Quantum Key Distribution by Quantum Energy Teleportation

📅 2025-06-01
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
To address the weak collusion resistance and difficulty in detecting malicious participants in multi-party quantum key distribution (QKD), this paper introduces quantum energy teleportation (QET) into the QKD framework for the first time. We propose an energy-carrier-free key distribution protocol based on entangled states and local operations, extended to a verifiable N-party secure information sharing scheme. Our core contribution is a novel energy–information co-security mechanism, achieved through multi-partite QET protocol design, noise modeling, and joint classical–quantum channel analysis—enabling provably detectable identification of any number of dishonest participants in the information-theoretic sense. We formally prove that the scheme remains secure under both classical and quantum channel noise, thereby significantly enhancing the robustness, practicality, and trustworthiness of multi-party QKD.

Technology Category

Application Category

📝 Abstract
Quantum energy teleportation (QET) is a process that leverages quantum entanglement and local operations to transfer energy between two spatially separated locations without physically transporting particles or energy carriers. We construct a QET-based quantum key distribution (QKD) protocol and analyze its security and robustness to noise in both the classical and the quantum channels. We generalize the construction to an $N$-party information sharing protocol, possessing a feature that dishonest participants can be detected.
Problem

Research questions and friction points this paper is trying to address.

Develops QET-based quantum key distribution protocol
Analyzes security and noise robustness in channels
Extends to N-party protocol with cheat detection
Innovation

Methods, ideas, or system contributions that make the work stand out.

QET transfers energy via quantum entanglement
QET-based QKD ensures secure key distribution
N-party protocol detects dishonest participants
🔎 Similar Papers
No similar papers found.