Quantum key distribution relied on trusted information center 0 0 1Guihua Zeng, 2Zhongyang Wang, and 1Xinmei Wang 0 2 1National Key Lab. on ISDN, XiDian University, Xi’an 710071, China n a 2Shanghai Institute of Optics and Fine mechanics, Academia Sinica, J 3 P.O.Box 800-211, Shanghai 201800, China 1 1 v Abstract 5 4 0 Quantumcorrelationbetweentwoparticlesandamongthreeparticlesshownonclassicpropertiesthatcanbeused 1 0 forprovidingsecuretransmissionofinformation. Inthispaper,weproposetwoquantumkeydistributionschemesfor 0 quantumcryptographicnetwork,whichusethecorrelation propertiesoftwoandthreeparticles. Oneisimplemented 0 / by the Greenberger-Horne-Zeilinger state, and another is implemented by the Bell states. These schemes need a h p trusted information center like that in the classic cryptography. The optimal efficiency of theproposed protocols are - t n higher than that in theprevious schemes. a u PACS:03.67.Dd, 03.65.Bz, 03.67.-a q : v i X I. Introduction particular, quantum key distribution became especially r a importantduetotechnologicaladvanceswhichallowtheir Since the first finding that quantum effects may pro- implementation in laboratory. The first quantum key dis- tect privacy informationtransmitted in anopen quantum tributionprototype,workingoveradistanceof32centime- channel by S.Wiesner [1], and then by C.H.Bennett and tersin1989,wasimplementedbymeansoflasertransmit- G.Brassard [2], a remarkable surge of interest in the in- ting in free space [9]. Soon, experimental demonstrations ternational scientific and industrial community has pro- by optical fibber were set up [10]. Now the transmission pelled quantum cryptography into mainstream computer distance is extended to more than 30Km in the fiber [11], science andphysics. Furthermore,quantumcryptography and more than 205m in the free space [12]. is becoming increasingly practical at a fast pace. Quan- tumcryptographyisafieldthatcombinesquantumtheory Quantum key distribution is defined as a procedure withinformationtheory. Thegoalofthisfieldistousethe allowing legitimate two (multi-) users of communication law of physics to provide secure information exchange, in channel to establish exact two (multi-) copies, one copy contrast to classical methods based on (unproven) com- for each user, of a random and secret sequence of bits. plexity assumption. Current investigations of quantum Quantum key distribution employs quantum phenomena cryptography involve three aspects: quantum key distri- suchastheHeisenberguncertaintyprincipleandthequan- parties, who share no secret information initially, to com- protocol, called time-reserved EPR protocol, in which municate over an open channel and to establish between users prestore quantum states in a trusted center, where themselvesasharedsecretsequenceofbits. Thepresented their quantum states are preserved using quantum mem- QKDprotocolsareprovablysecureagainsteavesdropping ories. The main procedures are as follows: users store attack, in that, as a matter of fundamental principle, the quantumstatesinquantummemories,keptinatransmis- secret data can not be compromised unknowingly to the sion center. Upon request from two users, the center uses legitimate users of the channel. Several quantum key dis- two-bitgatestoprojecttheproductstateoftwononcorre- tribution protocols have been proposed, all these proto- latedparticles(one fromeachuser)ontoafully entangled cols can be classed into two kinds. i) The point-to-point state. As a result, the two users can share a secret bit, (two parties) quantum key distribution (pQKD). Three which is unknown even to the center. The time-reserved main protocols of these are the BB84 protocol [3], B92 EPRprotocolwasproposedtobeusedinaquantumcryp- protocol [4] and EPR protocol [5-7]. ii) The networking tographic networking (QCN). The implementation of the quantumkeydistribution(nQKD),e.g.,thetime-reserved time-reserved EPR scheme needs four particle for obtain- EPR protocol [8]. The physical implementation may be ing one qubit. One may ask that whether the nQKD refer to Townsend’s works [13,14]. scheme may be implemented by three or two particle or not? InthispaperweproposeseveralQKDprotocolsthat For the pQKD scheme, the first quantum key distribu- use three or two particles to obtain one qubit. These pro- tion scheme, i.e., the Bennett Brassard (BB84) scheme, tocols can also be used in networking QKD. waspresentedadecadeago. Itisimplementedbythefour states , , , , where any of the two states In this work we suggest two nQKD schemes. The sug- {| ↑i | ↓i | րi | ցi} , andanyofthe twostates , arenon- gested schemes need three parties: the trusted informa- {|↑i |↓i} {|րi |ցi} commuted, , may be any orthogonal states of tion center and two users, by conventional called Alice {| ↑i | ↓i} two-dimensional Hilbert space. Its security is warranted and Bob, here the center is trusted. One scheme is im- by the uncertainty principle of quantum mechanics. In plementedbytheGreenberger-Horne-Zeilinger(GHZ)[26] 1992,Bennett devisedanother protocol,i.e., the B92 pro- triplet state, we call this protocol as GHZ-nQKD proto- tocol,whichisbasedonthetransmissionofnonorthogonal col,inwhichthecenter’sroleistomeasurehis/herparticle quantum states. This protocol uses any two nonorthogo- (from the GHZ triplet) by the random measurement like nalstatestoimplementtheQKD.Itssecurityreliesonthe thatinBB84protocol,andtellAliceandBobthemeasure- no-cloning of unknown two-nonorthogonal states. A fur- ment results. Another is implemented by the Bell states, ther elegantscheme has been proposedby Ekert,which is we call it as Bell-nQKD protocol. This scheme needs the implementedbytheEinstein-Podolsky-Rosen(EPR)pairs center to measure the two-particle entanglement system [24]. It is called the EPR protocol which relies on the vi- by the Bell operators or the linear combination of Bell olation of the Bell inequalities [25] to provide the secret operatorsbefore Alice’s andBob’smeasurementandsend security. Considerthetwo-particlecorrelation,Bennettet the users his/her results. By the center’s assistance, the al presented a modified version, in which the security is userscanobtainthesecretkey,thecheatingcenteraswell review the two-particle maximally entangled states, the 1 so-called Bell states and the three-particle maximally en- Φ+ = (z+ z + z z+ ), (4) c a b a b | i √2 | i | −i | −i | i tangledstates,the so-calledGHZ triple state. In addition weinvestigatethecorrelationpropertiesoftheGHZtriplet 1 and the Bell states. In Sec. III, we propose three proto- Φ− c = (z+ a z b z a z+ b), (5) | i √2 | i | −i −| −i | i cols, which are implemented by the GHZ triplet. The where the subscripts c,a,b denote the states for the in- efficiencies of these protocols are different, but they are formation center and the two communicators Alice and more practical, especially the protocol 3. The securities Bob. These Bell states can be generated from a type- of these protocols are analyzed. In Sec. IV, we propose II parametric down-conversion crystal [28]. Define the x two protocols implemented by the Bell states. The secu- eigenstates rities of these protocols are investigated. In Sec. V, we discusstheapplicationsofourprotocolsinnetworkQKD. 1 x+ = (z+ + z ), (6) Conclusions are presented in Sec VI. | i √2 | i | −i II. The Bell states and the GHZ triplet states 1 x = (z+ z ), (7) First we review the two and three particles entangle- | −i √2 | i−| −i ment states. In general, N-particle entanglement states the four Bell states can be rewritten as may be written as [27] 1 Ψ+ = (x+ x+ + x x ), (8) N N | ic √2 | ia| ib | −ia| −ib |ψi=Y|uii±Y|ucii, (1) i=1 i=1 whereu standsforabinaryvariableu z+ , z and i i ∈{| i | −i} 1 Ψ = (x+ x + x x+ ), (9) uc =1 u , z+ and z denote the spin eigenstates,or | −ic √2 | ia| −ib | −ia| ib i − i | i | −i equivalentlythehorizontalandverticalpolarizationeigen- states, or equivalently any two-level system. For N = 2 1 Φ+ = (x+ x+ x x ), (10) c a b a b | i √2 | i | i −| −i | −i they reduce to the Bell states and N =3 and N =4 they represent the GHZ states. For a general N we shall call- 1 ing them cat states. In this paper, we are interested in Φ = (x x+ x+ x ), (11) − c a b a b | i √2 | −i | i −| i | −i the case of N =2 and N =3, i.e., the Bell states and the As should be noted, for example, the Ψ+ states give GHZ triplet state. | i correlated results in both the z and x bases, but the 1. Bell states Ψ state give correlated results in the z basis, but an- − | i ticorrelated results in the x basis. Summarizing these Eq.(1) reduces to the Bell states when N =2 correlated or anticorrelated results of the Bell states Ψ+ c = 1 (z+ a z+ b+ z a z b), (2) {Ψ+,Ψ−,Φ+,Φ−} in the z and x bases, we get the fol- | i √2 | i | i | −i | −i lowing table: Trent |Ψ+i |Ψ−i |Φ+i |Φ−i |φ−ic = √12(|x+ia|z−ib−|x−ia|z+ib) (15) Alice x+ x+ x+ x | i | i | i | −i Bob |x+i |x−i |x+i |x+i √12(|z+ia|x−ib+|z−ia|x+ib), Alice x x x x+ We note that the set of states Φ+,Ψ−,φ−,ψ+ have the | −i | −i | −i | i { } Bob x x+ x x following correlated or anticorrelatedresults | −i | i | −i | −i Alice z+ z+ z+ z+ | i | i | i | i Table II. The correlationof states Φ+,Ψ ,φ ,φ+ − − { } Bob z+ z+ z z | i | i | −i | −i Trent Φ+ Ψ φ ψ+ − − Alice z z z z | i | i | i | i | −i | −i | −i | −i Alice x+ x+ x+ x+ Bob z z z+ z+ | i | i | i | i | −i | −i | i | i Bob x+ x z z+ | i | −i | −i | i From Table I it is clear that after the center has pro- Alice x x x x | −i | −i | −i | −i jected the two-particle entanglement system onto any of Bob x x+ z+ z | −i | i | i | −i the four Bell states Ψ+,Ψ ,Φ+,Φ , the state of any of Alice z+ z+ z+ z+ { − −} | i | i | i | i two particles do not give determined results. For exam- Bob z z+ x x+ | −i | i | −i | i ple, ifthe center’smeasurementbasisis Ψ+ , the state of Alice z z z z | i | −i | −i | −i | −i any of two particles may be x+ ,or x with the prob- Bob z+ z x+ x | i | −i | i | −i | i | −i ability 1, or z+ or z with the probability 1. Even if 2 | i | −i 2 Thistable showsthe states Φ+,Ψ ,φ ,ψ+ alsohave − − { } Alice has measured her particle and announced her mea- the correlation properties in x and z direction. If the surementbasis,anyone,including Bob,cannotknowsAl- centerprojectsthetwo-particleentanglementsystemonto ice’s results, because the probability of making error is 1. 2 anyofthefourbases Φ+,Ψ ,φ ,ψ+ ,andsendsrespec- − − { } However if the center’s bases are public announced, Alice tivelyAliceandBoboneoftwo-particleentanglement,Al- knows the Bob’s qubits and vice versa. These properties ice’sandBob’sparticleshaveyetnotadeterminedresults maybe usedto distribute the quantumkeybetweenAlice beforetheirmeasurement. Forexample,ifthecentermea- and Bob by the assistance of the trusted center. sure the two-particle system using the base φ , Alice’s − BythefourBellstates(Eq.2-Eq.5)onemayobtainother measurement may be x+ or x if she measures her | i | −i correlated or anticorrelated results. Define a line combi- particleusexbasis. BeforeAlicerevealshermeasurement nation of Bell states as bases, anyone can not know Alice’s results, even if Bob. However,ifAliceandBobknowthestatemeasuredbythe 1 ψ+ = (Ψ + Φ+ ), (12) center and their measurement directions are determined, c − c c | i √2 | i | i they can judge the qubits each other. 1 ψ = (Ψ Φ+ ). (13) − c − c c | i √2 | i −| i 2. GHZ triplet states One may get Eq.(1) reduces to eight GHZ triplet states for N = 3. ψ+ = 1 (x+ z+ + x z ) In this paper we use the following state | ic √2 | ia| ib | −ia| −ib Suppose the center, Alice and Bob share one particle Table III. The correlation results of the GHZ triplet each from a three-particle entangled GHZ state, then the states GHZ state may be represented by Trent x+ x y+ y | i | −i | i | −i Alice x+ x+ x+ x+ | i | i | i | i 1 Bob x+ x y y+ ψ = (z+ c z+ a z+ b+ z c z a z b), (17) | i | −i | −i | i | i √2 | i | i | i | −i | −i | −i Alice x x x x | −i | −i | −i | −i where the first particle is that of the center, the second Bob x x+ y+ y | −i | i | i | −i that of Alice, and the third that of Bob. Define the y Alice y+ y+ y+ y+ | i | i | i | i eigenstates Bob y y+ x x | −i | i | −i | −i Alice y y y y 1 | −i | −i | −i | −i y+ = (z+ +iz ), (18) | i √2 | i | −i Bob y+ y x+ x | i | −i | i | −i ThetableIIIshowsseveralpropertiesoftheGHZtriplet 1 y+ = (z+ iz ), (19) state: i) anyone of the three parties, i.e., the center, Alice | i √2 | i− | −i and using the x eigenstates defined in Eq.(6,7), the GHZ or Bob, can determine whether the other two participa- triplet state can be rewritten as tors’ results are the same or opposite and also that he (she) will gain no knowledge of what their results actu- |ψi= 12[(|x+i|x+i+|x−i|x−i)|x+i ally are, if he (she) knows what measurements have been (20) made by the other two participators (that is x or y). ii) +(x+ x + x x+ )x ], From table III it is clear that allows two parties jointly, | i| −i | −i| i | −i or butonlyjointly,todeterminewhichwasthemeasurement ψ = 1[(y+ y + y y+ )x+ | i 2 | i| −i | −i| i | i outcome of the third party. So if the measurement direc- (21) tions of the three participators are public, the combined +(x+ x + x x+ )x ], | i| −i | −i| i | −i results of any two participators can determine what the or ψ = 1[(y+ x + y x )y+ result of the third party’s measurement was. | i 2 | i| −i | −i| −i | i (22) III. GHZ-nQKD protocols +(y+ x+ + y x )y ], | i| i | −i| −i | −i GHZ states has already found a number of uses. They or ψ = 1[(x+ y + x y+ )y+ formthebasisofaverystringenttestoflocalrealisticthe- | i 2 | i| −i | −i| i | i (23) ories. Itwasalsoproposedthattheycanbeusedforcryp- +(x+ y+ + x y )y ]. tographic conferencing or for multiparticle generations of | i| i | −i| −i | −i The above decomposition demonstrates the correlation superdense coding [27]. In addition, related states can amongthreeparticles. Forexample,inEq.(20)ifonepar- be used to reduce communication complexity. Recently, ticle is in the state x+ and the second particle is in the it wasproposedthat they canbe used for quantum secret | i state x+ , the third particle must be in the state x+ sharingandquantuminformationsplit[19]. Inthispaper, | i | i because of the correlation of the GHZ triplet state. By we use the GHZ state to distribute quantum key between A. The protocols particles, either in the x or y direction, but the efficiency is low by this way, because these results measured along As discussed in Sec. II, the GHZ state has correlation y direction have no use in this protocol and a half parti- properties that if only one communicator’s measurement cles will be discarded, the efficiency is only 12.5%. The results is announced, the states of other two particles are center’s measurement collapses the GHZ triplet state to still not determined, but two communicators’ results can be a two-particle system. The state of the two-particle determine the third result. These properties may be used entanglementisnotdetermined,becausetheymaybeany in the QKD relying on a third party. Let us now show of the states how to implement our quantum key distribution scheme 1 bythe GHZstate. Thereareseveralwayto distributethe Ψ1 ab = (x+ x+ + x x ), | i √2 | i| i | −i| −i communicators the key by the center’s assistance. 1 Ψ2 = (x+ x + x x+ ), Protocol 1 | iab √2 | i| −i | −i| i 1 Ψ3 = (y+ y + y y+ ), 1. The center measures his GHZ particle in the x direc- ab | i √2 | i| −i | −i| i tion and obtains the result x+ or x 1 | i | −i Ψ4 = (y+ y+ + y y ). ab | i √2 | i| i | −i| −i 2. The center tell Alice and Bob his measurement re- In step 4, we use the correlation properties of the GHZ sults. states to checkthe eavesdropping. Having measuredtheir particles, Bob randomly chooses a subset of qubits from 3. Alice andBob makerespectively therandom measure- his qubits and sends this subset to Alice. Alice compares ment on their GHZ particles, either in the x or y di- the corresponding results from the center, Bob and Alice. rection. If these results are correlation results, which are satisfy 4. Checktheeavesdroppingbyusingthecorrelationprop- Eqs.(20-23)orthecorrelationofthreestatesisinthetable erties of the GHZ states. III, the results are perfect, otherwise it means eavesdrop- 5. Alice and Bob compare their bases. If their measure- ping or disturbed by noise. mentbasesaresame,AliceandBobkeeptheirresults, In step 5, Alice and Bob compare their bases. Because otherwise they discard their results. Alice and Bob randomly measure their particles either in the x or y direction, some of their bases are different and 6. Alice and Bob obtain the final key by using the data some are same. If their bases are different, Alice’s and sifting, the error correction and the privacy amplifi- Bob’s results are no correlation, thus Alice can not know cation technologies. Bob’s qubits and vice versa,in this case they need to dis- In this protocol, we let the center firstly measures his card these results. However if their bases are same, their particlefromtheGHZtriplet,andonlymeasureitinthex results are correlated, Alice and Bob keep these results. direction. The center’sresults willbe x+ or x . After So this protocol discards the results that corresponds the | i | −i the center has finished the measurement, Alice and Bob different bases. measure their particles. This protocol only uses the cor- The rawquantum keydistribution is useless in practice even in the absence of eavesdropping. For these reasons, 7. Alice and Bob gain the final key by using the data our scheme needs to supplement some classicaltools such sifting, the error correction and privacy amplification as the privacy amplification, the error correction and the technologies. data sifting, so we use these technologies in our protocol. The protocol 2 lets the center measure his/her particle The implementation of these supplemented classic tools either in the x or y direction. It is stresses that here are the same as in the previous documents [9]. the center’s allmeasurementresults are useful. When the In quantumkey distribution somequbits (henceforth l) center’s result is the state x+ or x , Alice and Bob | i | −i will be wasted because of the loss and the inexactitude of need to keep the results which have the same bases, but equipment, so in order to be left with a key of L qubits if the center’s result is y+ or y , the communicators the center 1 shouldprepareL >2(L+l). In this casethe | i | −i ′ discardtheresultswhichhavethesamebases. Thereason efficiency is is that the results must be correlated or anticorrelated. L η1 = <50%. (24) 2(L+l) This step is finshed in the step 5. Thisefficiencyislargerthanthatofthetime-reservedEPR ItneedstostressthatAlice’sresultsmustbe consistent protocol, which is with Bob’s results forgetting the rawquantum key,sowe L havethestep6. BythepropertiesoftheGHZtripletstate, η′ = <12.5%. (25) 8(L+l) Alice(Bob)canjudgeBob’s(Alice’s)resultsbycombining Protocol 2 her (his) and the center’s results. But the table III can notgivecompletelyasameresultsalthoughAliceandBob 1. The center measures his GHZ particle either in the can know the qubits each other. For example, when the x or y direction and obtains any of the four states center’sandAlice’sresultsarerespectively y+ and x+ , x+ , x , y+ , y | i | i {| i | −i | i | −i} Bob’s result should be y , obviously, Alice’s and Bob’s | −i 2. The center tells Alice and Bob his measurement re- results are different. For obtaining a same key, Alice’s sults. (Bob’s) results need to be consistent with Bob’s (Alice’s) 3. Alice and Bob make respectively a random measure- results. ThemethodisthatAlice(Bob)transfersher(his) ment on their GHZ particles, either in the x or y qubits to binary bits according to Bob’s (Alice’s) results. direction. Theefficiencyofthisprotocolisthesameastheprotocol 1. After the center announced his results, Alice and Bob 4. Checking the eavesdropping like protocol 1. have a possibility of 1/2 to obtain the correct results by 5. Alice and Bob compare their bases. If the center’s therandommeasurement. Considerthewastedqubits(l), result is x+ or x and their measurement bases inordertobeleftwithakeyofLqubitsthecentershould | i | −i are same, or if the center’s result is y+ or y and send L >2(L+l), the efficiency | i | −i ′ their measurement bases are different, Alice and Bob L η2 = <50%. (26) keep their results, otherwise they discard the results. 2(L+l) Protocol 3 6. Alice makes her results to be consistent with Bob’s direction. step6. Considerthewastedqubits(l)inthemeasurement and the loss in the quantum channel, in order to be left 2. Alice and Bob send their measurement bases (x or y) withakeyofLqubitsthecentershouldsendL >(L+l), ′ to the center, but not the qubit values. the efficiency is 3. The center randomly measures his particle according L to Alice’s and Bob’s measurement bases. If both Alice η3 = (L+l) <100%. (27) and Bob measure their particle using the same mea- B. security analysis surement basis, e.g. x or y direction, the center mea- sures his particle using the x measurement basis, oth- These presented schemes are secure against eavesdrop- erwise, the center measures his particle using the y ping. Their securities are warranted by the correlation of measurement basis. the GHZ triplet. To see these in a sufficient way, we will consider several possible eavesdropping in the following. 4. The centerannounces his measurementresults, which is any of the four states x+ , x , y+ , y . 1. The cheating center’s attacks {| i | −i | i | −i} 5. Check eavesdropping like the protocol 1. The cheatingcenter is impossible to knowthe quantum key. From the table III it is clear that if the center knows 6. Alice and Bob judge the quantum state each other ac- what measurements bases Alice and Bobmade (that is, x cording to table III. While the center announces his ory),hecandeterminewhethertheirresultsarethe same results, both Alice and Bob know the center’s results. or opposite and also that the center will gain no knowl- Then the Alice’s (Bob’s) and the center’s results can edge of what Alice’s and Bob’s actually are, because the jointly determine what is the Bob’s (Alice’) measure- cheating center will has the probability of 1/2 of making ment outcome. a mistake. If the center makes measurement on the three 7. Alice and Bob obtain a sharing key by using the data particles of the GHZ triplet, then send these particles to sifting, the error correction and privacy amplification AliceandBob,thecenter’smeasurementwillintroduceer- technologies. rors in Alice’s and Bob’s results, thus Alice and Bob can The important point is that Alice and Bob randomly check it like the four-state BB84 protocol. Of course, a measure their GHZ particles before the center’s measure- cheating center may use the men-in-middle attack [29] to ment in this protocol, it is different from the protocols obtainthekeyK andK ,whereK representsthekey ca cb ca 1 and 2, in which the center’s measurement is completed betweenAliceandthecheatingcenter,andK represents cb before Alice’s and Bob’s measurement. This change im- the key between Bob and the cheating center. For pre- proves the efficiency of this protocol, because the center venting this attacks,Alice and Bob may verify their iden- may measure his particle according to Alice’s and Bob’s tity using the identity verification technology [30]. This measurement bases. Although there are the situations method needs a sharingkey between Alice andBob, how- that Alice’s and Bob’s results are different, all their mea- ever, Alice and Bob, in general, have not sharing key, so surement states are useful. The correlation of the GHZ this case needs the center to be trustworthy like the key the key distribution center (KDC) which is often used in If Eve can gain Alice’s (Bob’s) qubits, she can obtain the the classic cryptography, but here the center process the key. However, Eq.(30) shows that Eve can not obtain qubits not the binary bits. the results. By the similar method, Eve can not obtain Alice’s (Bob’s) qubits when the GHZ triplet states satisfy 2. Intercept/resend attacks Eqs.(21-23). Letusnowconsidertheintercept/resendattackdefined IV. Bell-nQKD protocols in [9]. Suppose that the eavesdropper, by convention de- notedbyEve,hasmanagedtogetaholdofAliceandBob’s The above schemes are efficient, however they need key,shetheninterceptsacommunicator’s(e.g. Alice)par- three particles. Can we implement the network QKD ticle from the center and send another particle to Alice. scheme only by using two particles? In this section we Inthiscase,threeparticlesofthecenter,BobandtheEve investigate the two-particle schemes. In the following we constructaGHZtriplet. However,becausetheAlice,Bob show that one can also use the Bell states to implement and the center’s particles are not the GHZ triplet, there the above quantum key distribution procedure. are no correlated or anticorrelated result, Eve’s intercep- tionwillintroduceerrorandcanbe detectedbyAlice and A. protocol Bob when they check the eavesdropping. In Sec. II, we see that the two particles of the Bell 3. The entanglement attacks states or the linear combination of Bell states have corre- lationproperties,they aredemonstratedintable I andII. The entanglement attacks is no use in our protocol. To ThesepropertiesmaybeusedintheQKDreliedonathird show that, Let us assume that the eavesdropper has been party. Let us now show how to implement the quantum able to entangle an ancilla in state A with the GHZ | i key distribution by Bell states. triplet state that Alice and Bob are using. The state de- Protocol 4 scribing the state of the GHZ triplet and the ancilla is 1 1. Thecenterpreparesasetoftwo-particleentanglement Ψ = (z+z+z+ + z z z ) A . (28) | i √2 | i | − − −i ⊗| i pairs and projects each pair onto any of the four Bell By using the x and y eigenstates and Eq.(20), The eaves- bases. dropper get 2. The center sends respectively Alice and Bob one of the two-particles entanglement and his measurement U|Ψi= 21(|x+x+i⊗|x+i⊗|A1i+|x−x−i⊗|x+i⊗|A2i results. +x+x x A3 + x x+ x A43).. Aliceand Bob make respectively the random measure- | −i⊗| −i⊗| i | − i⊗| −i⊗| i (29) ment on their particle, either in the x or z direction. whereU denotetheunitarytransformation. Byprojecting theabovestateonto φ =α1 x+x+ +α2 x x +α3 x+ 4. Alice and Bob check the eavesdropping by using the | i | i | − −i | x +α4 x x+ , the eavesdropper creates the states correlation of Bell states. −i | − i 6. Alice and Bob obtain a sharing key by using the data 6. Alice makes her results be consistent with Bob’s re- sifting, the error correction and the privacy amplifi- sults. cation technologies. 7. Alice and Bob obtain a sharing key by using the data This scheme is similar to the time-reservedEPR proto- sifting, the error correction and privacy amplification col,but there areseveralimportantdissimilarities. i)The technologies. time-reservedEPRprotocolusesfourparticleandtwopar- This protocol is similar to the protocol2, but there are ticles were prestoredin a transmissioncenter,where their two dissimilarities: 1) The implementation of protocol 2 quantum states are preserved using quantum memories. uses the GHZ triplet state, which needs three particles to Our scheme uses two particles and need not the quantum obtain one qubit. The center’s measurement result is one memories. ii)Theefficiencyofthetime-reservedEPRpro- of the state x+ , x , y+ , y . But the protocol 5 tocol is η <12.5%, but the efficiency of our protocol is {| i | −i | i | −i} ′ uses the Bell states which only use two particles, the cen- L η4 = <50%. (31) ter’s results is one of the states Φ+ , Ψ , ψ+ , φ . 2(L+l) {| i | −i | i | −i} 2) The methods for checking eavesdropping are different. iii)Thecenteronlyusesresultsofthesingletstatesandits Protocol2usesthecorrelationoftheGHZstates,andhere correlation properties in the time-reserved EPR protocol, protocol 5 uses the correlation demonstrated in the table but the center uses all quantum states in our scheme. II. WecanalsousethetableIItodesignanQKDprotocol. Accordingtotheprotocol5,weseetheefficiencyissame The protocol goes as follows as protocol 2: Protocol 5 L 1. Thecenterpreparesasetoftwo-particleentanglement η5 = <50%. (32) 2(L+l) pairs andprojects eachpair ontoanyofthefourbases B. security analysis Φ+,Ψ ,φ ,ψ+, . − − { } In term of eavesdropping possibilities, protocols 4 and 2. The center sends respectively Alice and Bob one of 5 have same security with the EPR protocol. After the the two-particles entanglement and his measurement center has measured the two-particle entanglement sys- results. tems by using any Bell operators or the linear combi- 3. Alice andBob makerespectively therandom measure- nation Bell operators, Alice and Bob’s particles are two- ment on their particle, either in the x or z direction. particleentanglementpairs,whichisoneofthefourstates 4. Check the eavesdropping by using the correlation Ψ+ , Ψ− , Φ+ , Φ− , or Φ+ , Ψ− , φ− , ψ+ , . It {| i | i | i | i } {| i | i | i | i } demonstrated in Table II. has the same correlation as the EPR pair, this is there- fore equivalent to the EPR scheme. So the cheating cen- 5. Alice and Bob compare their bases. If the center’s re- ter as well as the eavesdropper can not eavesdropthe key sult is one of the Bell states Φ+ , Ψ and their − {| i | i} from the protocols 4 and 5 by the currently eavesdrop- measurement bases are same, or if the center’s result ping technologies, e.g., the intercept/resend attacks, the is one of the states ψ+ , φ and their measure- − {| i | i} entanglement attacks etc..