Next Article in Journal
Identifying Influential Nodes Based on Evidence Theory in Complex Network
Previous Article in Journal
Low-Density Parity-Check Decoding Algorithm Based on Symmetric Alternating Direction Method of Multipliers
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Single-State Multi-Party Quantum Key Agreement with Single-Particle Measurement

1
Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan 430074, China
2
Center for Technology Research & Innovation, China Mobile (Suzhou) Software Technology Co., Ltd., Suzhou 215163, China
3
Shenzhen Huazhong University of Science and Technology Research Institute, Shenzhen 518063, China
4
School of Computer Science and Engineering, Huaiyin Institute of Technology, Huai’an 223003, China
*
Author to whom correspondence should be addressed.
Entropy 2025, 27(4), 405; https://doi.org/10.3390/e27040405
Submission received: 22 January 2025 / Revised: 16 March 2025 / Accepted: 17 March 2025 / Published: 10 April 2025
(This article belongs to the Section Quantum Information)

Abstract

:
In this study, we propose a single-state multi-party quantum key agreement (MQKA) protocol with single-particle measurement. Firstly, a single-state three-party quantum key agreement protocol with single-particle measurement is introduced, followed by a security analysis that validated its capability to resist potential internal and external attacks. Furthermore, we utilize multi-particle entangled states to present a multi-party version of the single-state multi-party quantum key agreement with single-particle measurement. In comparison to previous MQKA protocols, our approach presents the following advantages: it employs one kind of multi-particle entangled state as the quantum resource; eliminates the need for entanglement swapping techniques, unitary operations, or pre-shared keys between participants; uses only the X measurement basis and Z measurement basis; transmits fewer qubits; consumes fewer qubits; and has higher qubit efficiency.

1. Introduction

Quantum cryptography, with its theoretically unconditional security feature, has gradually become an important research area in the field of cryptography. Unlike classical cryptography, the security of quantum cryptography is based on the quantum no-cloning theorem and Heisenberg’s uncertainty principle. As a result, it has attracted significant attention from researchers. Quantum cryptography includes several research areas, such as quantum key distribution (QKD) [1,2,3,4], quantum secret sharing (QSS) [5,6,7], quantum secure direct communication (QSDC) [8,9,10], quantum private query (QPQ) [11,12,13,14], and quantum key agreement (QKA). Among these, quantum key agreement (QKA) requires each participant to equally contribute to the generation of the negotiated key, ensuring that any non-trivial subset of participants cannot independently determine the key. In 2004, Zhou et al. [15] innovatively applied quantum teleportation to key agreement, proposing the first quantum key agreement (QKA) protocol. However, Tsai et al. [16] identified a significant flaw in Zhou’s protocol where a participant could independently determine the negotiated key. Subsequently, Hsueh et al. [17] implemented a QKA protocol using maximally entangled states. Nevertheless, Hsueh et al.’s protocol was vulnerable to controlled-NOT attacks [18]. In 2011, Chong et al. [19] enhanced the security of Hsueh et al.’s protocol. In 2013, Shi et al. [20] extended the two-party QKA to be multi-party and proposed the first multi-party QKA protocol, which utilizes the Bell state as the quantum resource state and employs entanglement swapping technology. On this basis, Sun et al. [21] proposed an efficient quantum key agreement protocol based on commutative encryption. Wang et al. [22] proposed a multi-party semiquantum key agreement without entanglement. In addition to these efforts, numerous QKA protocols have been proposed, such as the schemes based on a single particle [23,24,25,26], the Bell state [27,28,29,30,31,32], and a multi-particle entangled state [33,34,35,36,37,38,39,40].
Resently, Xu et al. [41] proposed a single-state multi-party semiquantum key agreement protocol based on multi-particle entangled states which offers several key advantages: it uses only one kind of multi-particle entangled state as the initial quantum resource; it does not require pre-shared keys between different parties; and it eliminates the need for unitary operations or quantum entanglement swapping. Subsequently, Yang et al. [42] proposed an efficient single-state multi-party quantum key agreement which retains most of the advantages of Xu et al.’s scheme while achieving significant improvements in the number of quantum state transmissions, the number of qubits consumed, and qubit efficiency.
In this paper, a single-state three-party quantum key agreement protocol utilizing single-particle measurements is proposed. We conduct a detailed analysis demonstrating that our scheme can resist potential internal and external attacks. Furthermore, we extend the proposed single-state three-party quantum key agreement protocol to be N-party by using N-particle entangled states instead of three-particle entangled states as the quantum resource states. Compared to previous multi-party QKA schemes, our protocol retains most of the advantages presented in references [41,42] while only requiring the use of the X measurement basis and Z measurement basis. Additionally, our protocol further reduces the number of qubits transmitted and consumed, and enhances qubit efficiency.
The rest of the paper is organized as follows: In Section 2, we describe the single-state three-party quantum key agreement protocol in detail. Section 3 provides a security analysis of the protocol. In Section 4, we extend the proposed single-state three-party quantum key agreement protocol to be N-party. Section 5 discusses the performance of our scheme. Section 6 provides a conclusion.

2. The Proposed Single-State Three-Party Quantum Key Agreement with Single-Particle Measurement

Suppose P 1 , P 2 , and P 3 seek to establish a private key over a quantum channel, ensuring that each participant contributes equally to the generation of the key and that the key cannot be fully determined by any non-trivial subset of them. In the negotiation phase, the utilization of a hash function outputting m bits is necessary.
Step 1: P 1 , P 2 , and P 3 randomly generate the CHECK keys
K ¯ P 1 = K ¯ P 1 1 , K ¯ P 1 2 , , K ¯ P 1 l ,
K ¯ P 2 = K ¯ P 2 1 , K ¯ P 2 2 , , K ¯ P 2 l ,
K ¯ P 3 = K ¯ P 3 1 , K ¯ P 3 2 , , K ¯ P 3 l ,
and the INFO keys
K P 1 = K P 1 1 , K P 1 2 , , K P 1 n ,
K P 2 = K P 2 1 , K P 2 2 , , K P 2 n ,
K P 3 = K P 3 1 , K P 3 2 , , K P 3 n .
Here, l represents the number of the CHECK particles, n represents the length of the negotiated key, and K ¯ P 1 , K ¯ P 2 , K ¯ P 3 , K P 1 , K P 2 , K P 3 0 , 1 . They calculate the hash values H K P 1 , H K P 2 , H K P 3 corresponding to the keys K P 1 , K P 2 , K P 3 and announce the values.
Step 2: P 1 prepares l + n three-particle GHZ states G H Z = 1 2 000 + 111 . For each GHZ state, P 1 keeps the first particle, and sends the second particle to P 2 and the third particle to P 3 . We denote the first particle sequence as S P 1 , the second particle sequence as S P 2 , and the third particle sequence as S P 3 as follows:
S P 1 = S P 1 1 , S P 1 2 , , S P 1 l + n ,
S P 2 = S P 2 1 , S P 2 2 , , S P 2 l + n ,
S P 3 = S P 3 1 , S P 3 2 , , S P 3 l + n .
Step 3: After P 2 receives S P 2 and P 3 receives S P 3 , P 1 randomly selects l particles as the CHECK particles, and informs P 2 , P 3 of the positions of the CHECK particles. Here, the CHECK particles held by P 1 , P 2 , P 3 are denoted as U P 1 , U P 2 , U P 3 , respectively, as follows:
U P 1 = U P 1 1 , U P 1 2 , , U P 1 l ,
U P 2 = U P 2 1 , U P 2 2 , , U P 2 l ,
U P 3 = U P 3 1 , U P 3 2 , , U P 3 l .
Then, P 1 , P 2 , P 3 announce the CHECK keys K ¯ P 1 , K ¯ P 2 , K ¯ P 3 . They calculate
K ¯ = K ¯ P 1 K ¯ P 2 K ¯ P 3 .
In this equation, K ¯ = K ¯ 1 , K ¯ 2 , , K ¯ l . For the q-th CHECK particle, when the value of K ¯ q is 0, P i uses basis Z to measure the particle U P i q and publishes the results, where q 1 , 2 , , l . When the value of K ¯ q is 1, P i uses basis X to measure the particle U P i q and publishes the results, where q 1 , 2 , , l . Suppose that the measurement results in basis Z are U z P i q = + 1 , 1 , and in basis X are U x P i q = + 1 , 1 . According to the entanglement properties of the three-particle GHZ state and Equation (14),
G H Z = 1 2 000 + 111 = 1 4 + + + + + + + + + .
P i can check the correctness of the measurement results. When the chosen basis is Z, the measurement results must satisfy U z P 1 q = U z P 2 q = U z P 3 q . When the chosen basis is X, the measurement results must satisfy Π i = 1 3 U x P i q = 1 . If the error exceeds the threshold, the protocol aborts. The remaining particles serve as INFO particles V P i = V P i 1 , V P i 2 , , V P i n . P i measures the particles with basis Z.
Step 4: The measurement results are represented by V z P i . If the measurement result is 0 , its value is taken as 0; if the measurement result is 1 , its value is taken as 1. According to the entanglement properties of the three-particle GHZ state, we can obtain V z P 1 = V z P 2 = V z P 3 . P 1 calculates E P 1 = V z P 1 K P 1 and sends it to P 2 , P 3 . P 2 calculates E P 2 = V z P 2 K P 2 and sends it to P 1 , P 3 . P 3 calculates E P 3 = V z P 3 K P 3 and sends it to P 1 , P 2 .
Step 5: P 1 calculates H E P 2 V z P 1 , H E P 3 V z P 1 . If H E P 2 V z P 1 = H K P 2 and H E P 3 V z P 1 = H K P 3 , P 1 will infer the final negotiated key
K = K P 1 E P 2 V z P 1 E P 3 V z P 1 .
P 2 calculates H E P 1 V z P 2 , H E P 3 V z P 2 . If H E P 1 V z P 2 = H K P 1 and H E P 3 V z P 2 = H K P 3 , P 2 will infer the final negotiated key
K = K P 2 E P 1 V z P 2 E P 3 V z P 2 .
P 3 calculates H E P 1 V z P 3 , H E P 2 V z P 3 . If H E P 1 V z P 3 = H K P 1 and H E P 2 V z P 3 = H K P 2 , P 3 will infer the final negotiated key
K = K P 3 E P 1 V z P 3 E P 2 V z P 3 .
As shown in Figure 1, the flowchart depicts the mechanism of the proposed MQKA protocol.

3. Security Analysis

This section will discuss the security of the proposed protocol. Without loss of generality, we analyze the security of the proposed three-party QKA protocol. The security analysis encompasses both internal attacks and external attacks.

3.1. External Attack

In the proposed three-party protocol, in order to obtain the negotiated key, an external attacker may launch typical attacks during the transmission of quantum states, including the Trojan horse attack, the intercept–resend attack, the entangle–measure attack, and the measure–resend attack.

3.1.1. The Trojan Horse Attack

In our scheme, since each particle is transmitted only once, our three-party QKA protocol is immune to the delay-photon Trojan horse attack [43] and the invisible eavesdropping Trojan horse attack [44].

3.1.2. The Intercept–Resend Attack

The external attacker may intercept the particles P 1 transmitted and resend the fake states to P 2 , P 3 . Without loss of generality, suppose that Eve intercepts the particles S P 3 and sends the fake particles to P 3 . Taking the q-th fake CHECK particle U ˜ P 3 q ( 0 ) as an example, the q-th system state can be described as
Ψ ˜ = 1 2 00 + 11 0 = 1 4 + + + + + + + + + .
Firstly, we consider the scenario where the measurement basis is Z. When the measurement results of U P 1 q , U P 2 q , U ˜ P 3 q are 000 , we can obtain U z P 1 q = U z P 2 q = U ˜ z P 3 q . Eve is capable of evading eavesdropping detection.
When the measurement results of U P 1 q , U P 2 q , U ˜ P 3 q are 110 , we can obtain U z P 1 q = U z P 2 q U ˜ z P 3 q . Eve can be detected by the eavesdropping detection.
Secondly, we consider the scenario where the measurement basis is X. When the measurement results of U P 1 q , U P 2 q , U ˜ P 3 q in + + + or + , we can obtain U x P 1 q · U x P 2 q · U ˜ x P 3 q = 1 . Eve is capable of evading eavesdropping detection.
When the measurement results of U P 1 q , U P 2 q , U ˜ P 3 q in + + or , we can obtain U x P 1 q · U x P 2 q · U ˜ x P 3 q = 1 . Eve is unable to evade eavesdropping detection.
Therefore, for each CHECK particle, Eve is capable of evading eavesdropping detection with the probability of
1 2 × 1 2 + 1 2 × 1 4 + 1 4 = 1 2 .
For all l CHECK particles, Eve can be detected with the probability of 1 1 2 l .

3.1.3. The Entangle–Measure Attack

The external attacker may perform the entangle–measure attack. Without loss of generality, suppose that Eve intercepts the particles P 1 transmitted to P 2 ( P 3 ), and performs unitary operation U E on the intercepted particles. If this attack does not introduce any errors, the system state of Eve’s probe should be independent of the measurement results of S P 1 , S P 2 , S P 3 . The effect of U E on 0 and 1 can be described as
U E 0 E = ε 00 0 e 00 + ε 01 1 e 01 ,
U E 1 E = ε 10 0 e 10 + ε 11 1 e 11 .
In this equation, e 00 , e 01 , e 10 , and e 11 are the probe state of Eve on U E , and ε 00 2 + ε 01 2 = 1 , ε 10 2 + ε 11 2 = 1 . The global state of the system can be described as
U E G H Z P 1 P 2 P 3 E = U E 1 2 0 P 1 0 P 2 0 P 3 + 1 P 1 1 P 2 1 P 3 E = 1 2 0 P 1 ε 00 0 P 2 e 00 + ε 01 1 P 2 e 01 ε 00 0 P 3 e 00 + ε 01 1 P 3 e 01 + 1 P 1 ε 10 0 P 2 e 10 + ε 11 1 P 2 e 11 ε 10 0 P 2 e 10 + ε 11 1 P 2 e 11 + = 1 2 ε 00 ε 00 0 P 1 0 P 2 0 P 3 e 00 e 00 + ε 00 ε 01 0 P 1 0 P 2 1 P 3 e 00 e 01 + ε 01 ε 00 0 P 1 1 P 2 0 P 3 e 01 e 00 + ε 01 ε 01 0 P 1 1 P 2 1 P 3 e 01 e 01 + ε 10 ε 10 1 P 1 0 P 2 0 P 3 e 10 e 10 + ε 10 ε 11 1 P 1 0 P 2 1 P 3 e 10 e 11 + ε 11 ε 10 1 P 1 1 P 2 0 P 3 e 11 e 10 + ε 11 ε 11 1 P 1 1 P 2 1 P 3 e 11 e 11 ,
In this equation, the subscripts P 1 , P 2 , and P 3 denote the particles from S P 1 , S P 2 , and S P 3 , respectively. If Eve does not introduce any errors during the eavesdropping check by participants, the measurement results of P 1 , P 2 , and P 3 should be the same. Thereby, Eve’s attack U E should be satisfied with the conditions
U E G H Z P 1 P 2 P 3 E = 1 2 ε 00 ε 00 0 P 1 0 P 2 0 P 3 e 00 e 00 + ε 11 ε 11 1 P 1 1 P 2 1 P 3 e 11 e 11 .
Based on Equation (22), we can infer
ε 00 ε 01 e 00 e 01 + ε 01 ε 00 e 01 e 00 + ε 01 ε 01 e 01 e 01 + ε 10 ε 10 e 10 e 10 + ε 10 ε 11 e 10 e 11 + ε 11 ε 10 e 11 e 10 = 0 .
Here, 0 represents a column zero vector. Then, we can obtain
ε 00 ε 01 + ε 01 ε 00 + ε 01 ε 01 + ε 10 ε 10 + ε 10 ε 11 + ε 11 ε 10 = 0 .
Furthermore, we can obtain
ε 00 ε 00 = ε 11 ε 11 .
e 00 e 00 = e 00 e 11 .
Therefore, we can obtain
U E G H Z P 1 P 2 P 3 E = G H Z P 1 P 2 P 3 e 00 e 00 .
Based on the aforementioned proof, in the absence of errors induced by Eve’s attack, the ultimate system state of Eve’s probe should be independent of the measurement results of the particles from S P 1 , S P 2 , and S P 3 . Therefore, Eve is unable to obtain any useful information about the measured particles. Once Eve acquires any useful information, Eve’s attack will be detected with a nonzero probability.

3.1.4. The Measure–Resend Attack

The external attacker may intercept the particles P 1 transmitted, measure the particles, and resend the fake states to P 2 , P 3 . Without loss of generality, suppose that Eve intercepts the particles S P 3 , measures the intercepted particles with Z basis, and sends the fake particles to P 3 . Clearly, the system state has a probability of 1 2 for being 000 and a probability of 1 2 for being 111 .
Firstly, we consider the scenario where the system state is 000 . When the measurement basis is Z, the measurement results of U P 1 q , U P 2 q , U ˜ P 3 q are 000 , and we can obtain U z P 1 q = U z P 2 q = U ˜ z P 3 q . Eve is capable of evading eavesdropping detection.
When the measurement basis is X and the measurement results of U P 1 q , U P 2 q , U ˜ P 3 q in + + + , + , + or + , we can obtain U x P 1 q · U x P 2 q · U ˜ x P 3 q = 1 . Eve is capable of evading eavesdropping detection.
When the measurement results of U P 1 q , U P 2 q , U ˜ P 3 q in + + , + + , + + or , we can obtain U x P 1 q · U x P 2 q · U ˜ x P 3 q = 1 . Eve is unable to evade eavesdropping detection.
Secondly, we consider the scenario where the system state is 111 . When the measurement basis is Z, the measurement results of U P 1 q , U P 2 q , U ˜ P 3 q are 111 , and we can obtain U z P 1 q = U z P 2 q = U ˜ z P 3 q . Eve is capable of evading eavesdropping detection.
When the measurement basis is X and the measurement results of U P 1 q , U P 2 q , U ˜ P 3 q in + + + , + , + or + , we can obtain U x P 1 q · U x P 2 q · U ˜ x P 3 q = 1 . Eve is capable of evading eavesdropping detection.
When the measurement results of U P 1 q , U P 2 q , U ˜ P 3 q in + + , + + , + + or , we can obtain U x P 1 q · U x P 2 q · U ˜ x P 3 q = 1 . Eve is unable to evade eavesdropping detection.
Therefore, for each CHECK particle, Eve is capable of evading eavesdropping detection with the probability of
1 2 × 1 2 × 1 + 1 2 × 1 8 + 1 8 + 1 8 + 1 8 + 1 2 × 1 2 × 1 + 1 2 × 1 8 + 1 8 + 1 8 + 1 8 = 3 4 .
For all l CHECK particles, Eve can be detected with the probability of 1 3 4 l .

3.2. Internal Attack

A secure quantum key agreement protocol is required to possess the fairness property, ensuring that all participants contribute equally to the negotiated key. In the proposed protocol, under the condition that all participants honestly execute the protocol prior to Step 4, they will be able to successfully obtain V z P 1 = V z P 2 = V z P 3 . In Step 4, P i calculates the value of E P i = V z P i K P i and publishes it to other participants, where i 1 , 2 , 3 . However, P i may announce the false value of E ˜ P i . Without loss of generality, suppose that P 1 intends to determine the negotiated key K ˜ = K ˜ 1 , K ˜ 2 , , K ˜ N alone. In Step 4, P 2 publishes the value of E P 2 = V z P 2 K P 2 , and P 3 publishes the value of E P 3 = V z P 3 K P 3 . Based on the value of E P 2 and E P 3 , P 1 can calculate the value of
E ˜ P 1 = V z P 1 K ˜ E P 2 V z P 1 E P 3 V z P 1 .
and announce the false value of E ˜ P 1 to P 2 , P 3 , where E ˜ P 1 = E ˜ P 1 1 , E ˜ P 1 2 , , E ˜ P 1 n .
Based on the value of E ˜ P 1 , P 2 can infer the false value of
K ˜ = K P 2 E ˜ P 1 V z P 2 E P 3 V z P 2 .
P 3 can infer the false value of
K ˜ = K P 3 E ˜ P 1 V z P 3 E P 2 V z P 3 .
Nevertheless, as the hash value,
H E ˜ P 1 V z P 2 H K P 1 .
H E ˜ P 1 V z P 3 H K P 1 .
The dishonest behavior of P 1 will be detected by P 2 , P 3 .
Similarly, in the event that two dishonest participants collude to execute the cheating behavior, their cheating behavior will be exposed through the utilization of the hash function’s properties.

4. The Extension of the Proposed Scheme

Suppose P 1 , P 2 , , P N seek to establish a private key over a quantum channel, ensuring that each participant contributes equally to the generation of the key and that the key cannot be fully determined by any non-trivial subset of them. In the negotiation phase, the utilization of a hash function outputting m bits is necessary.
Step 1: P i randomly generates the CHECK keys
K ¯ P i = K ¯ P i 1 , K ¯ P i 2 , , K ¯ P i l ,
and the INFO keys
K P i = K P i 1 , K P i 2 , , K P i n .
Here, l represents the number of the CHECK particles, n represents the length of the negotiated key, and K ¯ P i , K P i 0 , 1 , i 1 , 2 , , N . P i calculates the hash values H K P i and announces the values.
Step 2: P 1 prepares l + n N-particle GHZ states G H Z N = 1 2 00 , , 0 + 11 , , 1 . For each GHZ state, P 1 keeps the first particle, and sends the t-th particle to P t , where t 2 , , N . We denote the i-th particle sequence as S P i as follows:
S P i = S P i 1 , S P i 2 , , S P i l + n .
Here, i 1 , 2 , , N .
Step 3: After P i receives S P i , P 1 randomly selects l particles as the CHECK particles and informs other participants of the positions of the CHECK particles. Here, the CHECK particles respectively held by P i are denoted as U P i as follows:
U P i = U P i 1 , U P i 2 , , U P i l .
Then, P i announces the CHECK keys K ¯ P i and calculates
K ¯ = K ¯ P 1 K ¯ P 2 K ¯ P N .
Here, K ¯ = K ¯ 1 , K ¯ 2 , , K ¯ l . For the q-th CHECK particle, when the value of K ¯ q is 0, P i uses the Z basis to measure the particle U P i q and publishes the measurement results, where q 1 , 2 , , l . When the value of K ¯ q is 1, P i uses the X basis to measure the particle U P i q and publishes the measurement results, where q 1 , 2 , , l . Suppose that the measurement results in basis Z are U z P i q = + 1 , 1 and in basis X are U x P i q = + 1 , 1 . According to the entanglement properties of the N-particle GHZ state and Equation (40),
G H Z N = 1 2 00 , , 0 N + 11 , , 1 N = 1 2 N + 1 2 σ 1 σ 2 , , σ N σ 1 σ 2 , , σ N .
In this equation, σ i + , , i 1 , 2 , , N , σ 1 σ 2 σ N = 0 . P i can check the correctness of the measurement results. When the chosen basis is Z, the measurement results must satisfy U z P 1 q = U z P 2 q = = U z P N q . When the chosen basis is X, the measurement results must satisfy Π i = 1 N U x P i q = 1 . If the error exceeds the threshold, the protocol aborts. The remaining particles serve as INFO particles V P i = V P i 1 , V P i 2 , , V P i n . P i measures the particles with the Z basis.
Step 4: The measurement results are represented by V z P i . If the measurement result is 0 , its value is taken as 0; if the measurement result is 1 , its value is taken as 1. According to the entanglement properties of the N-particle GHZ state, we can obtain V z P 1 = V z P 2 = = V z P N . P i calculates E P i = V z P i K P i and sends it to other participants.
Step 5: P i calculates H E P j V z P i . If H E P j V z P i = H K P j , P i will infer the final negotiated key
K = j = 1 N E P j V z P i ( m o d 2 ) ,
In this equation, i 1 , 2 , , N , j 1 , 2 , , N . If any participant refuses K as the negotiated key, the protocol will be terminated and restarted.

5. Discussions

Reference [45] provides a definition of qubit efficiency,
η = f q + c ,
In this equation, q is the number of transmitted qubits, c is the number of consumed classical bits, and f is the number of bits of the negotiated key. In the proposed protocol, P 1 prepares l + n N-particle entangled states, and it has q = l + n N . For the consumed classical bits, in order to announce the hash H K P i , the CHECK keys K ¯ P i , the measurement results of U P i , and the ciphertext E P i , P i needs to spend m, l, l, and n classical bits, respectively, where m is the length of the hash function H ( x ) . For N participants, the number of needed classical bits is c = 2 l + n + m N . The length of the negotiated key is n; therefore, f = n . Therefore, the qubit efficiency is η = n 3 l + 2 n + m N . When l is the same as n, the qubit efficiency η = n 5 n + m N .
In comparison to the previous MQKA protocols, as illustrated in Table 1, our protocol demonstrates great advantages. Our scheme retains most of the advantages of the schemes in [41,42] using one kind of multi-particle entangled state as the initial quantum resource, and eliminates the need for entanglement swapping techniques, unitary operations, or pre-shared keys between participants. In addition, our scheme uses only the X and Z bases for measurement, making it simpler and more practical than scheme [41], which uses GHZ and Z bases, and scheme [42], which uses X, Y, and Z bases. In terms of qubit transmission, our scheme and reference [42] require only one transmission from participant P1 to P2 (P3), while scheme [41] involves additional steps of reflecting or resending particles. Regarding qubit consumption, our scheme and reference [42] consume 2 n N qubits, whereas reference [41] consumes 2 N 1 n ( 3 N 1 ) qubits. Moreover, our scheme achieves a qubit efficiency of n 5 n N + m N , compared to n 2 N 1 n ( 3 N 1 ) + m N + n N for reference [41] and n 6 n N + m N for reference [42]. These advantages make our scheme more efficient and practical for implementation.

6. Conclusions

In this paper, a single-state multi-party quantum key agreement (MQKA) protocol utilizing single-particle measurement is proposed. We introduce a single-state three-party quantum key agreement protocol with single-particle measurement followed by a comprehensive security analysis. Building on this foundation, we further extend this approach by employing multi-particle entangled states to develop a multi-party version of the single-state multi-party quantum key agreement with single-particle measurement. Specifically, it employs one kind of multi-particle entangled state as the quantum resource, eliminating the need for entanglement swapping techniques, unitary operations, or pre-shared keys between participants. Moreover, the protocol uses only the X measurement basis and Z measurement basis, which results in fewer qubits being transmitted and consumed, and higher qubit efficiency. While our method can be extended to a multi-party version, the preparation of multi-particle entangled states remains a significant challenge that warrants further investigation.

Author Contributions

Writing—original draft, H.Y., D.C., L.Q. and R.Z.; Writing—review and editing, H.Y., D.C., L.Q., R.Z., S.L. and C.S. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the Major Research Plan of Hubei Province under Grant/Award NO. 2023BAA027; the Key Research & Development Plan of Hubei Province of China under Grant No. 2024BAB049 and the project of Science, Technology and Innovation Commission of Shenzhen Municipality of China under Grant No. GJHZ20240218114659027.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

Authors Dunbo Cai, Ling Qian, and Runqing Zhang were employed by the company of China Mobile (Suzhou) Software Technology Co., Ltd. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as potential conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
QKDQuantum Key Distribution
QSSQuantum Secret Sharing
QSDCQuantum Secure Direct Communication
QPQQuantum Private Query
QKAQuantum Key Agreement

References

  1. Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, 10–12 December 1984; pp. 175–179. [Google Scholar]
  2. Ekert, A.K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 1991, 67, 661–663. [Google Scholar] [CrossRef] [PubMed]
  3. Bennett, C.H.; Brassard, G.; Mermin, N.D. Quantum cryptography without Bell’s theorem. Phys. Rev. Lett. 1992, 68, 557. [Google Scholar] [CrossRef]
  4. Liao, S.K.; Cai, W.Q.; Liu, W.Y.; Zhang, L. Satellite-to-ground quantum key distribution. Nature 2017, 549, 43–47. [Google Scholar] [CrossRef] [PubMed]
  5. Hillery, M.; Buzek, V.; Berthiaume, A. Quantum secret sharing. Phys. Rev. A 1999, 59, 1829–1834. [Google Scholar] [CrossRef]
  6. Zhang, Z.J.; Li, Y.; Man, Z.X. Multiparty quantum secret sharing. Phys. Rev. A 2005, 71, 044301. [Google Scholar] [CrossRef]
  7. Zhou, Y.; Yu, J.; Yan, Z. Quantum secret sharing among four players using multipartite bound entanglement of an optical field. Phys. Rev. Lett. 2018, 121, 150502. [Google Scholar] [CrossRef]
  8. Deng, F.G.; Long, G.L. Secure direct communication with a quantum one-time pad. Phys. Rev. A 2004, 69, 052319. [Google Scholar] [CrossRef]
  9. Zhang, W.; Ding, D.S.; Sheng, Y.B.; Zhou, L.; Shi, B.S.; Guo, G.C. Quantum secure direct communication with quantum memory. Phys. Rev. Lett. 2017, 118, 220501. [Google Scholar] [CrossRef]
  10. Zhou, L.; Sheng, Y.B.; Long, G.L. Device-independent quantum secure direct communication against collective attacks. Sci. Bull. 2020, 65, 12–20. [Google Scholar] [CrossRef]
  11. Giovannetti, V.; Lloyd, S.; Maccone, L. Quantum private queries. Phys. Rev. Lett. 2017, 100, 230502. [Google Scholar] [CrossRef]
  12. Gao, F.; Qin, S.; Huang, W. Quantum private query: A new kind of practical quantum cryptographic protocol. Sci. China Phys. Mech. Astron. 2019, 62, 1–12. [Google Scholar] [CrossRef]
  13. Ye, T.Y.; Li, H.K.; Hu, J.L. Multi-user quantum private query protocol. Int. J. Theor. Phys. 2020, 59, 2867–2874. [Google Scholar] [CrossRef]
  14. Yang, H.; Xiao, M. Multi-user quantum private query. Quantum Inf. Process. 2020, 19, 253. [Google Scholar] [CrossRef]
  15. Zhou, N.; Zeng, G.; Xiong, J. Quantum key agreement protocol. Electron. Lett. 2004, 40, 1149. [Google Scholar] [CrossRef]
  16. Tsai, C.; Hwang, T. On Quantum Key Agreement Protocol; Technical Report, C-S-I-E; NCKU: Taiwan, China, 2009. [Google Scholar]
  17. Hsueh, C.C.; Chen, C.Y. Quantum key agreement protocol with maximally entangled states. In Proceedings of the 14th Information Security Conference (ISC 2004), National Taiwan University of Science and Technology, Taipei, Taiwan, 10–11 June 2004; pp. 10–11. [Google Scholar]
  18. Tsai, C.W.; Chong, S.K.; Hwang, T. Comment on quantum key agreement protocol with maximally entangled states. In Proceedings of the 20th Cryptology and Information Security Conference (CISC 2010), National Chiao Tung University, Hsinchu, Taiwan, 27–28 May 2010; pp. 210–213. [Google Scholar]
  19. Chong, S.K.; Tsai, C.W.; Hwang, T. Improvement on “quantum key agreement protocol with maximally entangled states”. Int. J. Theor. Phys. 2011, 50, 1793–1802. [Google Scholar] [CrossRef]
  20. Shi, R.H.; Zhong, H. Multi-party quantum key agreement with bell states and bell measurements. Quantum Inf. Process. 2013, 12, 921–932. [Google Scholar] [CrossRef]
  21. Sun, Z.; Huang, J.; Wang, P. Efficient multiparty quantum key agreement protocol based on commutative encryption. Quantum Inf. Process. 2016, 15, 2101–2111. [Google Scholar] [CrossRef]
  22. Wang, M.M.; Han, R.F.; Gong, L.M. Multiparty semiquantum key agreement without entanglement. Commun. Theor. Phys. 2020, 72, 065107. [Google Scholar] [CrossRef]
  23. Li, H.H.; Gong, L.H.; Zhou, N.R. New semi-quantum key agreement protocol based on high-dimensional single-particle states. Chin. Phys. B. 2020, 29, 11. [Google Scholar] [CrossRef]
  24. Tang, R.H.; Zhang, C.; Long, D.Y. An efficient circle-type multiparty quantum key agreement protocol with single particles. Int. J. Mod. Phys. B. 2020, 34, 20. [Google Scholar] [CrossRef]
  25. Sun, Z.W.; Wu, C.H.; Zheng, S.G. Efficient multiparty quantum key agreement with a single d-level quantum system secure against collusive attack. IEEE Access 2019, 7, 102377–102385. [Google Scholar] [CrossRef]
  26. Xu, T.J.; Gan, Z.G.; Ye, T.Y. Multiparty semiquantum key agreement with d-level single-particle states. Phys. A-Stat. Mech. Its Appl. 2023, 625, 128991. [Google Scholar] [CrossRef]
  27. Shukla, C.; Alam, N.; Pathak, A. Protocols of quantum key agreement solely using Bell states and Bell measurement. Quantum Inf. Process. 2014, 13, 2391–2405. [Google Scholar] [CrossRef]
  28. Huang, W.; Wen, Q.Y.; Liu, B. Quantum key agreement with EPR pairs and single-particle measurements. Quantum Inf. Process. 2014, 13, 649–663. [Google Scholar] [CrossRef]
  29. Zhu, Z.C.; Hu, A.Q.; Fu, A.M. Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement. Quantum Inf. Process. 2015, 14, 4245–4254. [Google Scholar] [CrossRef]
  30. Liu, W.J.; Xu, Y.; Yang, C.N. An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States. Int. J. Theor. Phys. 2018, 57, 195–207. [Google Scholar] [CrossRef]
  31. Yang, Y.G.; Li, B.R.; Li, D. New quantum key agreement protocols based on Bell states. Quantum Inf. Process. 2019, 18, 322. [Google Scholar] [CrossRef]
  32. Yan, L.; Zhang, S.; Chang, Y. Semi-Quantum Key Agreement and Private Comparison Protocols Using Bell States. Int. J. Theor. Phys. 2019, 58, 3852–3862. [Google Scholar] [CrossRef]
  33. Zhou, N.R.; Min, S.Q.; Chen, H.Y. Three-Party Quantum Key Agreement Protocol with Seven-Qubit Entangled States. Int. J. Theor. Phys. 2018, 57, 3505–3513. [Google Scholar] [CrossRef]
  34. Cai, T.; Jiang, M.; Cao, G. Multi-party quantum key agreement with five-qubit brown states. Quantum Inf. Process. 2018, 17, 103. [Google Scholar] [CrossRef]
  35. Tang, J.; Shi, L.; Wei, J. Controlled quantum key agreement based on maximally three-qubit entangled states. Modern Phys. Lett. B 2020, 34, 2050201. [Google Scholar] [CrossRef]
  36. Liu, L.J.; Li, Z.H. A verifiable quantum key agreement protocol based on six-qubit cluster states. Eur. Phys. J. D 2021, 75, 193. [Google Scholar] [CrossRef]
  37. Xu, Y.; Wang, C.; Cheng, K. A Novel Three-Party Mutual Authentication Quantum Key Agreement Protocol with GHZ States. Int. J. Theor. Phys. 2022, 61, 245. [Google Scholar] [CrossRef]
  38. Zhou, N.R.; Liao, Q.; Zou, X.F. Multi-Party Semi-Quantum Key Agreement Protocol Based on the Four-Qubit Cluster States. Int. J. Theor. Phys. 2022, 61, 114. [Google Scholar] [CrossRef]
  39. Liu, C.; Cheng, S.; Li, H.H. New Semi-Quantum Key Agreement Protocol Based on the χ-Type Entanglement States. Int. J. Theor. Phys. 2022, 61, 60. [Google Scholar] [CrossRef]
  40. Liu, B.X.; Huang, R.C.; Yang, Y.G.; Xu, G.B. Measurement-device-independent multi-party quantum key agreement. Front. Quantum Sci. Technol. 2023, 2, 1182637. [Google Scholar] [CrossRef]
  41. Xu, T.J.; Chen, Y.; Geng, M.J. Single-state multi-party semiquantum key agreement protocol based on multi-particle GHZ entangled states. Quantum Inf. Process. 2022, 21, 266. [Google Scholar] [CrossRef]
  42. Yang, H.; Lu, S.F.; Zhou, Q.; Wang, M.; Feng, B.Y.; Zhou, X.J. Efficient single-state multi-party quantum key agreement. Quantum Inf. Process. 2024, 23, 150. [Google Scholar] [CrossRef]
  43. Li, X.H.; Deng, F.G.; Zhou, H.Y. Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 2019, 74, 054302. [Google Scholar] [CrossRef]
  44. Cai, Q.Y. Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 2006, 351, 23–25. [Google Scholar] [CrossRef]
  45. Cabello, A. Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 2000, 85, 5635. [Google Scholar] [CrossRef]
Figure 1. The flowchart depicts the mechanism of the proposed protocol.
Figure 1. The flowchart depicts the mechanism of the proposed protocol.
Entropy 27 00405 g001
Table 1. Comparison between our protocol and the previous MQKA protocols.
Table 1. Comparison between our protocol and the previous MQKA protocols.
The
MQKA
Protocols
Quantum
Resource
States
Entanglement
Swapping
Technology
Unitary
Operations
Pre-Shared
Keys
Extra
Qubits
Transmission
Measurement
Bases
Consumed
Qubits
Quantum
Efficiency
Protocol [41]GHZ
states
NoNoNoYesGHZ basis,
Z basis
2 N 1 n
( 3 N 1 )
n 2 N 1 n 3 N 1 + m N + n N
Protocol [42]GHZ
states
NoNoNoNoX basis,
Y basis,
Z basis
2 n N n 6 n N + m N
Our schemeGHZ
states
NoNoNoNoX basis,
Z basis
2 n N n 5 n N + m N
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yang, H.; Cai, D.; Qian, L.; Zhang, R.; Lu, S.; Sun, C. Single-State Multi-Party Quantum Key Agreement with Single-Particle Measurement. Entropy 2025, 27, 405. https://doi.org/10.3390/e27040405

AMA Style

Yang H, Cai D, Qian L, Zhang R, Lu S, Sun C. Single-State Multi-Party Quantum Key Agreement with Single-Particle Measurement. Entropy. 2025; 27(4):405. https://doi.org/10.3390/e27040405

Chicago/Turabian Style

Yang, Hao, Dunbo Cai, Ling Qian, Runqing Zhang, Songfeng Lu, and Chengfu Sun. 2025. "Single-State Multi-Party Quantum Key Agreement with Single-Particle Measurement" Entropy 27, no. 4: 405. https://doi.org/10.3390/e27040405

APA Style

Yang, H., Cai, D., Qian, L., Zhang, R., Lu, S., & Sun, C. (2025). Single-State Multi-Party Quantum Key Agreement with Single-Particle Measurement. Entropy, 27(4), 405. https://doi.org/10.3390/e27040405

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop