This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Efficient Quantum Digital Signatures without Symmetrization Step

Yu-Shuo Lu    Xiao-Yu Cao    Chen-Xun Weng    Jie Gu    Yuan-Mei Xie    Min-Gang Zhou    Hua-Lei Yin [email protected]    Zeng-Bing Chen [email protected] National Laboratory of Solid State Microstructures, School of Physics and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China.
Abstract

Quantum digital signatures (QDS) exploit quantum laws to guarantee non-repudiation, unforgeability and transferability of messages with information-theoretic security. Current QDS protocols face two major restrictions, including the requirement of the symmetrization step with additional secure classical channels and quadratic scaling of the signature rate with the probability of detection events. Here, we present an efficient QDS protocol to overcome these issues by utilizing the classical post-processing operation called post-matching method. Our protocol does not need the symmetrization step, and the signature rate scales linearly with the probability of detection events. Simulation results show that the signature rate is three orders of magnitude higher than the original protocol in a 100-km-long fiber. This protocol is compatible with existing quantum communication infrastructure, therefore we anticipate that it will play a significant role in providing digital signatures with unconditional security.

preprint: APS/123-QED

I Introduction

Cryptography is essential for uncounted amount of applications that rely on non-repudiation, integrity and confidentiality of data. The two pillars of modern cryptography are encryption and digital signatures Diffie and Hellman (1976), where encryption guarantees confidentiality and digital signatures provide integrity and non-repudiation. Traditionally, public-key cryptography algorithms, such as the Rivest-Shamir-Adleman algorithm Rivest et al. (1978), are designed to simultaneously provide encryption and digital signature service. However, relying on the computational difficulty of certain mathematical problems, public-key cryptosystems are usually vulnerable to quantum computing attacks Shor (1994). Quantum key distribution (QKD) allows two remote users to share a secret key string with information-theoretic security Bennett and Brassard (1984); Ekert (1991). By combining one-time pad encryption Shannon (1949) and QKD, one can implement information communication with perfect confidentiality Chen et al. (2009). In addition, the direct transmission of private information is made possible in principle by quantum encryption Qi et al. (2019).

Digital signatures are widely applied in e-mails, electronic commerce and software distribution to ensure data integrity and non-repudiation Pirandola et al. (2020). Similar to QKD used for encryption service, quantum digital signatures (QDS) are expected to provide information-theoretic security to sign documents. The first QDS protocol was proposed in 2001 Gottesman and Chuang (2001), but it is unfeasible because of challenging experimental requirements. In the next decade or so, great efforts have been made in developing QDS protocols and an important achievement was the removal of the requirement of quantum memory Clarke et al. (2012); Dunjko et al. (2014); Collins et al. (2014); Wallden et al. (2015); Croal et al. (2016). Nevertheless, the security analysis of the early QDS protocols are based on secure quantum channels, i.e., there is no eavesdropping, which is a conflicting assumption. In 2016, two independent QDS protocols were proposed and proved to be secure against the general attacks without the assumption of secure quantum channels Yin et al. (2016a); Amiri et al. (2016). Importantly, their experimental devices and techniques have already been widely employed in QKD. These two protocols are important steps towards practical QDS Pirandola et al. (2020). The one in Yin et al. (2016a) is based on non-orthogonal encoding. The other Amiri et al. (2016) utilizes orthogonal encoding, which results in the need of an additional symmetrization step in the protocol. In addition, great achievements have been made in the experimental and theoretical research of information-theoretically secure QDS  Puthoor et al. (2016); Yin et al. (2017a); Collins et al. (2017); Yin et al. (2017b); Roberts et al. (2017); Zhang et al. (2018); Thornton et al. (2019); An et al. (2019); Ding et al. (2020); Zhang et al. (2020); Wang et al. (2015, 2017), including the field test of measurement-device-independent (MDI) QDS Yin et al. (2017b).

For the orthogonal encoding based protocol Amiri et al. (2016) (see also Puthoor et al. (2016); Zhang et al. (2020)), the need of the symmetrization step, which requires an additional secure classical channel, is the main issue. Currently, secure classical channels can only be realized by combining QKD and one-time pad encryption. The symmetrization step will consume 6L6L bits of secret key generated by QKD if one uses LL bits as the signature Yin et al. (2017b). Specially, in the worst case where the signer is located in the middle of two receivers, the low secret key rate of QKD between the two receivers severely limits the real-time signature rate of QDS. Besides, considering a quantum network with JJ users, there will be a need of J(J1)/2J(J-1)/2 secure classical channels Roberts et al. (2017), which is an unrealistically high amount in a real quantum network. For the non-orthogonal encoding based protocol Yin et al. (2016a), it does not require the symmetrization step. However, the signer has to send the same quantum states to two receivers. Only coincidence detection events, i.e., the two receivers both have click, are valid events. Let η\eta be the probability that one receiver has click, if the signer sends NN quantum states to the two receivers, there will be only η2N\eta^{2}N valid events. Therefore, the signature rate quadratically scales with the probability of detection events.

Here, inspired by the original protocol in Yin et al. (2016a), we propose an efficient quantum digital signature protocol without symmetrization step. A novel classical post-processing operation called post-matching method is exploited in our protocol. With the help of the post-matching method, the requirement of coincidence detection is removed. Given that the signer sends NN quantum states to receivers, there will be ηN\eta N valid events. Therefore the signature rate decays linearly with the probability of detection events. Simulation results show that the signature rate of our scheme is 22 or even 33 orders of magnitude higher than that of Ref. Yin et al. (2016a) in large attenuation case, and is comparable to orthogonal encoding based protocol.

II Protocol Description

There are three participants in our protocol, namely the signer Alice and the receiver Bob and Charlie. As determined by Alice, either Bob or Charlie can be the authenticator of the signature, and the other becomes the verifier. There are noisy insecure quantum channels connecting Alice-Bob and Alice-Charlie, and authenticated classical channels between the three participants. There are three stages in our protocol: key generation, estimation and messaging. In our protocol, the three stages can be performed separately, which means they can generate raw keys and store them for a long time, and continue the estimation and messaging stage whenever Alice wants to sign the message. This makes our protocol more practical.

Our protocol exploits non-orthogonal encoding to generate logical bits Scarani et al. (2004). There are four quantum states: |H\left|H\right\rangle, |V\left|V\right\rangle, |+\left|+\right\rangle and |\left|-\right\rangle, where |H\left|H\right\rangle and |V\left|V\right\rangle are the eigenstates of the Pauli Z operator and |+\left|+\right\rangle and |\left|-\right\rangle ( |±=12(\left|\pm\right\rangle=\frac{1}{\sqrt{2}}(|H\left|H\right\rangle±\pm |V\left|V\right\rangle))) are the eigenstates of the Pauli X operator. These four quantum states can be arranged into four sets: {|H,|+}\{\left|H\right\rangle,\left|+\right\rangle\}, {|+,|V}\{\left|+\right\rangle,\left|V\right\rangle\}, {|V,|}\{\left|V\right\rangle,\left|-\right\rangle\}, {|,|H}\{\left|-\right\rangle,\left|H\right\rangle\}, where the first state in each set is encoded with bit value 0 and the second is encoded with 1. Alice randomly sends quantum states to receivers and assigns each quantum state to a set. The receivers randomly choose Z or X basis to perform polarization measurement on each quantum state. If the measurement outcome is orthogonal to one of the states in the set, the receiver obtains a conclusive result with bit value 0 or 1, otherwise the receiver obtains an inconclusive result, denoted by \bot. Note that the set assigned by Alice should contain the quantum state she sent. For example, if Alice sends |H\left|H\right\rangle, she should assign it to set {|H,|+}\{\left|H\right\rangle,\left|+\right\rangle\} or {|,|H}\{\left|-\right\rangle,\left|H\right\rangle\}. When she assigns it to the set {|H,|+}\{\left|H\right\rangle,\left|+\right\rangle\} and Bob’s measurement outcome is |\left|-\right\rangle (|V\left|V\right\rangle), Bob obtains a conclusive result with bit value 0 (1)(1).

The decoy-state method Wang (2005); Lo et al. (2005) with three intensities is exploited to deal with photon-number-splitting attack for coherent state source. Data from the decoy state and vacuum state will be used for parameter estimation, and only data from the signal state will be used as test bits and secret keys. The setup for our QDS protocol is presented in Fig. 1. In the following part of the paper, we use superscripts cc, uu, tt, *, overline (underline), to denote conclusive results, untest bits, test bits, expected value and the upper bound (lower bound) of expected value, respectively. We also use subscripts PP (P{A,B,C}P\in\{A,B,C\}), 1111 and λ\lambda (λ{μ,ν,0}\lambda\in\{\mu,\nu,0\}) to denote Alice (Bob, Charlie), single-photon pair components and intensity respectively. Detailed descriptions of our protocol are given below.

1. Key generation. (1) Alice randomly selects a quantum state {|H,|V,|+,|}\{\left|H\right\rangle,\left|V\right\rangle,\left|+\right\rangle,\left|-\right\rangle\} with the same possibility and an intensity {μ,ν,0}\{\mu,\nu,0\} (signal, decoy and vacuum state) with possibilities pμp_{\mu}, pνp_{\nu} and p0p_{0} respectively. For each possible message mm (m=0m=0 or 11), Alice prepares two different quantum state sequences with length NN, namely AB,mA_{B,m}, and AC,mA_{C,m}. Alice sends AB,mA_{B,m} to Bob and AC,mA_{C,m} to Charlie through insecure quantum channels.

Refer to caption
Figure 1: Schematic diagram of a setup for our QDS protocol. Alice randomly prepares one of the four Bennett-Brassard 1984 Bennett and Brassard (1984) (BB84) states with phase-randomized weak coherent-state source and sends them to Bob (Charlie). Bob (Charlie) performs polarization measurement in the ZZ or XX basis. PM: polarization modulator; AM: amplitude modulator; PBS: polarization beam splitter; D1-D2: single photon detectors;

(2) For each quantum state, Bob and Charlie randomly choose X or Z basis to perform polarization measurement. Bob announces all the click events in AB,mA_{B,m} through authenticated classical channel. Alice and Bob discard all the data that has no click. They keep the left data of length nn, denote as SAB,mS_{AB,m} (kept by Alice) and SB,mS_{B,m} (kept by Bob). Alice and Charlie perform the same step. As a result, Alice has four data strings SAB,0S_{AB,0}, SAB,1S_{AB,1}, SAC,0S_{AC,0} and SAC,1S_{AC,1}, Bob (Charlie) has two strings SB,0S_{B,0}(SC,0S_{C,0}) and SB,1S_{B,1}(SC,1S_{C,1}). Since Alice randomly and independently chooses quantum states, the quantum states that Bob and Charlie receive are uncorrelated.

(3) Alice announces the intensity information of all pulses. According to the intensity information, the three participants divide each of their data strings into three strings, namely μ\mu string, ν\nu string and 0 string. For example, Bob divides SB,mS_{B,m} into SB,mμS_{B,m}^{\mu}, SB,mνS_{B,m}^{\nu} and SB,m0S_{B,m}^{0}.

(4) For the data strings corresponding to each intensity λ\lambda (λ{μ,ν,0}\lambda\in\{\mu,\nu,0\}), Alice takes SAB,mλS_{AB,m}^{\lambda} as the reference and changes the order of elements in SAC,mλS_{AC,m}^{\lambda}. Denote the changing result as SAC,mλS^{\prime\lambda}_{AC,m}, Alice should make SAB,mλS^{\lambda}_{AB,m} and SAC,mλS^{\prime\lambda}_{AC,m} identical. Without loss of generality, she requests Charlie to change the order of elements in SC,mλS_{C,m}^{\lambda} into the same order. We call this the post-matching method. After post-matching, the data obtained by Bob and Charlie can be correlated. Detailed description of post-matching method is given in Fig. 2.

(5) Using the rules for generating logical bits, Alice randomly assigns each element in SAB,mλS_{AB,m}^{\lambda} a set. The three participants ‘translate’ their data strings into raw key strings denoted as KA,mλK_{A,m}^{\lambda}, KB,mλK_{B,m}^{\lambda} and KC,mλK_{C,m}^{\lambda}. Note that they do not announce which bits are conclusive results.

Refer to caption
Figure 2: Schematic diagram of the post-matching method. For simplicity, we temporarily omit the superscript λ\lambda. (a) Alice sends AB,mA_{B,m} to Bob and sends AC,mA_{C,m} to Charlie. Only part of quantum states can be detected due to channel loss and imperfect detection. We use ‘\checkmark’ (‘×\times’) to denote the detector has click (no click). They discard the data that has no click and keep the remaining data. (b) Alice changes the order of SAC,mS_{AC,m} into SAC,mS^{\prime}_{AC,m}. Alice informs Charlie about the procedure of changing the order of data. For example, if SAB,mS_{AB,m}== {sAB,m1\{s_{AB,m}^{1}, sAB,m2s_{AB,m}^{2}, sAB,m3s_{AB,m}^{3}, sAB,m4}s_{AB,m}^{4}\}=={|H\{\left|H\right\rangle, |V\left|V\right\rangle, |+\left|+\right\rangle |}\left|-\right\rangle\}, SAC,mS_{AC,m}=={sAC,m1\{s_{AC,m}^{1}, sAC,m2s_{AC,m}^{2}, sAC,m3s_{AC,m}^{3}, sAC,m4}s_{AC,m}^{4}\}=={|+\{\left|+\right\rangle, |H\left|H\right\rangle, |V\left|V\right\rangle, |}\left|-\right\rangle\}, Alice should change the order of elements in SAC,mS_{AC,m} into {sAC,m2\{s_{AC,m}^{2}, sAC,m3s_{AC,m}^{3}, sAC,m1s_{AC,m}^{1}, sAC,m4}s_{AC,m}^{4}\}. She also asks Charlie to change the order of elements in SC,mS_{C,m} into {sC,m2\{s_{C,m}^{2}, sC,m3s_{C,m}^{3}, sC,m1s_{C,m}^{1}, sC,m4}s_{C,m}^{4}\}. (c) Charlie changes the order of SC,mS_{C,m} as instructed by Alice. Note that SC,mS_{C,m} is the measurement result of SAC,mS_{AC,m}. Since the order of elements in SC,mS_{C,m} and SAC,mS_{AC,m} are changed with the same procedure, SC,mS^{\prime}_{C,m} is the measurement result of SAC,mS^{\prime}_{AC,m}. As a result, although Alice sends different quantum state sequences AB,mA_{B,m} and AC,mA_{C,m}, after post-matching, it is equivalent to two identical sequences SAB,mS_{AB,m} and SAC,mS^{\prime}_{AC,m} arrive at Bob and Charlie.

2. Estimation. (1) The signer Alice chooses the desired authenticator of the signature, and the other participant automatically becomes the verifier. Here we assume Bob is the authenticator. The three participants publicly announce all data of ν\nu strings and 0 strings and the value of nλn_{\lambda} (the length of λ\lambda string). They estimate bit error rate of single-photon pair components in μ\mu strings using decoy state method. The verifier Charlie randomly selects a proportion of tt in the μ\mu string as test bits and asks Alice to publicly announce the value of these bits. We denote test bit strings as KA,mtK_{A,m}^{t}, KB,mtK_{B,m}^{t} and KC,mtK_{C,m}^{t}. Let EBctE_{B}^{ct} (ECctE_{C}^{ct}) be the mismatch rate of conclusive results between KA,mtK_{A,m}^{t} and KB,mtK_{B,m}^{t} (KA,mtK_{A,m}^{t} and KC,mtK_{C,m}^{t}). Bob and Charlie calculate EBctE_{B}^{ct} and ECctE_{C}^{ct}. Note that when EBctE_{B}^{ct} or ECctE_{C}^{ct} gets too high, the signing process of this round is highly possible to fail. In this case they abort the protocol. In addition, Bob and Charlie calculate the proportion of conclusive results in KB,mK_{B,m} and KC,mK_{C,m} , denoted as PBcP_{B}^{c} and PCcP_{C}^{c}, respectively. If PBcP_{B}^{c} or PCcP_{C}^{c} shows a big deviation from the ideal value 14\frac{1}{4}, they will also abort the protocol. The three participants discard the test bits and keep the remaining untest bits in μ\mu strings with length nun^{u}. We denote these untest bit strings as KA,muK_{A,m}^{u}, KB,muK_{B,m}^{u} and KC,muK_{C,m}^{u}. They will be used as secret keys to sign the message in the messaging stage.

(2) Bob and Charlie announce {EBct\{E_{B}^{ct}, PBc}P_{B}^{c}\} and {ECct\{E_{C}^{ct}, PCc}P_{C}^{c}\}. The three participants publicly negotiate to determine the values of authentication security threshold TaT_{a} and verification security threshold TvT_{v}.

3. Messaging. (1) To sign a one-bit message mm, Alice sends the message and the corresponding secret key {m,KA,mu}\{m,K_{A,m}^{u}\} to the authenticator Bob. Bob calculates the mismatch rate of conclusive results between KA,muK_{A,m}^{u} and KB,muK_{B,m}^{u}, which is denoted as EBcuE_{B}^{cu}. If EBcu<TaE_{B}^{cu}<T_{a}, Bob accepts the message and forwards {m,KA,mu}\{m,K_{A,m}^{u}\} to Charlie, otherwise he rejects the message and announces to abort the protocol.

(2) After receiving {m,KA,mu}\{m,K_{A,m}^{u}\} forwarded by Bob, Charlie calculates the mismatch rate of conclusive results ECcuE_{C}^{cu} between KA,muK_{A,m}^{u} and KC,muK_{C,m}^{u}. Charlie accepts the message if ECcu<TvE_{C}^{cu}<T_{v}. When both Bob and Charlie accept the message, Alice successfully signs the message.

III Security Analysis

In our protocol, Alice randomly chooses unrelated quantum states to send to Bob and Charlie. After post-matching, it is equivalent to Alice simultaneously sending the same quantum states to Bob and Charlie. To perform post-matching, Alice exposes information of order, but does not leak information of quantum states. In this case, eavesdroppers can not obtain more information of quantum states compared with the case where Alice actually sends two copies of quantum states. Thus the security analysis of our protocol can directly follow the lines in Ref. Yin et al. (2016a). In the three-participant scenario, transferability and nonrepudiation are equivalent. Accordingly, there are three security criteria: robustness, security against forging and security against repudiation. For simplicity, we just briefly present our results. For more detail, refer to Ref. Yin et al. (2016a).

1. Robustness. The robustness means the probability of an honest abort ϵrob\epsilon_{rob}. In messaging stage, Bob rejects the message sent by Alice when EBcu>TaE_{B}^{cu}>T_{a}. In the case of finite sample size, the robustness can be quantified by exploiting random sampling without replacement theorem Yin et al. (2020).

2. Security against forging. In a forgery attack, Bob sends the message he wishes to forge and its corresponding secret key {m,KBF,m}\{m,K_{BF,m}\} to Charlie. The forgery attack is successful if Charlie accepts Bob’s forged message. An honest Bob knows only about 14\frac{1}{4} of conclusive results in KA,muK_{A,m}^{u}. If Bob is an adversary, his optimal strategy is to acquire information of quantum states Charlie receives as much as possible, which is equivalent to the eavesdropping attack of Eve in four-state Scarani-Acin-Ribordy-Gisin 2004 (SARG04) QKD with two-photon source Scarani et al. (2004); Tamaki and Lo (2006); Yin et al. (2016b).

We assume only single-photon pairs that Alice sends to Bob and Charlie are secure. In this case, Bob and Charlie both receive a single-photon. Using Chernoff bound Chernoff (1952), the probability of a successful forgery attack εfor\varepsilon_{for} can be given by

εfor=exp[(EBF11Tv11)22EBF11n11cu],\varepsilon_{for}=\exp\left[-\frac{(E_{BF11}^{*}-T_{v11})^{2}}{2E_{BF11}^{*}}n^{cu}_{11}\right], (1)

where EBF11E_{BF11}^{*} is the expected value of minimum mismatch rate of conclusive results of the single-photon pair components between KA,muK_{A,m}^{u} and KBF,muK_{BF,m}^{u}, Tv11=Tvncu/n11cuT_{v11}=T_{v}n^{cu}/n^{cu}_{11} is the error rate threshold of single-photon pair, ncu=(1t)nμcn^{cu}=(1-t)n_{\mu}^{c} is the number of conclusive results in KC,muK_{C,m}^{u}, n11cu=(1t)sC11cμn^{cu}_{11}=(1-t)s_{C11}^{c\mu} is the number of single-photon pair components in KC,muK_{C,m}^{u} and sC11cμs_{C11}^{c\mu} is the number of events in which Bob and Charlie both receive a single-photon in μ\mu string and Charlie has a conclusive result.

To obtain the value of EBF11E_{BF11}^{*}, one should exploit decoy state method to estimate sC11cμs_{C11}^{c\mu} and tC11cμt_{C11}^{c\mu}, where tC11cμt_{C11}^{c\mu} is the number of events that Bob and Charlie both receive a single-photon in μ\mu string, Charlie has a conclusive result, and his classical bit is mismatching with Alice’s. We use nPλn_{P\lambda} to denote the number of detection events of the participant PP of intensity λ\lambda and mPαm_{P\alpha} to denote the number of mismatching bits. The expected value of parameter xx can be acquired by the variant of Chernoff bound Yin et al. (2020): x¯=x+β+2βx+β2\overline{x}^{*}=x+\beta+\sqrt{2\beta x+\beta^{2}} and x¯=xβ22βx+β24\underline{x}^{*}=x-\frac{\beta}{2}-\sqrt{2\beta x+\frac{\beta^{2}}{4}} with β=ln1ε1\beta=\ln\frac{1}{\varepsilon_{1}}, where ϵ1\epsilon_{1} is the failure probability of the Chernoff bound.

Separately consider the process that Alice sends pulses to Bob and to Charlie, we have

sC1cμpμeμν(μν)[μ2eνn¯Cνcpνν2eμn¯Cμcpμ+(ν2μ2)n¯C0cp0],s_{C1}^{c\mu^{*}}\geq\frac{p_{\mu}e^{-\mu}}{\nu(\mu-\nu)}\left[\mu^{2}e^{\nu}\frac{\underline{n}_{C\nu}^{c^{*}}}{p_{\nu}}-\nu^{2}e^{\mu}\frac{\overline{n}_{C{\mu}}^{c^{*}}}{p_{\mu}}+(\nu^{2}-\mu^{2})\frac{\overline{n}_{C0}^{c^{*}}}{p_{0}}\right], (2)

and

sB1μpμeμν(μν)[μ2eνn¯Bνpνν2eμn¯Bμpμ+(ν2μ2)n¯B0p0],s_{B1}^{\mu^{*}}\geq\frac{p_{\mu}e^{-\mu}}{\nu(\mu-\nu)}\left[\mu^{2}e^{\nu}\frac{\underline{n}_{B\nu}^{*}}{p_{\nu}}-\nu^{2}e^{\mu}\frac{\overline{n}_{B\mu}^{*}}{p_{\mu}}+(\nu^{2}-\mu^{2})\frac{\overline{n}_{B0}^{*}}{p_{0}}\right], (3)

where sB1μs_{B1}^{\mu} is the number of single-photon events in Bob’s μ\mu string and sC1cμs_{C1}^{c\mu} is is the number of conclusive single-photon events in Charlie’s μ\mu string. sC11cμs_{C11}^{c\mu^{*}} can be given by

sC11cμs¯C1cμ×s¯B1μn¯Bμ.s_{C11}^{c\mu^{*}}\geq\underline{s}_{C1}^{c\mu^{*}}\times\frac{\underline{s}_{B1}^{\mu^{*}}}{\overline{n}_{B\mu}^{*}}. (4)

Bring in Eqs.(2) (3), we have

sC11cμ\displaystyle s_{C11}^{c\mu^{*}} pμ2e2μν2(μν)2n¯Bμ[μ2eνn¯Cνcpνν2eμn¯Cμcpμ+(ν2\displaystyle\geq\frac{p_{\mu}^{2}e^{-2\mu}}{\nu^{2}(\mu-\nu)^{2}\overline{n}_{B\mu}^{*}}\left[\mu^{2}e^{\nu}\frac{\underline{n}_{C\nu}^{c^{*}}}{p_{\nu}}-\nu^{2}e^{\mu}\frac{\overline{n}_{C{\mu}}^{c^{*}}}{p_{\mu}}+(\nu^{2}-\right.
μ2)n¯C0cp0]×[μ2eνn¯Bνpνν2eμn¯Bμpμ+(ν2μ2)n¯B0p0].\displaystyle\left.\mu^{2})\frac{\overline{n}_{C0}^{c^{*}}}{p_{0}}\right]\times\left[\mu^{2}e^{\nu}\frac{\underline{n}_{B\nu}^{*}}{p_{\nu}}-\nu^{2}e^{\mu}\frac{\overline{n}_{B\mu}^{*}}{p_{\mu}}+(\nu^{2}-\mu^{2})\frac{\overline{n}_{B0}^{*}}{p_{0}}\right]. (5)

We also have

tC1cμpμμeμν(eνm¯Cνcpνn¯C0c2p0),t_{C1}^{c\mu^{*}}\leq\frac{p_{\mu}\mu e^{-\mu}}{\nu}(e^{\nu}\frac{\overline{m}_{C\nu}^{c^{*}}}{p_{\nu}}-\frac{\underline{n}_{C0}^{c^{*}}}{2p_{0}}), (6)

and

sB1μpμμeμν(eνn¯Bνpνn¯B0p0),s_{B1}^{\mu^{*}}\leq\frac{p_{\mu}\mu e^{-\mu}}{\nu}(e^{\nu}\frac{\overline{n}_{B\nu}^{*}}{p_{\nu}}-\frac{\underline{n}_{B0}^{*}}{p_{0}}), (7)

where tC1cμt_{C1}^{c\mu} is the number of single-photon errors of Charlie’s conclusive results in μ\mu string with respect to Alice. tC11cμt_{C11}^{c\mu^{*}} can be given by:

tC11cμt¯C1cμ×s¯B1μn¯Bμ.t_{C11}^{c\mu^{*}}\leq\overline{t}_{C1}^{c\mu^{*}}\times\frac{\overline{s}_{B1}^{\mu^{*}}}{\underline{n}_{B\mu}^{*}}. (8)

Bring in Eqs. (6) (7), we have

tC11cμpμ2μ2e2μν2n¯Bμ(eνm¯Cνcpνn¯C0c2p0)×(eνn¯Bνpνn¯B0p0).\displaystyle t_{C11}^{c\mu^{*}}\leq\frac{p_{\mu}^{2}\mu^{2}e^{-2\mu}}{\nu^{2}\underline{n}_{B\mu}^{*}}\left(e^{\nu}\frac{\overline{m}_{C\nu}^{c^{*}}}{p_{\nu}}-\frac{\underline{n}_{C0}^{c^{*}}}{2p_{0}}\right)\times\left(e^{\nu}\frac{\overline{n}_{B\nu}^{*}}{p_{\nu}}-\frac{\underline{n}_{B0}^{*}}{p_{0}}\right). (9)

3. Security against repudiation. Alice successfully repudiates the message when Bob accepts the message while Charlie rejects it, i.e., EBcu<TaE_{B}^{cu}<T_{a} and ECcu>TvE_{C}^{cu}>T_{v}. Alice does not know which bits are conclusive results for Bob (Charlie) and has to treat each bit in KB,mK_{B,m} and KC,mK_{C,m} with the same status. For Bob and Charlie, the difference between EBcuE_{B}^{cu} and ECcuE_{C}^{cu} can be restricted by inequalities of the relative Hamming distance. The upper bound of the relative Hamming distance between KB,mcuK_{B,m}^{cu} and KC,mcuK_{C,m}^{cu} (denoted by Δ¯BCcu\overline{\Delta}_{BC}^{cu}) can be given by using the random sampling without replacement theorem Yin et al. (2020). The probability of successful repudiation εrep\varepsilon_{rep} can be given by

εrep=exp[(APBcTa)22Anu],\varepsilon_{rep}=\exp\left[-\frac{\left(A-P_{B}^{c}T_{a}\right)^{2}}{2A}n^{u}\right], (10)

where AA is the solution of the following equation and inequalities:

[PCcTvPCc(Δ¯BCcuncu+APBc)]23PCc(Δ¯BCcuncu+APBc)=(APBcTa)22A,\frac{\left[P_{C}^{c}T_{v}-P_{C}^{c}\left(\frac{\overline{\Delta}_{BC}^{cu}}{n^{cu}}+\frac{A}{P_{B}^{c}}\right)\right]^{2}}{3P_{C}^{c}\left(\frac{\overline{\Delta}_{BC}^{cu}}{n^{cu}}+\frac{A}{P_{B}^{c}}\right)}=\frac{(A-P_{B}^{c}T_{a})^{2}}{2A}, (11)

with PBcTa<A<PBc(TvΔ¯BCcuncu)P_{B}^{c}T_{a}<A<P_{B}^{c}\left(T_{v}-\frac{\overline{\Delta}_{BC}^{cu}}{n^{cu}}\right).

The overall secrecy is:

εtot=11ϵ1+ϵ2+εfor+εrob+εrep,\varepsilon_{tot}=11\epsilon_{1}+\epsilon_{2}+\varepsilon_{for}+\varepsilon_{rob}+\varepsilon_{rep}, (12)

where ϵ2\epsilon_{2} is the failure probability of random sampling without replacement.

Refer to caption
Figure 3: Simulation of our QDS protocol. Numerically optimized signature rates are presented in logarithmic scale. The detection efficiency is 52%52\%, the dark counting rate is 1.3×1071.3\times 10^{-7}, the basis misalignment rate is 0.15%0.15\%, the insert loss is 1.21.2 dB, and the loss coefficient of fiber is 0.1940.194 dB/km.

IV Performance

In order to show the performance of our protocol, we simulate a fiber-based QDS system. Define signature rate R:=12NR:=\frac{1}{2N}, where 2N2N is the minimum number of pulses required to securely sign a one-bit message. Fig. 3 shows the signature rate RR as a function of transmission distance. We consider the case where channels between Alice-Bob and Alice-Charlie are symmetric.

The security bounds are set to εfor1010\varepsilon_{for}\leq 10^{-10}, εrob1010\varepsilon_{rob}\leq 10^{-10}, εrep1010\varepsilon_{rep}\leq 10^{-10} and ε1=ε2(1093×1010)/12\varepsilon_{1}=\varepsilon_{2}\leq(10^{-9}-3\times 10^{-10})/12. We numerically optimize the minimum number of pulses required to securely sign a one-bit message with the free parameters {μ,ν,pμ,pν,t}\{\mu,\nu,p_{\mu},p_{\nu},t\} by global search algorithm. For a fair comparison, we simulate the performance of the original protocol in Ref. Yin et al. (2016a) with the same experimental parameters. As shown in Fig. 3, the solid red line represents the signature rate of this work and the blue dashed line represents the original QDS protocol. Obviously, our protocol requires far less number of pulses to sign a one-bit message. Specifically, at 5050 km and 100100 km, our protocol requires 3.3×1083.3\times 10^{8} and 3.4×1093.4\times 10^{9} pulses to sign a one-bit message, but the protocol in Ref. Yin et al. (2016a) requires 3.8×10103.8\times 10^{10} and 3.7×10123.7\times 10^{12} pulses. The signature rate of our protocol is 2 or even 3 orders of magnitude higher than the original protocol at long distance.

Refer to caption
Figure 4: Comparison of our QDS protocol and orthogonal encoding based protocol Amiri et al. (2016). The security bounds and experiment parameters are the same as Fig. 3.

We also simulate the performance of orthogonal encoding based protocol Amiri et al. (2016) with the cost of symmetrization taken into consideration. Assume Bob and Charlie utilize three-intensity decoy-state BB84 QKD protocol to perform symmetrization. Define the effective signature rate Reff:=min{12N,RQKD6L}R_{{\rm{eff}}}:=\min\{\frac{1}{2N},\frac{R_{QKD}}{6L}\}, where LL is the length of key generated by key generation protocol in [17] and RQKDR_{QKD} is the secret key rate of QKD. Note that 6LRQKD\frac{6L}{R_{QKD}} is the number of pulses required for QKD to perform symmetrization Yin et al. (2017b). RQKDR_{QKD} is simulated by the key rate formula in Lim et al. (2014), where we choose error-correction efficiency f=1.22f=1.22, data post-processing block size N=1010N=10^{10}, secrecy εsec=1010\varepsilon_{sec}=10^{-10} and the same experimental parameters as Fig. 3.

Denote the angle between Alice-Bob and Alice-Charlie as θ\theta, the distance between Alice and Bob (Charlie) as DABD_{AB} (DACD_{AC}), and the distance between Bob and Charlie as DBCD_{BC}. In symmetric case, DAB=DACD_{AB}=D_{AC}, and DBC=2sin(θ2)DABD_{BC}=2\sin(\frac{\theta}{2})D_{AB}. At short distance where RQKDR_{QKD} is very high, ReffR_{{\rm{eff}}} is mainly determined by 12N\frac{1}{2N}. When θ\theta is close to π\pi, the transmission distance of QKD (DBCD_{BC}) increases much faster than DABD_{AB}. In this case, ReffR_{{\rm{eff}}} is determined by RQKD6L\frac{R_{QKD}}{6L} at long distance. We simulate the case of θ=23π\theta=\frac{2}{3}\pi and θ=π\theta=\pi. As shown in Fig. 4, the signature rate of Amiri et al. (2016) is higher than that of our protocol at short distance, but when distance between the two receivers is large, the signature rate will be severely limited by the low secret key rate of QKD in the symmetrization step. By contrast, our protocol decays much slower and has a significantly longer transmission distance.

In addition, the typical experimental parameters and corresponding signature rate of some recent QDS experiments are listed in Table. 1. This work shows a comparable performance with orthogonal encoding based protocol An et al. (2019) even though the latter does not execute the symmetrization step. We remark that the symmetrization step is essential to the complete protocol, as demonstrated in experiments Roberts et al. (2017); Yin et al. (2017b).

Table 1: Comparison of Parameters of Recent QDS Experiments
Ref. Yin et al. (2017a) Ref. Yin et al. (2017b) Ref. Roberts et al. (2017) Ref. Ding et al. (2020) Ref. An et al. (2019) This work
Protocol SARG04 MDI MDI BB84 BB84 SARG04
Repetition rate 75MHz 75MHz 1GHz 50MHz 1GHz 1GHz
Transmission distance 102 km 55.6 km 50 km 280 km 125 km 125 km
Security parameter 10910^{-9} 10710^{-7} 101010^{-10} 10510^{-5} 101010^{-10} 10910^{-9}
Signature time per bit (s) 66840 149987 45 21407 22.7 14.9
Symmetrization step No need Yes Yes Non-execution Non-execution No need

V Conclusion

In this paper, we have proposed a non-orthogonal encoding based efficient quantum digital signature protocol. A novel method called post-matching is applied, which can increase the signature rate from decaying with η2\eta^{2} to η\eta. Our protocol has a high signature rate and does not require the symmetrization operation thereby overcomes the major obstacles of existing QDS protocols. This protocol can be directly implemented with current commercially available QKD devices. Therefore, it should be the preferred solution to the application of QDS. This work is a great step for the development of quantum network with QDS. Moreover, we believe the key idea of post-matching method has the potential to be applied in various cryptographic tasks that require to establish multiparty correlations, such as multiparty quantum communication  Fu et al. (2015).

Funding

National Natural Science Foundation of China (61801420); Key Research and Development Program of Guangdong Province (2020B0303040001); Fundamental Research Funds for the Central Universities.

References

  • Diffie and Hellman (1976) W. Diffie and M. Hellman, IEEE Trans. Inf. Theory 22, 644 (1976).
  • Rivest et al. (1978) R. L. Rivest, A. Shamir,  and L. Adleman, Commun. ACM 21, 120 (1978).
  • Shor (1994) P. W. Shor, in Proceedings 35th Annual Symposium on Foundations of Computer Science (IEEE, 1994) pp. 124–134.
  • Bennett and Brassard (1984) C. H. Bennett and G. Brassard, in Proceedings of the Conference on Computers, Systems and Signal Processing (IEEE Press, 1984) pp. 175–179.
  • Ekert (1991) A. K. Ekert, Phys. Rev. Lett. 67, 661 (1991).
  • Shannon (1949) C. E. Shannon, Bell Syst. Tech. J. 28, 656 (1949).
  • Chen et al. (2009) T.-Y. Chen, H. Liang, Y. Liu, W.-Q. Cai, L. Ju, W.-Y. Liu, J. Wang, H. Yin, K. Chen, Z.-B. Chen, C.-Z. Peng,  and J.-W. Pan, Opt. Express 17, 6540 (2009).
  • Qi et al. (2019) R. Qi, Z. Sun, Z. Lin, P. Niu, W. Hao, L. Song, Q. Huang, J. Gao, L. Yin,  and G.-L. Long, Light Sci. Appl. 8, 22 (2019).
  • Pirandola et al. (2020) S. Pirandola, U. L. Andersen, L. Banchi, M. Berta, D. Bunandar, R. Colbeck, D. Englund, T. Gehring, C. Lupo, C. Ottaviani, J. L. Pereira, M. Razavi, J. S. Shaari, M. Tomamichel, V. C. Usenko, G. Vallone, P. Villoresi,  and P. Wallden, Adv. Opt. Photon. 12, 1012 (2020).
  • Gottesman and Chuang (2001) D. Gottesman and I. Chuang, arXiv preprint quant-ph/0105032  (2001).
  • Clarke et al. (2012) P. J. Clarke, R. J. Collins, V. Dunjko, E. Andersson, J. Jeffers,  and G. S. Buller, Nat. Commun. 3, 1174 (2012).
  • Dunjko et al. (2014) V. Dunjko, P. Wallden,  and E. Andersson, Phys. Rev. Lett. 112, 040502 (2014).
  • Collins et al. (2014) R. J. Collins, R. J. Donaldson, V. Dunjko, P. Wallden, P. J. Clarke, E. Andersson, J. Jeffers,  and G. S. Buller, Phys. Rev. Lett. 113, 040502 (2014).
  • Wallden et al. (2015) P. Wallden, V. Dunjko, A. Kent,  and E. Andersson, Phys. Rev. A 91, 042304 (2015).
  • Croal et al. (2016) C. Croal, C. Peuntinger, B. Heim, I. Khan, C. Marquardt, G. Leuchs, P. Wallden, E. Andersson,  and N. Korolkova, Phys. Rev. Lett. 117, 100503 (2016).
  • Yin et al. (2016a) H.-L. Yin, Y. Fu,  and Z.-B. Chen, Phys. Rev. A 93, 032316 (2016a).
  • Amiri et al. (2016) R. Amiri, P. Wallden, A. Kent,  and E. Andersson, Phys. Rev. A 93, 032325 (2016).
  • Puthoor et al. (2016) I. V. Puthoor, R. Amiri, P. Wallden, M. Curty,  and E. Andersson, Phys. Rev. A 94, 022328 (2016).
  • Yin et al. (2017a) H.-L. Yin, Y. Fu, H. Liu, Q.-J. Tang, J. Wang, L.-X. You, W.-J. Zhang, S.-J. Chen, Z. Wang, Q. Zhang, T.-Y. Chen, Z.-B. Chen,  and J.-W. Pan, Phys. Rev. A 95, 032334 (2017a).
  • Collins et al. (2017) R. J. Collins, R. Amiri, M. Fujiwara, T. Honjo, K. Shimizu, K. Tamaki, M. Takeoka, M. Sasaki, E. Andersson,  and G. S. Buller, Sci. Rep. 7, 3235 (2017).
  • Yin et al. (2017b) H.-L. Yin, W.-L. Wang, Y.-L. Tang, Q. Zhao, H. Liu, X.-X. Sun, W.-J. Zhang, H. Li, I. V. Puthoor, L.-X. You, E. Andersson, W. Zhen, Y. Liu, X. Jiang, X.-F. Ma, Q. Zhang, C. Marcos, T.-Y. Chen,  and J.-W. Pan, Phys. Rev. A 95, 042338 (2017b).
  • Roberts et al. (2017) G. Roberts, M. Lucamarini, Z. Yuan, J. Dynes, L. Comandar, A. Sharpe, A. Shields, M. Curty, I. Puthoor,  and E. Andersson, Nat. Commun. 8, 1098 (2017).
  • Zhang et al. (2018) C.-H. Zhang, X.-Y. Zhou, H.-J. Ding, C.-M. Zhang, G.-C. Guo,  and Q. Wang, Phys. Rev. Appl. 10, 034033 (2018).
  • Thornton et al. (2019) M. Thornton, H. Scott, C. Croal,  and N. Korolkova, Phys. Rev. A 99, 032341 (2019).
  • An et al. (2019) X.-B. An, H. Zhang, C.-M. Zhang, W. Chen, S. Wang, Z.-Q. Yin, Q. Wang, D.-Y. He, P.-L. Hao, S.-F. Liu, X.-Y. Zhou, G.-C. Guo,  and Z.-F. Han, Opt. Lett. 44, 139 (2019).
  • Ding et al. (2020) H.-J. Ding, J.-J. Chen, L. Ji, X.-Y. Zhou, C.-H. Zhang, C.-M. Zhang,  and Q. Wang, Opt. Lett. 45, 1711 (2020).
  • Zhang et al. (2020) C.-H. Zhang, Y.-T. Fan, C.-M. Zhang, G.-C. Guo,  and Q. Wang, arXiv preprint arXiv:2003.11262  (2020).
  • Wang et al. (2015) T.-Y. Wang, X.-Q. Cai, Y.-L. Ren,  and R.-L. Zhang, Sci. Rep. 5, 9231 (2015).
  • Wang et al. (2017) T.-Y. Wang, J.-F. Ma,  and X.-Q. Cai, Quantum Information Processing 16, 19 (2017).
  • Scarani et al. (2004) V. Scarani, A. Acin, G. Ribordy,  and N. Gisin, Phys. Rev. Lett. 92, 057901 (2004).
  • Wang (2005) X.-B. Wang, Phys. Rev. Lett. 94, 230503 (2005).
  • Lo et al. (2005) H.-K. Lo, X. Ma,  and K. Chen, Phys. Rev. Lett. 94, 230504 (2005).
  • Yin et al. (2020) H.-L. Yin, M.-G. Zhou, J. Gu, Y.-M. Xie, Y.-S. Lu,  and Z.-B. Chen, Sci. Rep. 10, 14312 (2020).
  • Tamaki and Lo (2006) K. Tamaki and H.-K. Lo, Phys. Rev. A 73, 010302 (2006).
  • Yin et al. (2016b) H.-L. Yin, Y. Fu, Y. Mao,  and Z.-B. Chen, Sci. Rep. 6, 29482 (2016b).
  • Chernoff (1952) H. Chernoff, Ann. Math. Stat. 23, 493 (1952).
  • Lim et al. (2014) C. C. W. Lim, M. Curty, N. Walenta, F. Xu,  and H. Zbinden, Phys. Rev. A 89, 022307 (2014).
  • Fu et al. (2015) Y. Fu, H.-L. Yin, T.-Y. Chen,  and Z.-B. Chen, Phys. Rev. Lett. 114, 090501 (2015).