Skip to main content
Scientific Reports logoLink to Scientific Reports
. 2021 May 4;11:9456. doi: 10.1038/s41598-021-88837-w

Secure multiparty quantum key agreement against collusive attacks

Hussein Abulkasim 1,2,, Atefeh Mashatan 1, Shohini Ghose 3,4
PMCID: PMC8577273  PMID: 33947890

Abstract

Quantum key agreement enables remote participants to fairly establish a secure shared key based on their private inputs. In the circular-type multiparty quantum key agreement mode, two or more malicious participants can collude together to steal private inputs of honest participants or to generate the final key alone. In this work, we focus on a powerful collusive attack strategy in which two or more malicious participants in particular positions, can learn sensitive information or generate the final key alone without revealing their malicious behaviour. Many of the current circular-type multiparty quantum key agreement protocols are not secure against this collusive attack strategy. As an example, we analyze the security of a recently proposed multiparty key agreement protocol to show the vulnerability of existing circular-type multiparty quantum key agreement protocols against this collusive attack. Moreover, we design a general secure multiparty key agreement model that would remove this vulnerability from such circular-type key agreement protocols and describe the necessary steps to implement this model. The proposed model is general and does not depend on the specific physical implementation of the quantum key agreement.

Subject terms: Quantum information, Computer science

Introduction

The concept of the key agreement was first presented by Diffie–Hellman in 19761. It describes how two remote users can fairly generate a secured shared key based on their private inputs. In 1982, Ingemarsson et al.2 extended the two-party key agreement protocol to a multiparty or group key agreement protocol. After that, several multiparty key agreement schemes have been published3. However, future quantum computers with sufficient power could threaten the security of many of the current public-key cryptosystems whose security mainly relies on unproven mathematical assumptions4,5. For that reason, quantum applications in cryptography have attracted the attention of a lot of scientists and researchers to suggest and develop information-theoretically unconditional secure cryptosystems. One of the most common quantum cryptographic applications is quantum key distribution (QKD)6, in which remote participants can establish a shared random key securely even in the presence of an attacker with unlimited classical or quantum computing power. Subsequently, several quantum cryptographic applications have been introduced to solve various classical security issues716.

Recently, quantum key agreement (QKA) has attracted the attention of a lot of researchers17. QKA ensures fairness between the involved participants to generate a shared secure key based on their private inputs. Using the quantum teleportation protocol, Zhou et al.17, in 2004, presented the first two-party QKA scheme. In 2013, the two-party QKA was extended to multiparty QKA protocols18. Subsequently, several multiparty QKA protocols have been presented1922. In general, as noted in18, there are three types of MQKA protocols; (1) the first type is the tree-type in which every party sends their secret data through independent quantum channels to all other parties23; (2) the second type is the complete-graph-type in which every participant sends a sequence of qubits to each of the others parties to encode her or his secret information, (3) while in the third type that is the circle-type (sometimes called travelling-mode)8,24, every party generates a random sequence of qubits and sends this sequence to another party who applies an encoding process producing a new evolved sequence of qubits and sends the new sequence to the next party; this process continues over all parties until the evolved sequence reaches the party who generates the first sequence. Compared to the other QKA types, the circle-type is more efficient and more easily achieves the property of fairness. For that reason, the QKA circle-type has been intensively investigated.

In 2016, Liu et al.18 pointed out that all existing circle-type multiparty quantum key agreement (CT-MQKA) protocols are vulnerable to collusive attack, and asked a challenging question about the possibility of designing a secure CT-MQKA protocol. In response to this question, several CT-MQKA protocols have been proposed to avoid collusive attacks. However, in this work, we show that many of the existing CT-MQKA protocols are also not secure against a collusive attack. We study, as an example, the security of Sun et al.’s19 MQKA protocol (named SCWZ protocol hereafter) to show the vulnerability of the existing CT-MQKA protocols to collusive attacks. Furthermore, we design a general secure model for CT-MQKA protocols and propose the necessary steps for this model.

The insecurity of existing CT-MQKA protocols

In this section, we show that many of the recently published works in CT-MQKA are not secure against collusive attacks1921,25,26. In general, there are two main collusive attack strategies, which could be applied to the CT-MQKA protocols:

The first collusive attack strategy

The first collusive attack strategy has been pointed out in18,19. Any two dishonest participants Pi and Pj (where i>j; i,j{1,2,,n} and n is the number of participants) in particular positions in the circle-type protocols can control the final key if their particular positions meet the following two conditions:

i-j=n2whennis even, 1
i-j=n+12orn-12whennis odd. 2

The second collusive attack strategy

The second collusive attack strategy can be described as follows. In the CT-MQKA schemes, any two dishonest participants Pi and Pj can steal the private inputs of an honest participant Pk (i,j,k{1,2,,n}) without being detected, if their positions meet one of the two following conditions:

i-j=2;then k=i-1; 3
j-i=2;then k=j-1. 4

Note, in our previous work8, we mentioned that two malicious users may try to deduce the private information of an honest one. However, in this work, we formulate and describe the general situation in which two dishonest participants can steal the private information of the honest ones as indicated in Eqs. (3) and (4).

Review of SCWZ’s protocol

In SCWZ’s protocol19, there are n participants and each participant Pi (i=1,2,,n) has an m-bit key (Ki). The participants want to generate a shared secret key K fairly, where K=K1K2Kn. The steps of the SCWZ’s protocol can be described as follows.

  1. Preparation phase. The server generates n sequences of random single-photons. Each sequence Si (i=1,2,,n) contains m single-photons and each photon is selected randomly from the four states {+,-,0,1}, where ±=12(0±1). The server also generates n sequences of random single photons (called Ci), which are used as decoy photons to check the existence of eavesdroppers. Each single decoy photon is randomly selected from the states {+,-,+y,-y}, where ±y=12(0±i1). The server then randomly inserts and distributes the single-photons of Ci into Si getting a new sequence Si, and sends the new sequence (Si) to Pi.

  2. Detection phase. Upon receiving Si, each participant sends an acknowledgment to the server. Then the server announces the positions of Ci and their measurement bases. Each Pi measures Ci based on the corresponding measurement bases and stores the results. Pi then randomly announces half of the measurement results of Ci; the server, in turn, announces the initial states of the second half of Ci. Then both the server and Pi collaborate to compute the error rate. They end the protocol if the error rate higher than a predefined value. Otherwise, they continue with the protocol.

  3. After Pi gets the secure sequence Si, each participant performs the next sub-steps:
    • A.
      Encoding phase. Pi encodes secret information (Ki) onto Si by applying the unitary operation U=01|-10| when the classical bit of the secret Ki is 1, and the unitary operation I=00|+11| when the classical bit Ki is 0. Pi then reorders the decoy states that were prepared and inserted by the server in Step (1) and reinserts them in random positions into the encoded sequence obtaining a new sequence (Sii+1), and sends Sii+1 to Pi+1.
    • B.
      Eavesdropping check phase. Upon receiving Sii+1, Pi+1 and Pi check the security of the transmission by performing the same process indicated in step (2) between the server and Pi.
    • C.
      Encoding phase. After checking the security of transmission, Pi+1 encodes secret information (Ki+1) onto Si following the same rules as in step (A). Pi+1 then reorders the decoy states and reinserts them in random positions into the encoded sequence obtaining a new sequence (Sii+2), and sends Sii+2 to Pi+2.
    • D.
      Similarly, the rest of the participants (Pi+2,Pi+3,,Pi-2) perform the Eavesdropping check phase and the Encoding phase indicated in steps (B) and (C).
    • E.
      Upon receiving Sii-2, Pi-1 and Pi-2 check the security of transmission. If the quantum channel between Pi-1 and Pi-2 is secure, Pi-2 discards the decoy photons to get Si, and informs the server of this fact.
  4. When all the Pi-1 receive Si, they send an acknowledgment to the server, and the server announces the measurement bases of Si to all the Pi-1. After that, each Pi-1 uses the corresponding measurement bases to measure Si obtaining Ki, where Ki=KiKi+1Ki-2. Finally, Pi-1 can recover the final shared secret key K=KiKi-1.

The collusive attack against CT-MQKA protocols

In this section, we show that the SCWZ’s protocol, as an example of CT-MQKA protocols, is insecure against a collusive attack. Although the authors of SCWZ’s protocol have presented a security analysis to prove the security of their protocol against the first model of the collusive attack, their protocol is not secure against the second security model of collusive attack. That is to say, any two dishonest participants Pi and Pj in particular positions meeting the conditions in (3) and (4) can easily steal the private key of honest participants (Pk).

Without loss of generality, assume we have three participants P1, P2, and P3 and they have three private keys, e.g., K1=1000, K2=0101, and K3=1001, respectively. And the three participants intend to share a secret key (K), here K=K1K2K3=0100. We also assume that P1 and P3 are two dishonest participants and they need to steal the private key of the honest one (P2); hence they can deduce the final key without being caught.

In SCWZ’s protocol, the server generates three random sequences, e.g., S1={+,0,1,-}, S2={0,1,0,1}, and S3={0,+,-,1} each one consists of four single-photons. Also, the server generates three random sequences C1, C2, and C3 each one consists of four decoy single-photon states. Then the server randomly inserts the decoy state C1 (C2/C3) into S1={+,0,1,-} (S2={0,1,0,1}/S3={0,+,-,1}) and sends it to P1 (P2/P3). After checking the security of the transmission, each participant discards the decoys and encodes their private information based on the encoding rule mentioned in Step 3.A. Subsequently, each participant sends the sequence in a circle to the other participants to encode their private inputs until the sequence is returned to the participant.

For simplicity, we show here the circle of S1 (Fig. 1a) which will be used by the participant P1 to get the final key (K). First, P1 receives S1={+,0,1,-} from the server to encode her or his information and get the final key. Second, P1 encodes a private input, i.e., K1=1000 into S1 getting the new sequence S1={U+,I0,I1,I-}. Third, P1 inserts some decoy photons into S1 and sends it to the dishonest P3 instead of sending it to P2. After checking the security of the transmission, P3 discards the decoy states and gets S1={U+,I0,I1,I-}. At the same time, the dishonest P1 generates a counterfeit sequence, e.g., S1={0,0,-,+} with decoy states and sends it to both P2 and P3. P1 only tells P3 that the sequence S1 is the counterfeit one. Since the honest participant (P2) does not have K1=1000 and does not knows S1={+,0,1,-}, she or he cannot know what the received new sequence looks like (i.e., S1={U+,I0,I1,I-}).

Figure 1.

Figure 1

An example of a three-party QKA protocol. Any two dishonest participants in particular positions can steal the private input of an honest participant.

Obviously, P2 cannot distinguish between the genuine sequences and the counterfeit ones. So, P2 encodes the private data, i.e., K2=0101 into S1 getting S1={I0,U0,I-,U+} and sends S1 with decoy states to P3. After checking the security of the transmission, P3 discards the decoy qubits and gets S1. P3 then requests the corresponding measurement bases of S1 from P1 to get K2=0101. Based on her or his private key, i.e., K3=1001 and the private key of P2, P3 applies the corresponding unitary operations to the genuine sequence S1={U+,I0,I1,I-} getting S1={U(I(U+)),I(U(I0)),I(I(I1)),U(UI-)} and sends it to P1. Then the participants announce to the server that the quantum channels are secure. Finally, the server announces the measurement bases of S1 to P1 thus enabling P1 to get K.

Similarly, if P2 and P3 (P2 and P1) are the dishonest participants they can steal the private key of the honest participant P1 (P3) in the circle while sending S2 (S3), as shown in Fig. 1b (Fig. 1c). By applying the same attack strategy, most of the existing CR-MQKA protocols1921,25,26 are vulnerable to this collusive attack.

The proposed secure CT-MQKA protocol

In this section, we give a general secure model of CT-MQKA against the collusive attack described above. Whereas our protocol can be implemented with photons, we describe it in more general terms here. The idea of adopting a semi-honest client–server model (or a third party) has been adopted in many previous QKA protocols to ensure the security of communication19,22,2729. Suppose we have n participants who want to generate a shared secret key K fairly, where K=K1K2Kn with length m. Every participant (Pi) selects a private random classical key (Ki), where Ki=Ki+nl. Here, l is the number of decoy states used for checking the security of a quantum channel, and i=1,2,n.

The general steps of this secure CT-MQKA model can be described as follows:

Step (1) The server generates n sequences Si (i= 1, 2, …, n), with each sequence containing m+nl single qubits. The server records the position of every single qubit. Every qubit is selected randomly from the four quantum states +=120+1,-=120-1,0,1.

Step (2) The server also generates additional n sequences of random single qubits (called Ci), which are used as decoy states to check the existence of eavesdroppers. Every single decoy qubit is randomly selected from the four quantum states {+,-,0,1}. The server inserts Ci into Si producing a new sequence Si, and sends the new sequence (Si) to Pi.

Step (3) Upon receiving Si, every participant sends an acknowledgment to the server.

Step (4) In this step, the server announces the positions of Ci and their measurement bases. Every Pi measures Ci based on the corresponding measurement bases and stores the results. Randomly, Pi selects half of the qubits in Ci and announces their measurement results to the server. The server, in turn, announces the initial states of the second half of Ci. Both the server and Pi collaborate to compute the error rate. They end the protocol if the error rate is higher than a predefined value. Otherwise, Pi discards Ci from Si getting Si and continues to Step (5).

Step (5) After each Pi gets the secure sequence Si, they start to perform the next sub-steps.

  1. Encoding phase. Pi encodes the secret information (Ki) onto Si by applying the unitary operation I=00|+11| when the classical bit Ki is 0, and the unitary operation U=01|-10| if the classical bit Ki is 1 as indicated in Table 1.

  2. Detecting the external attack phase. For detecting external eavesdroppers, Pi generates a sequence of random single qubits (Cpi) as in Steps (1) and (2), which are used as decoy qubits to check the existence of eavesdroppers in the quantum channel between Pi and Pi+1 (note, the symbol + in “i + 1” represents the additional mod n. Pi inserts Cpi into Si producing a new sequence Sii+1, and sends the new sequence (Sii+1) to Pi+1. As in Step (4), Pi and Pi+1 share the information of Cpi and collaborate to compute the error rate. Pi and Pi+1 end the protocol if the error rate is higher than a predefined value. Otherwise, Pi+1 discards Cpi from Sii+1 obtaining Si and continues to the next process.

  3. Detecting the internal attack phase. Upon confirming that the communication between Pi and Pi+1 is secure against external attackers, the server randomly selects l single-qubits as decoy qubits from Sii+1, by announcing their positions, and asks Pi to publicly announce the unitary operations that were applied to the l qubits. Subsequently, the server announces the measurement bases of the l qubits to Pi+1. Pi+1 measures the l qubits using the corresponding measurement bases. Based on the measurement results, the measurement bases, and the applied unitary operations, Pi+1 can judge whether the l qubits are genuine or not. If not, Pi+1 ends the protocol. Otherwise, the participants do the following:
    • i)
      Pi+1 discards the l qubits from Sii+1 that were selected by the server;
    • ii)
      The server also discards the corresponding l qubits from Si;
    • iii)
      Every Pi discards the corresponding classical bits from their private keys Ki.
  4. As in Step (5.a), Pi+1 encodes the secret information (Ki+1) onto Si and inserts some random decoy states (Cpi+1) into Sii+1 producing Sii+2. Afterwards, Pi+1 sends Sii+2 to Pi+2.

  5. Upon Pi+2 receiving Sii+2, Pi+1 and Pi+2 collaborate to check the security of communication by performing Step (5.a–5.d).

  6. Pi+2 encodes her or his information and sends the new sequences to the next participants. This process continues until Pi receives the secure quantum message (Sii-1) from Pi-1; here, the symbol “−” in “i − 1” represents the subtraction mod n.

Table 1.

The encoding rules.

Unitary operations/quantum states 0 1 + -
0I 0 1 + -
1U -1 0 - -+

The unitary operation I represents 0 and the unitary operation U represents 1.

Step (6): When all Pi s receive Sii-1, they discard the decoy qubits getting Si. Hence, each participant loses nl classical bits from Ki getting Ki with length m. After that, they send an acknowledgment to the server, and the server announces the measurement bases of Si to all the Pi s. Finally, every Pi uses the corresponding measurement bases to measure Si obtaining K, where K=K1K2Kn.

Illustration of the proposed protocol

For simplicity, suppose we have three participants P1, P2, and P3 and they want to generate a shared secret key K=K1K2K3 with length m (e.g., m=3). P1, P2, and P3 have three private keys K1, K2, and K3, respectively, with length m+nl, e.g., m+nl=3+(33)=12; here nl is the number of decoy states for checking the security of all quantum channels in one complete circle, and for the n circle it will be m+nl. Here, there are three complete circles for three participants, and the number of decoy qubits for checking the security of all quantum channels is nnl=9l. Also, we assume that, K1=000001101101, K2=111011101000, and K3=110011010110.

The server generates a sequence of quantum states contains 12 random states (e.g., S1= 0,0,0,10,0,10,1,-,+,-) for the first circle and sends it to P1. P1 checks the security of the transmission with the server as in Step (4). Based on her/his private data (K1), P1 applies the unitary operations {I,I,I,I,I,U,U,I,U,U,I,U} to S1 getting S12=0,0,0,10,-1,00,0,-+,+,-+. To secure the communication, P1 inserts some decoy qubits into S12 and sends S12 to P2. Subsequently, P2 performs Step (5.b) to detect the external attack.

As in Step (5.c), the server chooses random l states (e.g., l=1) from S1 and announce the position of l (e.g., the position of last state in S1) to P1 and P2. The server asks P1 to announce the unitary operation that was applied to l, and asks P2 to announce the measurement result of the corresponding states in S12 (i.e., -+), respectively. Based on the announced information (-, U, -+), the server can judge whether P2 has received genuine information or not.

Later, the server and P2 discard the last sequence from S1 and S12 getting newly updated sequences S1=(0,0,0,10,0,10,1,-,+) and S12=(0,0,0,10,-1,00,0,-+,+), respectively. Also, all participants update their private keys by discarding the corresponding classical bits. The updated private keys of P1, P2, and P3 become K1=00000110110, K2=11101110100, and K3=11001101011, respectively. They also consume two quantum states (e.g., the last two states) for checking the quantum channel between (P2 and P3) and (P3 and P1).

The updated private keys after completing one circle are as follows: K1=000001101, K2=111011101, and K3=110011010. And the updated private keys after completing the three circles are as follows: K1=000, K2=111, and K3=110. Now, K=K1=K2=K3=K1=K2=K2. Finally, each participant can get the final key K=K1K2K3=000111110=001. Note that for simplicity, we assumed that the server frequently chooses the last qubit for checking the security of communication; but the selected positions should be completely random.

Applying the proposed model to SCWZ’s protocol

Taking SCWZ’s protocol19 as an example, we show in this section how to address the vulnerability of CT-MQKA protocols to the collusive attack.

In SCWZ’s protocol19, there are n participants and each participant Pi (i=1,2,,n) has an m-bit key (Ki). All participants want to fairly generate a shared secret key (K=K1K2Kn). Also, there is a server that generates n sequences of random single-photons. Each sequence Si contains m random single-photons. The server generates additional n sequences of random single photons (Ci), which are used as decoy photons to check the existence of eavesdroppers.

Based on our proposed model, SCWZ’s protocol should be modified as follows.

  1. Each participant (Pi) should prepare the length of her/his private keys (Ki) to be m+nl.

  2. The length of the quantum sequences generated by the server should also be m+nl.

  3. As in Step (5.b), Pi should generate a sequence of random single-qubits (Cpi) to check the security of the quantum channel between the sender (Pi) and receiver (Pi+1).

  4. To detect the collusive attack, the server randomly selects l single-qubits from the m+nl single-qubits and uses them as decoy qubits to check the security of quantum channels between every two participants, as proposed in Step (5.c).

  5. All participants update their keys by discarding the classical bits corresponding to the single qubits that were used as decoy qubits.

The security analysis

This section presents detailed security analyses for both external eavesdropping and internal attacks.

External attack

In the proposed protocol, the decoy qubit technique is used to prevent external eavesdroppers from attacking the protocol. To achieve that, a sequence of single decoy qubits is randomly selected from the states {+,-,0,1} and randomly inserted into the secret message. The eavesdropper (Eve) cannot distinguish between the decoy-states and secret message states. Eve may try to entangle a secret message state with an auxiliary quantum state (ϵ) by applying a unitary operation (Uϵ) as follows:

Uϵ0ϵ=α10ϵ00+a21ϵ01, 5
Uϵ1ϵ=α10ϵ10+a21ϵ11, 6
Uϵ+ϵ=12+α1ϵ00+α2ϵ01+α3ϵ10+α4ϵ11+-α1ϵ00-α2ϵ01+α3ϵ10-α4ϵ11, 7
Uϵ-ϵ=12+α1ϵ00+α2ϵ01-α3ϵ10-α4ϵ11+-α1ϵ00-α2ϵ01-α3ϵ10+α4ϵ11. 8

In (5) and (6), α12+a22=1 and α32+α42=1. Also, ϵ00, ϵ01, ϵ10, and ϵ11 are four ancilla states decided by Eve. To pass the external eavesdropping detection phase, Eve sets α2=α3=0, if the targeted quantum state is 0 or 1, and α1e00+α2e01-α3e10-α4e11=α1e00-α2e01+α3e10-α4e11=0, if the targeted quantum state is + or -. But these malicious procedures cannot help Eve to extract any useful information from the private inputs. For example, if Eve sets α2=α3=0, she gets α12=α42=1, which means that α1ϵ00=α4ϵ11. So, Eve cannot reveal private inputs. Besides, the proposed CT-MQKA protocol is not open to the Trojan horse attack since all information is sent in a one-way manner30,31.

Internal attack

In the proposed model, internal attacks may be divided into three types of attacks: (1) Server’s attack; (2) Participant’s attack; (3) Collusive attack. Participant’s attack is similar to server’s attack in this work. Therefore, we only discuss here the server’s attack and collusive attack.

Server’s attack

In this work, we assume that the server is semi-honest. That is, it faithfully executes the operations delegated by participants and does not collude with other participants to steal sensitive information, but may try to get the information of secret keys. Participants employ the decoy photon method to secure the communications between every two participants. Hence, the server must adopt one of the external attack strategies if it wants to get sensitive information. However, we show in the “External attack” section that the proposed model is secure against external attacks. Accordingly, the malicious server may resort to guessing the required information or generate the final key as follows:

  1. Passing the security check. In Step (1), the server sends Si to Pi as an initial quantum sequence for generating the final key. In Step (5), Pi uses Si to encode her/his private data and inserts some decoy qubits for security check before sending them to Pi+1. To successfully pass the security check, the server must correctly guess the measurement bases of the decoy qubits and guess the initial bases to correctly resend Pi’s qubits to Pi+1 without been caught. The probability of correctly guessing a measurement basis for each qubit is 50%, and the probability of correctly guessing an initial basis is also 50%. Therefore, the probability (pr) of passing the eavesdropping check is as follows:
    pr=pr1×pr2××prn=12×12nl×12×12nl××12×12nl=12×12nl. 9
    here, pri (i=1,2,,n) is the probability of correctly guessing the ith sequence of decoy qubits, and l is the length of each decoy qubit sequence.
  2. Guessing participants’ private keys. Since K=K1K2Kn, the server needs to correctly guess all participants’ private keys to get K. The probability (pr) of correctly guessing the final key K is as follows:
    pr=pr1×pr2××prn=12l×12l××12l=12nl. 10
    here, pri (i=1,2,,n) is the probability of correctly guessing Ki, and l is the length of Ki.
  3. Guessing the final key (K). The server may try to directly guess the final key (K). In that case, the probability (pr) is as follows:
    pr=12l,wherelis the length ofK. 11

    In Eqs. (911), if l is large enough the probability of guessing the final key or required information is close to zero or negligible.

Collusive attack

A collusive attack is the most powerful internal attack in which two or more dishonest participants collude together to extract sensitive information or generate the final key alone without revealing their malicious behaviour. In this section, we show that the proposed model is immune to collusive attacks, such that any group of dishonest participants trying to perform a collusive attack (including the two attack strategies mentioned in the section The insecurity of existing CT-MQKA protocols) will be detected immediately.

Basically, dishonest participants rely on two important processes to successfully achieve the collusive attack; (1) sharing information about the carrier quantum states that will be used to encode the private data and generate the final key, (2) deceiving the honest participants to deduce their private data by sending forged data. In our protocol, a semi-honest server is used to prevent dishonest participants from sending forged data to the honest ones. The server generates Si with decoy qubits in Step (1) and sends it to Pi in Step (2). In Step (5.b), Pi sends her/his encoded sequence to Pi+1. To prevent the collusive attack, in Step (5. c), the server participates in checking the security of transmission to make sure that Pi does not send forged qubits to Pi+1 by randomly selecting some qubits and asking the participants to divulge the related information. Accordingly, the protocol guarantees that the honest participant has received genuine data, and the dishonest participants cannot obtain useful information to generate the final key alone or steal the private inputs of honest participants.

Moreover, if the dishonest participants try to adopt guessing strategies they will be detected with high probability as indicated in Eqs. (911). Thus, we can say that the proposed model is secure against internal attacks.

Conclusion

In this work, we showed that most of the existing circular-type multiparty quantum key agreement protocols are insecure against a specific type of collusive attack. We analyzed the security of a recently proposed circular-type multiparty quantum key agreement protocol to demonstrate the vulnerability of such protocols. Then, we proposed a general secure quantum key agreement model to avoid the different types of collusive attacks. We showed that the proposed protocol could generate the final key correctly and that the proposed protocol is secure against all known collusive attack strategies.

Acknowledgements

This research was funded by the Natural Sciences and Engineering Research Council of Canada and NXM Labs Inc. NXM’s autonomous security technology enables devices, including connected vehicles, to communicate securely with each other and their surroundings without human intervention while leveraging data at the edge to provide business intelligence and insights. NXM ensures data privacy and integrity by using a novel blockchain-based architecture which enables rapid and regulatory-compliant data monetization. Ryerson University is in the “Dish With One Spoon Territory”. The Dish With One Spoon is a treaty between the Anishinaabe, Mississaugas and Haudenosaunee that bound them to share the territory and protect the land. Subsequent Indigenous Nations and peoples, Europeans and all newcomers, have been invited into this treaty in the spirit of peace, friendship and respect. Wilfrid Laurier University is located on the traditional territory of the Neutral, Anishnawbe and Haudenosaunee peoples. We thank them for allowing us to conduct research on their land.

Author contributions

H.A. designed the scheme. H.A., A.M. and S.G. did security analysis and comparisons. All authors contributed to the writing and discussion of the paper.

Competing interests

The authors declare no competing interests.

Footnotes

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Diffie W, Hellman M. New directions in cryptography. IEEE Trans. Inf. Theory. 1976;22:644–654. doi: 10.1109/TIT.1976.1055638. [DOI] [Google Scholar]
  • 2.Ingemarsson I, Tang D, Wong C. A conference key distribution system. IEEE Trans. Inf. Theory. 1982;28:714–720. doi: 10.1109/TIT.1982.1056542. [DOI] [Google Scholar]
  • 3.Pieprzyk J, Li C-H. Multiparty key agreement protocols. IEE Proc. Comput. Digital Tech. 2000;147:229–236. doi: 10.1049/ip-cdt:20000531. [DOI] [Google Scholar]
  • 4.Bernstein DJ, Lange T. Post-quantum cryptography. Nature. 2017;549:188–194. doi: 10.1038/nature23461. [DOI] [PubMed] [Google Scholar]
  • 5.Alagic G, et al. Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process. US Department of Commerce; 2020. [Google Scholar]
  • 6.Bennet, C. & Brassard, G. in Proc. of IEEE Int. Conf. on Comp., Syst. and Signal Proc., Bangalore, India, Dec. 10–12 (1984).
  • 7.Abulkasim H, Farouk A, Hamad S, Mashatan A, Ghose S. Secure dynamic multiparty quantum private comparison. Sci. Rep. 2019;9:1–16. doi: 10.1038/s41598-019-53967-9. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 8.Abulkasim H, et al. Improving the security of quantum key agreement protocols with single photon in both polarization and spatial-mode degrees of freedom. Quant. Inf. Process. 2018;17:316. doi: 10.1007/s11128-018-2091-7. [DOI] [Google Scholar]
  • 9.Wu W, Cai Q, Wu S, Zhang H. Cryptanalysis of He’s quantum private comparison protocol and a new protocol. Int. J. Quant. Inf. 2019;17:1950026. doi: 10.1142/S0219749919500266. [DOI] [Google Scholar]
  • 10.Qi R, et al. Implementation and security analysis of practical quantum secure direct communication. Light Sci. Appl. 2019;8:1–8. doi: 10.1038/s41377-019-0132-3. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 11.Li L, Li Z. A verifiable multiparty quantum key agreement based on bivariate polynomial. Inf. Sci. 2020;521:343–349. doi: 10.1016/j.ins.2020.02.057. [DOI] [Google Scholar]
  • 12.Abulkasim H, Alotaibi A. Improvement on ‘Multiparty Quantum Key Agreement with Four-Qubit Symmetric W State’. Int. J. Theor. Phys. 2019;58:4235–4240. doi: 10.1007/s10773-019-04293-3. [DOI] [Google Scholar]
  • 13.Shi R-H, Zhang M. Privacy-preserving quantum sealed-bid auction based on grover’s search algorithm. Sci. Rep. 2019;9:1–10. doi: 10.1038/s41598-019-44030-8. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 14.Bao N, Halpern NY. Quantum voting and violation of Arrow's impossibility theorem. Phys. Rev. A. 2017;95:062306. doi: 10.1103/PhysRevA.95.062306. [DOI] [Google Scholar]
  • 15.Chowdhury A, et al. Quantum signature of a squeezed mechanical oscillator. Phys. Rev. Lett. 2020;124:023601. doi: 10.1103/PhysRevLett.124.023601. [DOI] [PubMed] [Google Scholar]
  • 16.Abulkasim H, et al. Improved dynamic multi-party quantum private comparison for next-generation mobile network. IEEE Access. 2019;7:17917–17926. doi: 10.1109/ACCESS.2019.2894101. [DOI] [Google Scholar]
  • 17.Zhou N, Zeng G, Xiong J. Quantum key agreement protocol. Electron. Lett. 2004;40:1149–1150. doi: 10.1049/el:20045183. [DOI] [Google Scholar]
  • 18.Liu B, Xiao D, Jia H-Y, Liu R-Z. Collusive attacks to “circle-type” multi-party quantum key agreement protocols. Quantum Inf. Process. 2016;15:2113–2124. doi: 10.1007/s11128-016-1264-5. [DOI] [Google Scholar]
  • 19.Sun Z, Cheng R, Wu C, Zhang C. New fair multiparty quantum key agreement secure against collusive attacks. Sci. Rep. 2019;9:1–8. doi: 10.1038/s41598-019-53524-4. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 20.Sun Z, Wu C, Zheng S, Zhang C. Efficient multiparty quantum key agreement with a single d-level quantum system secure against collusive attack. IEEE Access. 2019;7:102377–102385. doi: 10.1109/ACCESS.2019.2931612. [DOI] [Google Scholar]
  • 21.Liu H-N, Liang X-Q, Jiang D-H, Zhang Y-H, Xu G-B. Multi-party quantum key agreement protocol with bell states and single particles. Int. J. Theor. Phys. 2019;58:1659–1666. doi: 10.1007/s10773-019-04063-1. [DOI] [Google Scholar]
  • 22.Liu W-J, Chen Z-Y, Ji S, Wang H-B, Zhang J. Multi-party semi-quantum key agreement with delegating quantum computation. Int. J. Theor. Phys. 2017;56:3164–3174. doi: 10.1007/s10773-017-3484-6. [DOI] [Google Scholar]
  • 23.Shi R-H, Zhong H. Multi-party quantum key agreement with bell states and bell measurements. Quantum Inf. Process. 2013;12:921–932. doi: 10.1007/s11128-012-0443-2. [DOI] [Google Scholar]
  • 24.Wang L, Ma W. Quantum key agreement protocols with single photon in both polarization and spatial-mode degrees of freedom. Quantum Inf. Process. 2017;16:130. doi: 10.1007/s11128-017-1576-0. [DOI] [Google Scholar]
  • 25.Liu H-N, Liang X-Q, Jiang D-H, Xu G-B, Zheng W-M. Multi-party quantum key agreement with four-qubit cluster states. Quantum Inf. Process. 2019;18:242. doi: 10.1007/s11128-019-2346-y. [DOI] [Google Scholar]
  • 26.Huang W, et al. Efficient multiparty quantum key agreement with collective detection. Sci. Rep. 2017;7:1–9. doi: 10.1038/s41598-016-0028-x. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 27.Zhou Y-H, Zhang J, Shi W-M, Yang Y-G, Wang M-F. Continuous-variable multiparty quantum key agreement based on third party. Mod. Phys. Lett. B. 2020;34:2050083. doi: 10.1142/S0217984920500839. [DOI] [Google Scholar]
  • 28.Cao H, Ma W. Multi-party traveling-mode quantum key agreement protocols immune to collusive attack. Quantum Inf. Process. 2018;17:219. doi: 10.1007/s11128-018-1993-8. [DOI] [Google Scholar]
  • 29.Huang W-C, Yang Y-K, Jiang D, Gao C-H, Chen L-J. Designing secure quantum key agreement protocols against dishonest participants. Int. J. Theor. Phys. 2019;58:4093–4104. doi: 10.1007/s10773-019-04275-5. [DOI] [Google Scholar]
  • 30.Li X-H, Deng F-G, Zhou H-Y. Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A. 2006;74:054302. doi: 10.1103/PhysRevA.74.054302. [DOI] [Google Scholar]
  • 31.Deng F-G, Li X-H, Zhou H-Y, Zhang Z-J. Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A. 2005;72:044302. doi: 10.1103/PhysRevA.72.044302. [DOI] [Google Scholar]

Articles from Scientific Reports are provided here courtesy of Nature Publishing Group

RESOURCES