Quantum identity authentication scheme based on measurement-device-independent quantum key distribution protocol

被引:0
作者
Dong Y.-D. [1 ,2 ]
Peng J.-Y. [1 ]
Zhang X.-B. [1 ]
Zhang Z.-L. [2 ]
机构
[1] School of Electronics and Information, Northwestern Polytechnical University, Xi'an
[2] School of Information and Control Engineering, Xi'an University of Architecture and Technology, Xi'an
来源
Tongxin Xuebao/Journal on Communications | 2016年 / 37卷 / 02期
关键词
Bell-state measurement; Measurement-device-independent; Quantum identity authentication; Quantum key distribution;
D O I
10.11959/j.issn.1000-436x.2016041
中图分类号
学科分类号
摘要
Utilized to security properties of measurement-device-independent quantum key distribution (MDI-QKD) protocol, quantum identity authentication scheme based on MDI (QIA-MDI) protocol was presented. In this protocol, authentication center (AC) and authentication user have encrypted authentication information and next authenticated key by shared key, and then they transmitted the encrypted information to untrusted third party for Bell-state measurement (BSM). The secret authentication information was obtained through the BSM result, which can verify the communicator identity and update shared key. The security performance of the proposed scheme is extensively analyzed and accordingly confirmed in the case of attacks. © 2016, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:151 / 156
页数:5
相关论文
共 24 条
  • [1] Shor P.W., Preskill J., Simple proof of security of the BB84 quantum key distribution protocol, Phys Rev Lett, 85, pp. 441-446, (2000)
  • [2] Gottesman D., Lo H.K., Lutkenhaus N., Et al., Security of quantum key distribution with imperfect devices, Quantum Infor Comput, 4, pp. 325-329, (2004)
  • [3] Paul J., David E., Sebastien K.J., High bit rate continuous-variable quantum key distribution, Phys Rev A, 90, 4, pp. 042329-042335, (2014)
  • [4] Zhou R.R., Yang L., Quantum election scheme based on anonymous quantum key distribution, Chin Phys B, 21, 8, pp. 080301-080309, (2012)
  • [5] Alexander S., Zurek W.H., Quantum discord cannot be shared, Phys Rev Let, 111, 4, pp. 040401-040406, (2013)
  • [6] Zeng G.H., Quantum Private Communication, (2006)
  • [7] Dusek M., Handerka O., Hendrych M., Quantum identification system, Phys Rev A, 60, 1, pp. 149-156, (1999)
  • [8] Zeng G.H., Zhang W.P., Identity verification in quantum key distribution, Phys Rev A, 61, pp. 022303-022308, (2000)
  • [9] Zeng G.H., Quantum identity authentication without trusted-party, Acta Electronica Sinca, 32, 7, pp. 1148-1152, (2004)
  • [10] Zhou N.R., Zeng G.H., Zeng W.J., Et al., Cross-center quantum identification based on teleportation and entanglement swapping, Optics Communications, 254, pp. 380-388, (2005)