Journal ArticleDOI
Controlled mutual quantum entity authentication using entanglement swapping
Min-Sung Kang,Min-Sung Kang,Chang Ho Hong,Chang Ho Hong,Jino Heo,Jino Heo,Jongin Lim,Jongin Lim,Hyung Jin Yang,Hyung Jin Yang +9 more
Reads0
Chats0
TLDR
This protocol enables mutual quantum entity authentication utilizing entanglement swapping; moreover, it allows the managing trusted center (TC) or trusted third party (TTP) to effectively control the certification of two users using the nature of the GHZ-like state.Abstract:
In this paper, we suggest a controlled mutual quantum entity authentication protocol by which two users mutually certify each other on a quantum network using a sequence of Greenberger–Horne–Zeilinger (GHZ)-like states. Unlike existing unidirectional quantum entity authentication, our protocol enables mutual quantum entity authentication utilizing entanglement swapping; moreover, it allows the managing trusted center (TC) or trusted third party (TTP) to effectively control the certification of two users using the nature of the GHZ-like state. We will also analyze the security of the protocol and quantum channel.read more
Citations
More filters
Journal ArticleDOI
Quantum identity authentication with single photon
TL;DR: The proposed quantum identity authentication protocol can verify a user’s identity without exposing to an authentication key information using just a single photon and is practicable with current technology.
Efficient Quantum Cryptography Network without Entanglement and Quantum Memory
TL;DR: This document is intended to assist in the preparation of future studies on nonorthogonal cooperation between Russia and Ukraine.
Journal ArticleDOI
Controlled mutual quantum entity authentication with an untrusted third party
TL;DR: This study presents two solutions that make use of an entanglement correlation checking method and random numbers against an internal attack by an untrusted third party.
Journal ArticleDOI
A novel quantum identity authentication based on Bell states
TL;DR: A novel quantum authentication protocol based on entanglement swapping of Bell states, in which it can ensure two users to simultaneously authenticate each other, and can prevent the third party from knowing the secret key shared in prior between the two users.
Journal ArticleDOI
Two authenticated quantum dialogue protocols based on three-particle entangled states
Jia-Min Qi,Gang Xu,Xiu-Bo Chen,Xiu-Bo Chen,Tian-Yin Wang,Xiao-Qiu Cai,Yixian Yang,Yixian Yang +7 more
TL;DR: The first controlled quantum dialogue protocol with authentication is creatively proposed, which is secure under not only some famous external attacks but also internal attacks, for example, the dishonest controller's attack and has a slightly increasing efficiency and less qubit cost compared to previous protocols.
References
More filters
Journal ArticleDOI
Quantum cryptography using any two nonorthogonal states
TL;DR: It is shown that in principle any two nonorthogonal quantum states suffice, and a practical interferometric realization using low-intensity coherent light pulses is described.
Journal ArticleDOI
Simple proof of security of the BB84 quantum key distribution protocol
Peter W. Shor,John Preskill +1 more
TL;DR: It is proved that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure, and a key distribution protocol based on entanglement purification is given, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol.
Journal ArticleDOI
Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long Distances
Hoi-Kwong Lo,H. F. Chau +1 more
TL;DR: The problem is solved by showing that, given fault-tolerant quantum computers, quantum key distribution over an arbitrarily long distance of a realistic noisy channel can be made unconditionally secure.
Journal ArticleDOI
Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block
TL;DR: A protocol for quantum secure direct communication using blocks of Einstein-Podolsky-Rosen (EPR) pairs is proposed, and a set of ordered N EPR pairs is used as a data block for sending secret message directly.
Journal ArticleDOI
Theoretically efficient high-capacity quantum-key-distribution scheme
TL;DR: In this article, a theoretical quantum key distribution scheme using EPR pairs is presented, which is efficient in that it uses all EPR pair in distributing the key except those chosen for checking eavesdroppers.