Published September 15, 2025 | Version v1
Journal Open

Quantum Diffie–Hellman key exchange

  • 1. ROR icon Foundation for Research and Technology Hellas

Description

The Diffie–Hellman key exchange plays a crucial role in conventional cryptography, as it allows two legitimate users to establish a common,
usually ephemeral, secret key. Its security relies on the discrete-logarithm problem, which is considered to be a mathematical one-way
function, while the final key is formed by random independent actions of the two users. In the present work we investigate the extension of
Diffie–Hellman key exchange to the quantum setting, where the two legitimate users exchange independent random quantum states. The proposed
protocol relies on the bijective mapping of integers onto a set of symmetric coherent states, and we investigate the regime of parameters
for which the map behaves as a quantum one-way function. Its security is analyzed in the framework of minimum-error-discrimination and
photon-number-splitting attacks, while its performance and the challenges in a possible realization are also discussed.

Files

016107_1_5.0242473-1.pdf

Files (6.1 MB)

Name Size Download all
md5:c63ff664eb35f8a93daf73260b4bbbbf
6.1 MB Preview Download

Additional details

Funding

European Commission
HellasQCI 101091504

Dates

Submitted
2024-10-02
Accepted
2025-01-02

References

  • A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography (CRC Press, 1996)
  • K. M. Martin, Everyday Cryptography: Fundamental Principles and Applications (Oxford University Press, New York, 2012)
  • S. Kak, "A three-stage quantum cryptography protocol," Found. Phys. Lett. 19, 293 (2006)
  • P. Subramaniam and A. Parakh, "A quantum Diffie-Hellman protocol," Int. J. Secur. Networks 11, 213–223 (2016)
  • V. S. Naresh, M. M. Nasralla, S. Reddi, and I. García-Magariño, "Quantum Diffie–Hellman extended to dynamic quantum group key agreement for ehealthcare multi-agent systems in smart cities," Sensors 20, 3940 (2020)
  • E. Andersson, M. Curty, and I. Jex, "Experimentally realizable quantum comparison of coherent states and its applications," Phys. Rev. A 74, 022304 (2006)
  • G. M. Nikolopoulos, "Applications of single-qubit rotations in quantum publickey cryptography," Phys. Rev. A 77, 032348 (2008); Erratum 78, 019903 (2008)
  • G. M. Nikolopoulos and L. M. Ioannou, "Deterministic quantum-public-key encryption: Forward search attack and randomization," Phys. Rev. A 79, 042327 (2009)
  • S. M. Barnett and S. Croke, "Quantum state discrimination," Adv. Opt. Photonics 1, 238–278 (2009)
  • M. Ban, K. Kurokawa, R. Momose, and O. Hirota, "Optimum measurements for discrimination among symmetric quantum states and parameter estimation," Int. J. Theor. Phys. 36, 1269–1288 (1997)
  • M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information (Cambridge University Press, Cambridge, England, 2000)
  • M. Lucamarini, Z. L. Yuan, J. F. Dynes, and A. J. Shields, "Overcoming the rate–distance limit of quantum key distribution without quantum repeaters," Nature 557, 400 (2018)
  • J. Mináˇr, H. de Riedmatten, C. Simon, H. Zbinden, and N. Gisin, "Phase-noise measurements in long-fiber interferometers for quantum-repeater applications," Phys. Rev. A 77, 052325 (2008)
  • 14X. B. Wang, Z. W. Yu, and X. L. Hu, "Twin-field quantum key distribution with large misalignment error," Phys. Rev. A 98, 062323 (2018)
  • M. Minder, M. Pittaluga, G. L. Roberts, M. Lucamarini, J. F. Dynes, Z. L. Yuan, and A. J. Shields, "Experimental quantum key distribution beyond the repeaterless secret key capacity," Nat. Photonics 13, 334–338 (2019)
  • W. Li, L. Zhang, Y. Lu, Z.-P. Li, C. Jiang, Y. Liu, J. Huang, H. Li, Z. Wang, X.-B. Wang, Q. Zhang, L. You, F. Xu, and J.-W. Pan, "Twin-field quantum key distribution without phase locking," Phys. Rev. Lett. 130, 250802 (2023)
  • M. Mehic, M. Niemiec, H. Siljak, and M. Voznak, "Error reconciliation in quantum key distribution protocols," in Reversible Computation: Extending Horizons of Computing, Lecture Notes in Computer Science Vol. 12070, edited by I. Ulidowski, I. Lanese, U. Schultz, and C. Ferreira (Springer, 2020), pp. 222–236
  • C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM J. Comput. 17, 210 (1988)
  • C. H. Bennett, G. Brassard, C. Crepeau, and U. M. Maurer, "Generalized privacy amplification," Int. Trans. Inf. Theory 41, 1915 (1995)
  • G. M. Nikolopoulos and E. Diamanti, "Continuous-variable quantum authentication of physical unclonable keys," Sci. Rep. 7, 46047 (2017)
  • G. Brassard, N. Lütkenhaus, T. Mor, and B. C. Sanders, "Limitations on practical quantum cryptography," Phys. Rev. Lett. 85, 1330 (2000)
  • M. Tomamichel, C. Schaffner, A. Smith, and R. Renner, "Leftover hashing against quantum side information," Int. Trans. Inf. Theory 57, 5524 (2011)
  • S. Bratzik, M. Mertz, H. Kampermann, and D. Bruß, "Min-entropy and quantum key distribution: Nonzero key rates for 'small' numbers of signals," Phys. Rev. A 83, 022330 (2011)
  • D. Bunandar, L. C. G. Govia, H. Krovi, and D. Englund, "Numerical finite-key analysis of quantum key distribution," npj Quantum Inf. 6, 104 (2020)
  • A. Abidin, "Authentication in quantum key distribution: Security proof and Universal hash functions," Ph.D. thesis, Linköping University, Sweden, 2013
  • L.-J. Wang, K.-Y. Zhang, J.-Y. Wang, J. Cheng, Y.-H. Yang, S.-B. Tang, D. Yan, Y.-L. Tang, Z. Liu, Y. Yu, Q. Zhang, and J.-W. Pan, "Experimental authentication of quantum key distribution with post-quantum cryptography," npj Quantum Inf. 7, 67 (2021)
  • G. M. Nikolopoulos and M. Fischlin, "Quantum key distribution with post-processing driven by physical unclonable functions," Appl. Sci. 14, 464 (2024)