Quantum authentication protocol using Bell states

被引:9
|
作者
Xiaoyu Li [1 ]
Liju Chen [2 ]
机构
[1] Zhengzhou Univ, Dept Informat Engn, Zhengzhou 450001, Henan, Peoples R China
[2] Xian Commun Inst, Xian 710106, Shanxi, Peoples R China
来源
PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE | 2007年
基金
中国国家自然科学基金;
关键词
D O I
10.1109/ISDPE.2007.19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A quantum authentication protocol is presented in this paper It is based on the correlations of the EPR(Einstain-Podolski-Rosen) pair which is a two-qubit system in one of the four Bell states. The two parties share a sequence of EPR pairs as the authentication key. To authenticate each other, they need to create auxiliary particles and make them interact with the authentication key Then one can affirm the other's identity by performing the Bell states measurement. No one without the authentication key can pass the authentication process. So the protocol is secure. No classical channel and classical information exchange is needed in the authentication process. After the authentication process, the authentication key can be turned into the origin state. So the authentication key can be reused.
引用
收藏
页码:128 / +
页数:3
相关论文
共 50 条
  • [21] Authenticated semi-quantum key distribution protocol using Bell states
    Yu, Kun-Fei
    Yang, Chun-Wei
    Liao, Ci-Hong
    Hwang, Tzonelih
    QUANTUM INFORMATION PROCESSING, 2014, 13 (06) : 1457 - 1465
  • [22] Mutual semi-quantum key agreement protocol using Bell states
    Li, Yan Li
    Bin, Zhang Shi
    Yan, Chang
    Wei, Sheng Zhi
    Fan, Yang
    MODERN PHYSICS LETTERS A, 2019, 34 (35)
  • [23] Cryptanalysis on authenticated semi-quantum key distribution protocol using Bell states
    Meslouhi, A.
    Hassouni, Y.
    QUANTUM INFORMATION PROCESSING, 2017, 16 (01)
  • [24] Cryptanalysis on authenticated semi-quantum key distribution protocol using Bell states
    A. Meslouhi
    Y. Hassouni
    Quantum Information Processing, 2017, 16
  • [25] Quantum Private Comparison Protocol Based on Bell Entangled States
    刘文
    王永滨
    崔巍
    Communications in Theoretical Physics, 2012, 57 (04) : 583 - 588
  • [26] Quantum Private Comparison Protocol Based on Bell Entangled States
    Liu Wen
    Wang Yong-Bin
    Cui Wei
    COMMUNICATIONS IN THEORETICAL PHYSICS, 2012, 57 (04) : 583 - 588
  • [27] Man-in-the-Middle Attack on “Quantum Dialogue with Authentication Based on Bell States”
    Tzu-Han Lin
    Ching-Ying Lin
    Tzonelih Hwang
    International Journal of Theoretical Physics, 2013, 52 : 3199 - 3203
  • [28] Cryptanalysis of Quantum Secure Direct Communication and Authentication Scheme via Bell States
    Gao Fei
    Qin Su-Juan
    Guo Fen-Zhuo
    Wen Qiao-Yan
    CHINESE PHYSICS LETTERS, 2011, 28 (02)
  • [29] Man-in-the-Middle Attack on "Quantum Dialogue with Authentication Based on Bell States"
    Lin, Tzu-Han
    Lin, Ching-Ying
    Hwang, Tzonelih
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2013, 52 (09) : 3199 - 3203
  • [30] A Restricted Quantum Deniable Authentication Protocol Based on GHZ States
    Shi Weimin
    Wang Yanmei
    Li Leilei
    Zhou Yihua
    Yang Yuguang
    Jiang Nan
    CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (02) : 229 - 233