scispace - formally typeset
Journal ArticleDOI

Controlled mutual quantum entity authentication using entanglement swapping

Reads0
Chats0
TLDR
This protocol enables mutual quantum entity authentication utilizing entanglement swapping; moreover, it allows the managing trusted center (TC) or trusted third party (TTP) to effectively control the certification of two users using the nature of the GHZ-like state.
Abstract
In this paper, we suggest a controlled mutual quantum entity authentication protocol by which two users mutually certify each other on a quantum network using a sequence of Greenberger–Horne–Zeilinger (GHZ)-like states. Unlike existing unidirectional quantum entity authentication, our protocol enables mutual quantum entity authentication utilizing entanglement swapping; moreover, it allows the managing trusted center (TC) or trusted third party (TTP) to effectively control the certification of two users using the nature of the GHZ-like state. We will also analyze the security of the protocol and quantum channel.

read more

Citations
More filters
Journal ArticleDOI

Quantum identity authentication with single photon

TL;DR: The proposed quantum identity authentication protocol can verify a user’s identity without exposing to an authentication key information using just a single photon and is practicable with current technology.

Efficient Quantum Cryptography Network without Entanglement and Quantum Memory

TL;DR: This document is intended to assist in the preparation of future studies on nonorthogonal cooperation between Russia and Ukraine.
Journal ArticleDOI

Controlled mutual quantum entity authentication with an untrusted third party

TL;DR: This study presents two solutions that make use of an entanglement correlation checking method and random numbers against an internal attack by an untrusted third party.
Journal ArticleDOI

A novel quantum identity authentication based on Bell states

TL;DR: A novel quantum authentication protocol based on entanglement swapping of Bell states, in which it can ensure two users to simultaneously authenticate each other, and can prevent the third party from knowing the secret key shared in prior between the two users.
Journal ArticleDOI

Two authenticated quantum dialogue protocols based on three-particle entangled states

TL;DR: The first controlled quantum dialogue protocol with authentication is creatively proposed, which is secure under not only some famous external attacks but also internal attacks, for example, the dishonest controller's attack and has a slightly increasing efficiency and less qubit cost compared to previous protocols.
References
More filters
Journal ArticleDOI

Quantum cryptography using any two nonorthogonal states

TL;DR: It is shown that in principle any two nonorthogonal quantum states suffice, and a practical interferometric realization using low-intensity coherent light pulses is described.
Journal ArticleDOI

Simple proof of security of the BB84 quantum key distribution protocol

TL;DR: It is proved that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure, and a key distribution protocol based on entanglement purification is given, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol.
Journal ArticleDOI

Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long Distances

TL;DR: The problem is solved by showing that, given fault-tolerant quantum computers, quantum key distribution over an arbitrarily long distance of a realistic noisy channel can be made unconditionally secure.
Journal ArticleDOI

Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block

TL;DR: A protocol for quantum secure direct communication using blocks of Einstein-Podolsky-Rosen (EPR) pairs is proposed, and a set of ordered N EPR pairs is used as a data block for sending secret message directly.
Journal ArticleDOI

Theoretically efficient high-capacity quantum-key-distribution scheme

TL;DR: In this article, a theoretical quantum key distribution scheme using EPR pairs is presented, which is efficient in that it uses all EPR pair in distributing the key except those chosen for checking eavesdroppers.
Related Papers (5)