper bound through the concentration inequality. can be naturally calculated with . We set all failure probabilities during calculation. Parameter n is optimized with the constraint that ϵtot ≤ 5 × 10−10.
Error correction algorithm
In our implementation, the error correction algorithm is used to ensure that the keys generated by both parties through the KGP process are completely identical, and the algorithm we use is Cascade algorithm (72). The block size for each error correction is set to 1 M, and the size of the remaining keys is smaller than 1 M and these keys are corrected together. The detailed process is presented as follows:
1) Alice and Bob randomly permute the original keys based on a preagreed random sequence and record the permutation information.
2) The permuted keys are divided into different segments of a fixed length. We set the length 600.
3) The parity check codes for each segment are computed, and both parties compare them over a publicly authenticated channel.
4) For segments with consistent parity check codes, no further processing is performed. For segments with different codes, error correction is performed using binary search.
5) When the iteration number is greater than 1, based on the recorded random permutation information from the previous round, the position of the key belonging to the error bit can be identified. Because in the previous round, all segments have the same parity check code, indicating either no errors or an even number of errors, if an error bit is discovered in this round, another error bit can be found. Another error bit is found using a binary search algorithm. This process continues until no further error bits can be found.
6) The above steps are repeated until the parity check codes for all segments are completely identical.
During implementation, we do not aim for optimal error correction performance, and the number of iterations is limited to a maximum of three. The error correction efficiency f is not more than 1.13 during our implementation.
Acknowledgments
Funding: This study was supported by the National Natural Science Foundation of China (no. 12274223), the Natural Science Foundation of Jiangsu Province (no. BK20211145), the Fundamental Research Funds for the Central Universities (no. 020414380182), and the Program for Innovative Talents and Entrepreneurs in Jiangsu (no. JSSCRC2021484).
Author contributions: Conceptualization: H.-L.Y. Investigation: X.-Y.C., B.-H.L., and H.-L.Y. Visualization: B.-H.L., X.-Y.C., and H.-L.Y. Data curation: X.-Y.C., B.-H.L., Y.W., Y.F., and H.-L.Y. Supervision: H.-L.Y. and Z.-B.C. Writing—original draft: X.-Y.C. and B.-H.L. Writing—review and editing: All authors. Funding acquisition: H.-L.Y. and Z.-B.C.
Competing interests: The authors declare that they have no competing interests.
Data and materials availability: All data needed to evaluate the conclusions in the paper are present in the paper and/or the Supplementary Materials.
Supplementary Materials
This PDF file includes:
Supplementary Text
Figs. S1 and S2
Tables S1 to S4
References
REFERENCES AND NOTES
- 1.Shor P. W., Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41, 303–332 (1999). [Google Scholar]
- 2.Martin-Lopez E., Laing A., Lawson T., Alvarez R., Zhou X.-Q., O’brien J. L., Experimental realization of shor’s quantum factoring algorithm using qubit recycling. Nat. Photonics 6, 773–776 (2012). [Google Scholar]
- 3.F. Boudot, P. Gaudry, A. Guillevic, N. Heninger, E. Thomé, P. Zimmermann, Comparing the difficulty of factorization and discrete logarithm: A 240-digit experiment, in Advances in Cryptology–CRYPTO 2020 (Springer, 2020), pp. 62–91. [Google Scholar]
- 4.Gouzien É., Sangouard N., Factoring 2048-bit rsa integers in 177 days with 13,436 qubits and a multimode memory. Phys. Rev. Lett. 127, 140503 (2021). [DOI] [PubMed] [Google Scholar]
- 5.Rivest R. L., Shamir A., Adleman L., A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978). [Google Scholar]
- 6.R. A. DeMillo, “Foundations of secure computation” (Tech. rep. , Georgia Institute of Technology, 1978).
- 7.Elgamal T., A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31, 469–472 (1985). [Google Scholar]
- 8.J. H. Silverman, J. T. Tate, Rational Points on Elliptic Curves (Springer, 1992). [Google Scholar]
- 9.Bennett C. H., Brassard G., Quantum cryptography: Public key distribution and coin tossing. Theor. Comput. Sci. 560, 7–11 (2014). [Google Scholar]
- 10.Ekert A. K., Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661–663 (1991). [DOI] [PubMed] [Google Scholar]
- 11.Yin H.-L., Fu Y., Liu H., Tang Q.-J., Wang J., You L.-X., Zhang W.-J., Chen S.-J., Wang Z., Zhang Q., Chen T.-Y., Chen Z.-B., Pan J.-W., Experimental quantum digital signature over 102 km. Phys. Rev. A 95, 032334 (2017). [Google Scholar]
- 12.Schiansky P., Kalb J., Sztatecsny E., Roehsner M.-C., Guggemos T., Trenti A., Bozzio M., Walther P., Demonstration of quantum-digital payments. Nat. Commun. 14, 3849 (2023). [DOI] [PMC free article] [PubMed] [Google Scholar]
- 13.Zhou L., Lin J., Xie Y.-M., Lu Y.-S., Jing Y., Yin H.-L., Yuan Z. L., Experimental quantum communication overcomes the rate-loss limit without global phase tracking. Phys. Rev. Lett. 130, 250801 (2023). [DOI] [PubMed] [Google Scholar]
- 14.Yin H.-L., Fu Y., Li C.-L., Weng C.-X., Li B.-H., Gu J., Lu Y.-S., Huang S., Chen Z.-B., Experimental quantum secure network with digital signatures and encryption. Natl. Sci. Rev 10, nwac228 (2023). [DOI] [PMC free article] [PubMed] [Google Scholar]
- 15.Wehner S., Elkouss D., Hanson R., Quantum internet: A vision for the road ahead. Science 362, eaam9288 (2018). [DOI] [PubMed] [Google Scholar]
- 16.A. J. Menezes, P. C. Van Oorschot, S. A. Vanstone, Handbook of Applied Cryptography (CRC Press, 2018). [Google Scholar]
- 17.D. Gottesman, I. Chuang, Quantum digital signatures. arXiv preprint quant-ph/0105032 [Preprint] [quant-ph] (2001).
- 18.Clarke P. J., Collins R. J., Dunjko V., Andersson E., Jeffers J., Buller G. S., Experimental demonstration of quantum digital signatures using phase-encoded coherent states of light. Nat. Commun. 3, 1174 (2012). [DOI] [PMC free article] [PubMed] [Google Scholar]
- 19.Dunjko V., Wallden P., Andersson E., Quantum digital signatures without quantum memory. Phys. Rev. Lett. 112, 040502 (2014). [DOI] [PubMed] [Google Scholar]
- 20.Collins R. J., Donaldson R. J., Dunjko V., Wallden P., Clarke P. J., Andersson E., Jeffers J., Buller G. S., Realization of quantum digital signatures without the requirement of quantum memory. Phys. Rev. Lett. 113, 040502 (2014). [DOI] [PubMed] [Google Scholar]
- 21.Yin H.-L., Fu Y., Chen Z.-B., Practical quantum digital signature. Phys. Rev. A 93, 032316 (2016). [Google Scholar]
- 22.Amiri R., Wallden P., Kent A., Andersson E., Secure quantum signatures using insecure quantum channels. Phys. Rev. A 93, 032325 (2016). [Google Scholar]
- 23.Lo H.-K., Curty M., Qi B., Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012). [DOI] [PubMed] [Google Scholar]
- 24.Yin H.-L., Chen T.-Y., Yu Z.-W., Liu H., You L.-X., Zhou Y.-H., Chen S.-J., Mao Y., Huang M.-Q., Zhang W.-J., Chen H., Li M. J., Nolan D., Zhou F., Jiang X., Wang Z., Zhang Q., Wang X.-B., Pan J.-W., Measurement-device-independent quantum key distribution over a 404 km optical fiber. Phys. Rev. Lett. 117, 190501 (2016). [DOI] [PubMed] [Google Scholar]
- 25.Lucamarini M., Yuan Z. L., Dynes J. F., Shields A. J., Overcoming the rate–distance limit of quantum key distribution without quantum repeaters. Nature 557, 400–403 (2018). [DOI] [PubMed] [Google Scholar]
- 26.Zhong X., Hu J., Curty M., Qian L., Lo H.-K., Proof-of-principle experimental demonstration of twin-field type quantum key distribution. Phys. Rev. Lett. 123, 100506 (2019). [DOI] [PubMed] [Google Scholar]
- 27.Chen J.-P., Zhang C., Liu Y., Jiang C., Zhang W.-J., Han Z.-Y., Ma S.-Z., Hu X.-L., Li Y.-H., Liu H., Zhou F., Jiang H.-F., Chen T.-Y., Liu H., You L.-X., Wang Z., Wang X.-B., Zhang Q., Pan J.-W., Twin-field quantum key distribution over a 511 km optical fibre linking two distant metropolitan areas. Nat. Photonics 15, 570–575 (2021). [Google Scholar]
- 28.Wang S., Yin Z.-Q., He D.-Y., Chen W., Wang R.-Q., Ye P., Zhou Y., Fan-Yuan G.-J., Wang F.-X., Zhu Y.-G., Morozov P. V., Divochiy A. V., Zhou Z., Guo G.-C., Han Z.-F., Twin-field quantum key distribution over 830-km fibre. Nat. Photonics 16, 154–161 (2022). [Google Scholar]
- 29.Zhou L., Lin J., Jing Y., Yuan Z., Twin-field quantum key distribution without optical frequency dissemination. Nat. Commun. 14, 928 (2023). [DOI] [PMC free article] [PubMed] [Google Scholar]
- 30.Xie Y.-M., Lu Y.-S., Weng C.-X., Cao X.-Y., Jia Z.-Y., Bao Y., Wang Y., Fu Y., Yin H.-L., Chen Z.-B., Breaking the rate-loss bound of quantum key distribution with asynchronous two-photon interference. PRX Quantum 3, 020315 (2022). [Google Scholar]
- 31.Zeng P., Zhou H., Wu W., Ma X., Mode-pairing quantum key distribution. Nat. Commun. 13, 3903 (2022). [DOI] [PMC free article] [PubMed] [Google Scholar]
- 32.Xie Y.-M., Weng C.-X., Lu Y.-S., Fu Y., Wang Y., Yin H.-L., Chen Z.-B., Scalable high-rate twin-field quantum key distribution networks without constraint of probability and intensity. Phys. Rev. A 107, 042603 (2023). [Google Scholar]
- 33.Xie Y.-M., Bai J.-L., Lu Y.-S., Weng C.-X., Yin H.-L., Chen Z.-B., Advantages of asynchronous measurement-device-independent quantum key distribution in intercity networks. Phys. Rev. A 19, 054070 (2023). [Google Scholar]
- 34.Puthoor I. V., Amiri R., Wallden P., Curty M., Andersson E., Measurement-device-independent quantum digital signatures. Phys. Rev. A 94, 022328 (2016). [Google Scholar]
- 35.Shang T., Lei Q., Liu J., Quantum random oracle model for quantum digital signature. Phys. Rev. A 94, 042314 (2016). [Google Scholar]
- 36.Thornton M., Scott H., Croal C., Korolkova N., Continuous-variable quantum digital signatures over insecure channels. Phys. Rev. A 99, 032341 (2019). [Google Scholar]
- 37.Lu Y.-S., Cao X.-Y., Weng C.-X., Gu J., Xie Y.-M., Zhou M.-G., Yin H.-L., Chen Z.-B., Efficient quantum digital signatures without symmetrization step. Opt. Express 29, 10162–10171 (2021). [DOI] [PubMed] [Google Scholar]
- 38.Zhang C.-H., Zhou X., Zhang C.-M., Li J., Wang Q., Twin-field quantum digital signatures. Opt. Lett. 46, 3757–3760 (2021). [DOI] [PubMed] [Google Scholar]
- 39.Weng C.-X., Lu Y.-S., Gao R.-Q., Xie Y.-M., Gu J., Li C.-L., Li B.-H., Yin H.-L., Chen Z.-B., Secure and practical multiparty quantum digital signatures. Opt. Express 29, 27661–27673 (2021). [DOI] [PubMed] [Google Scholar]
- 40.Qin J.-Q., Jiang C., Yu Y.-L., Wang X.-B., Quantum digital signatures with random pairing. Phys. Rev. A 17, 044047 (2022). [Google Scholar]
- 41.Collins R. J., Amiri R., Fujiwara M., Honjo T., Shimizu K., Tamaki K., Takeoka M., Andersson E., Buller G. S., Sasaki M., Experimental transmission of quantum digital signatures over 90 km of installed optical fiber using a differential phase shift quantum key distribution system. Opt. Lett. 41, 4883–4886 (2016). [DOI] [PubMed] [Google Scholar]
- 42.Yin H.-L., Wang W.-L., Tang Y.-L., Zhao Q., Liu H., Sun X.-X., Zhang W.-J., Li H., Puthoor I. V., You L.-X., Andersson E., Wang Z., Liu Y., Jiang X., Ma X., Zhang Q., Curty M., Chen T.-Y., Pan J.-W., Experimental measurement-device-independent quantum digital signatures over a metropolitan network. Phys. Rev. A 95, 042338 (2017). [Google Scholar]
- 43.Roberts G. L., Lucamarini M., Yuan Z., Dynes J. F., Comandar L. C., Sharpe A. W., Shields A. J., Curty M., Puthoor I. V., Andersson E., Experimental measurement-device-independent quantum digital signatures. Nat. Commun. 8, 1098 (2017). [DOI] [PMC free article] [PubMed] [Google Scholar]
- 44.Zhang C.-H., Zhou X.-Y., Ding H.-J., Zhang C.-M., Guo G.-C., Wang Q., Proof-of-principle demonstration of passive decoy-state quantum digital signatures over 200 km. Phys. Rev. A 10, 034033 (2018). [Google Scholar]
- 45.An X.-B., Zhang H., Zhang C.-M., Chen W., Wang S., Yin Z.-Q., Wang Q., He D.-Y., Hao P.-L., Liu S.-F., Zhou X.-Y., Guo G.-C., Han Z.-F., Practical quantum digital signature with a gigahertz BB84 quantum key distribution system. Opt. Lett. 44, 139–142 (2019). [DOI] [PubMed] [Google Scholar]
- 46.Ding H.-J., Chen J.-J., Ji L., Zhou X.-Y., Zhang C.-H., Zhang C.-M., Wang Q., 280-km experimental demonstration of a quantum digital signature with one decoy state. Opt. Lett. 45, 1711–1714 (2020). [DOI] [PubMed] [Google Scholar]
- 47.Richter S., Thornton M., Khan I., Scott H., Jaksch K., Vogl U., Stiller B., Leuchs G., Marquardt C., Korolkova N., Agile and versatile quantum communication: Signatures and secrets. Phys. Rev. X 11, 011038 (2021). [Google Scholar]
- 48.Pelet Y., Puthoor I. V., Venkatachalam N., Wengerovsky S., Loncaric M., Neumann S. P., Liu B., Samec Z., Stipčević M., Ursin R., Andersson E., Rarity J. G., Aktas D., Joshi S. K., Unconditionally secure digital signatures implemented in an 8-user quantum network. New J. Phys. 24, 093038 (2022). [Google Scholar]
- 49.Li B.-H., Xie Y.-M., Cao X.-Y., Li C.-L., Fu Y., Yin H.-L., Chen Z.-B., One-time universal hashing quantum digital signatures without perfect keys. Phys. Rev. A 20, 044011 (2023). [Google Scholar]
- 50.Braunstein S. L., Pirandola S., Side-channel-free quantum key distribution. Phys. Rev. Lett. 108, 130502 (2012). [DOI] [PubMed] [Google Scholar]
- 51.Tamaki K., Curty M., Kato G., Lo H.-K., Azuma K., Loss-tolerant quantum cryptography with imperfect sources. Phys. Rev. A 90, 052314 (2014). [Google Scholar]
- 52.Xu F., Wei K., Sajeed S., Kaiser S., Sun S., Tang Z., Qian L., Makarov V., Lo H.-K., Experimental quantum key distribution with source flaws. Phys. Rev. A 92, 032305 (2015). [Google Scholar]
- 53.Tang Z., Wei K., Bedroya O., Qian L., Lo H.-K., Experimental measurement-device-independent quantum key distribution with imperfect sources. Phys. Rev. A 93, 042308 (2016). [Google Scholar]
- 54.Yoshino K.-I., Fujiwara M., Nakata K., Sumiya T., Sasaki T., Takeoka M., Sasaki M., Tajima A., Koashi M., Tomita A., Quantum key distribution with an efficient countermeasure against correlated intensity fluctuations in optical pulses. NPJ Quantum Inf. 4, 8 (2018). [Google Scholar]
- 55.Pereira M., Curty M., Tamaki K., Quantum key distribution with flawed and leaky sources. NPJ Quantum Inf. 5, 62 (2019). [Google Scholar]
- 56.Navarrete A., Pereira M., Curty M., Tamaki K., Practical quantum key distribution that is secure against side channels. Phys. Rev. A 15, 034072 (2021). [Google Scholar]
- 57.Wang X.-B., Hu X.-L., Yu Z.-W., Practical longdistance side-channel-free quantum key distribution. Phys. Rev. A 12, 054034 (2019). [Google Scholar]
- 58.Xu F., Ma X., Zhang Q., Lo H.-K., Pan J.-W., Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 92, 025002 (2020). [Google Scholar]
- 59.Pereira M., Kato G., Mizutani A., Curty M., Tamaki K., Quantum key distribution with correlated sources. Sci. Adv. 6, eaaz4487 (2020). [DOI] [PMC free article] [PubMed] [Google Scholar]
- 60.Zhang C., Hu X.-L., Jiang C., Chen J.-P., Liu Y., Zhang W., Yu Z.-W., Li H., You L., Wang Z., Wang X.-B., Zhang Q., Pan J.-W., Experimental side-channel-secure quantum key distribution. Phys. Rev. Lett. 128, 190503 (2022). [DOI] [PubMed] [Google Scholar]
- 61.Fan-Yuan G.-J., Lu F.-Y., Wang S., Yin Z.-Q., He D.-Y., Zhou Z., Teng J., Chen W., Guo G.-C., Han Z.-F., Measurement-device-independent quantum key distribution for nonstandalone networks. Photon. Res. 9, 1881–1891 (2021). [Google Scholar]
- 62.Fan-Yuan G.-J., Lu F.-Y., Wang S., Yin Z.-Q., He D.-Y., Chen W., Zhou Z., Wang Z.-H., Teng J., Guo G.-C., Han Z.-F., Robust and adaptable quantum key distribution network without trusted nodes. Optica 9, 812–823 (2022). [Google Scholar]
- 63.Gu J., Cao X.-Y., Fu Y., He Z.-W., Yin Z.-J., Yin H.-L., Chen Z.-B., Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources. Sci. Bull. 67, 2167–2175 (2022). [DOI] [PubMed] [Google Scholar]
- 64.Konig R., Renner R., Schaffner C., The operational meaning of min- and max-entropy. IEEE Trans. Inf. Theory 55, 4337–4347 (2009). [Google Scholar]
- 65.Amazon Web Services Customer Agreement (2023); https://aws.amazon.com/agreement/?nc1=h_ls.
- 66.Lucamarini M., Choi I., Ward M. B., Dynes J. F., Yuan Z. L., Shields A. J., Practical security bounds against the trojan-horse attack in quantum key distribution. Phys. Rev. X 5, 031030 (2015). [Google Scholar]
- 67.H. Krawczyk, LFSR-based hashing and authentication, in Annual International Cryptology Conference (1994), pp. 129–139. [Google Scholar]
- 68.Yin H.-L., Zhou M.-G., Gu J., Xie Y.-M., Lu Y.-S., Chen Z.-B., Tight security bounds for decoy-state quantum key distribution. Sci. Rep. 10, 14312 (2020). [DOI] [PMC free article] [PubMed] [Google Scholar]
- 69.Sun S., Security of reference-frame-independent quantum key distribution with source flaws. Phys. Rev. A 104, 022423 (2021). [Google Scholar]
- 70.Tamaki K., Lo H.-K., Fung C.-H. F., Qi B., Erratum: Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw. Phys. Rev. A 86, 059903 (2012). [Google Scholar]
- 71.G. Kato, Concentration inequality using unconfirmed knowledge. arXiv:2002.04357 [math.PR] (20 February 2020).
- 72.G. Brassard, L. Salvail, Secret-key reconciliation by public discussion, in Advances in Cryptology-EUROCRYPT’93 (1994), pp. 410–423.
- 73.V. Shoup, On fast and provably secure message authentication based on universal hashing, in Annual International Cryptology Conference (CRYPTO) (Springer, 1996), pp. 313–328. [Google Scholar]
- 74.Massey J., Shift-register synthesis and bch decoding. IEEE Trans. Inf. Theory 15, 122–127 (1969). [Google Scholar]
- 75.W. Hoeffding, Probability inequalities for sums of bounded random variables, in The collected works of Wassily Hoeffding (Springer, 1994) pp. 409–426. [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Supplementary Materials
Supplementary Text
Figs. S1 and S2
Tables S1 to S4
References



