{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:23:02Z","timestamp":1760239382963,"version":"build-2065373602"},"reference-count":31,"publisher":"MDPI AG","issue":"21","license":[{"start":{"date-parts":[[2020,11,7]],"date-time":"2020-11-07T00:00:00Z","timestamp":1604707200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61771236"],"award-info":[{"award-number":["61771236"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2017YFA0303700"],"award-info":[{"award-number":["2017YFA0303700"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Major Program of National Natural Science Foundation of China","award":["11690030","11690032"],"award-info":[{"award-number":["11690030","11690032"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>We present an innovative method for quantum two-party cryptography. Our protocol introduces joint measurement and error estimation to improve the security of two-party cryptographic protocols. Our protocol removes the assumption of the attacker\u2019s limited power and catches the attacking actions through highly estimated bit error rate. Our protocol is formally proved to be secure against both eavesdroppers and dishonest communication parties. We also utilize our designed protocol to construct two specific two-party cryptographic applications: Quantum bit commitment and quantum password identification.<\/jats:p>","DOI":"10.3390\/s20216351","type":"journal-article","created":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T19:03:37Z","timestamp":1604862217000},"page":"6351","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Measurement-Device-Independent Two-Party Cryptography with Error Estimation"],"prefix":"10.3390","volume":"20","author":[{"given":"Zishuai","family":"Zhou","sequence":"first","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210046, China"}]},{"given":"Qisheng","family":"Guang","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210046, China"}]},{"given":"Chaohui","family":"Gao","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210046, China"}]},{"given":"Dong","family":"Jiang","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210046, China"},{"name":"School of Internet, Anhui University, Hefei 230039, China"}]},{"given":"Lijun","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210046, China"}]}],"member":"1968","published-online":{"date-parts":[[2020,11,7]]},"reference":[{"key":"ref_1","unstructured":"Bennett, C.-H., and Brassard, G. (2020). Quantum cryptography: Public key distribution and coin tossing. arXiv."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1962","DOI":"10.1109\/TIT.2011.2177772","article-title":"Unconditional security from noisy quantum storage","volume":"58","author":"Konig","year":"2012","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1447","DOI":"10.1103\/PhysRevLett.83.1447","article-title":"Unconditionally secure bit commitment","volume":"83","author":"Kent","year":"1999","journal-title":"Phys. Rev. Lett."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/S0167-2789(98)00053-0","article-title":"Why quantum bit commitment and ideal quantum coin tossing are impossible","volume":"120","author":"Lo","year":"1998","journal-title":"Phys. D Nonlinear Phenom."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"3414","DOI":"10.1103\/PhysRevLett.78.3414","article-title":"Unconditionally secure quantum bit commitment is impossible","volume":"78","author":"Mayers","year":"1997","journal-title":"Phys. Rev. Lett."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"3410","DOI":"10.1103\/PhysRevLett.78.3410","article-title":"Is quantum bit commitment really possible?","volume":"78","author":"Lo","year":"1997","journal-title":"Phys. Rev. Lett."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"022316","DOI":"10.1103\/PhysRevA.78.022316","article-title":"Possibility, impossibility, and cheat sensitivity of quantum-bit string commitment","volume":"78","author":"Buhrman","year":"2008","journal-title":"Phys. Rev. A"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1103\/RevModPhys.76.93","article-title":"Quantum information and relativity theory","volume":"76","author":"Peres","year":"2004","journal-title":"Rev. Mod. Phys."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"130501","DOI":"10.1103\/PhysRevLett.109.130501","article-title":"Unconditionally secure bit commitment by transmitting measurement outcomes","volume":"109","author":"Kent","year":"2012","journal-title":"Phys. Rev. Lett."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"010504","DOI":"10.1103\/PhysRevLett.112.010504","article-title":"Experimental unconditionally secure bit commitment","volume":"112","author":"Liu","year":"2014","journal-title":"Phys. Rev. Lett."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"157901","DOI":"10.1103\/PhysRevLett.92.157901","article-title":"Cheat sensitive quantum bit commitment","volume":"92","author":"Hardy","year":"2004","journal-title":"Phys. Rev. Lett."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"135302","DOI":"10.1088\/1751-8113\/48\/13\/135302","article-title":"Quantum bit commitment with cheat sensitive binding and approximate sealing","volume":"48","author":"Li","year":"2015","journal-title":"J. Phys. A Math. Theor."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/s11128-013-0566-0","article-title":"Cheat sensitive quantum bit commitment via pre- and post-selected quantum states","volume":"13","author":"Li","year":"2014","journal-title":"Quantum Inf. Process."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"022308","DOI":"10.1103\/PhysRevA.84.022308","article-title":"Cheat-sensitive commitment of a classical bit coded in a block of m \u00d7 n round-trip qubits","volume":"84","author":"Shimizu","year":"2011","journal-title":"Phys. Rev. A"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Menezes, A. (2007). Secure identification and qkd in the bounded-quantum-storage model. Advances in Cryptology-CRYPTO 2007, Springer.","DOI":"10.1007\/978-3-540-74143-5"},{"key":"ref_16","unstructured":"Wehner, S., and Wullschleger, J. (2007). Composable security in the bounded-quantum-storage model. arXiv."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"032308","DOI":"10.1103\/PhysRevA.82.032308","article-title":"Simple protocols for oblivious transfer and secure identi-fication in the noisy-quantum-storage model","volume":"82","author":"Schaffner","year":"2010","journal-title":"Phys. Rev. A"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"445305","DOI":"10.1088\/1751-8113\/44\/44\/445305","article-title":"Quantum key distribution based on orthogonal states allows secure quantum bit commitment","volume":"44","author":"He","year":"2011","journal-title":"J. Phys. A Math. Theor."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","article-title":"Measurement-device-independent quantum key distribution","volume":"108","author":"Lo","year":"2012","journal-title":"Phys. Rev. Lett."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"190501","DOI":"10.1103\/PhysRevLett.117.190501","article-title":"Measurement-device-independent quantum key distribution over a 404 km optical fiber","volume":"117","author":"Yin","year":"2016","journal-title":"Phys. Rev. Lett."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"130502","DOI":"10.1103\/PhysRevLett.111.130502","article-title":"Experimental measurement-device-independent quantum key distribution","volume":"111","author":"Liu","year":"2013","journal-title":"Phys. Rev. Lett."},{"key":"ref_22","first-page":"031043","article-title":"Phase-matching quantum key distribution","volume":"8","author":"Ma","year":"2018","journal-title":"Phys. Rev. X"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1038\/s41586-018-0066-6","article-title":"Overcoming the rate\u2013distance limit of quantum key distribution without quantum repeaters","volume":"557","author":"Lucamarini","year":"2018","journal-title":"Nature"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Menezes, A. (2007). A tight high-order entropic quantum uncertainty relation with applications. Advances in Cryptology\u2014CRYPTO 2007, Springer.","DOI":"10.1007\/978-3-540-74143-5"},{"key":"ref_25","unstructured":"Renner, R. (2005). Security of Quantum Key Distribution. [Ph.D. Thesis, ETH Zurich]."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"044017","DOI":"10.1103\/PhysRevApplied.8.044017","article-title":"Symmetric blind information reconciliation for quantum key distribution","volume":"8","author":"Kiktenko","year":"2017","journal-title":"Phys. Rev. Appl."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"4183","DOI":"10.1109\/TIT.2008.928276","article-title":"State discrimination with post-measurement information","volume":"54","author":"Ballester","year":"2008","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"055004","DOI":"10.1088\/1367-2630\/18\/5\/055004","article-title":"Device-independent two-party cryptography secure against sequential attacks","volume":"18","author":"Kaniewski","year":"2016","journal-title":"New J. Phys."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"062327","DOI":"10.1103\/PhysRevA.92.062327","article-title":"Measurement-device-independent quantum coin tossing","volume":"92","author":"Zhao","year":"2015","journal-title":"Phys. Rev. A"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"062325","DOI":"10.1103\/PhysRevA.99.062325","article-title":"Operational interpretation of coherence in quantum key distribution","volume":"99","author":"Ma","year":"2019","journal-title":"Phys. Rev. A"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"022328","DOI":"10.1103\/PhysRevA.99.022328","article-title":"Coherence as a resource for source-independent quantum random-number generation","volume":"99","author":"Ma","year":"2019","journal-title":"Phys. Rev. A"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/21\/6351\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:30:30Z","timestamp":1760178630000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/21\/6351"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,7]]},"references-count":31,"journal-issue":{"issue":"21","published-online":{"date-parts":[[2020,11]]}},"alternative-id":["s20216351"],"URL":"https:\/\/doi.org\/10.3390\/s20216351","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2020,11,7]]}}}