Quantum Mutual Authentication Scheme Based on Bell State Measurement

被引:0
作者
Alshowkan, Muneer [1 ]
Elleithy, Khaled [1 ]
机构
[1] Univ Bridgeport, Dept Comp Sci & Engn, Bridgeport, CT 06604 USA
来源
2016 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT) | 2016年
关键词
quantum; entanglement; authentication; bell measurement; bell basis; SECURE DIRECT COMMUNICATION; IDENTITY AUTHENTICATION; KEY DISTRIBUTION; ENTANGLEMENT;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Authentication is one of the security services that ensures sufficient security of the system by identification and verification. Also, it assures the identity of the communicating party to be that the claimed one. To build a quantum channel between two unauthenticated to each other parties, first, a trusted authority is needed to establish a mutual authentication with each party. Using Bell measurement and entanglement swapping, we present a protocol that mutually authenticates the identity of the sender and the receiver, then constructs a quantum channel based on Bell basis. After, the sender and the receiver use the quantum channel to communicate using entanglement-assisted quantum communication protocols. Additionally, the protocol renews the shared secret key between the trusted authority and each user after each authentication process. The protocol provides the necessary authentication and key distribution to create a quantum channel between the sender and receiver.
引用
收藏
页数:6
相关论文
共 35 条
  • [1] [Anonymous], 1984, P IEEE INT C COMP, DOI DOI 10.1016/J.TCS.2014.05.025
  • [2] Secure communication with a publicly known key
    Beige, A
    Englert, BG
    Kurtsiefer, C
    Weinfurter, H
    [J]. ACTA PHYSICA POLONICA A, 2002, 101 (03) : 357 - 368
  • [3] Multiparticle generalization of entanglement swapping
    Bose, S
    Vedral, V
    Knight, PL
    [J]. PHYSICAL REVIEW A, 1998, 57 (02): : 822 - 829
  • [4] Deterministic secure direct communication using entanglement -: art. no. 187902
    Boström, K
    Felbinger, T
    [J]. PHYSICAL REVIEW LETTERS, 2002, 89 (18) : 187902/1 - 187902/4
  • [5] Quantum key distribution in the Holevo limit
    Cabello, A
    [J]. PHYSICAL REVIEW LETTERS, 2000, 85 (26) : 5635 - 5638
  • [6] Improving the capacity of the Bostrom-Felbinger protocol
    Cai, QY
    Li, BW
    [J]. PHYSICAL REVIEW A, 2004, 69 (05): : 054301 - 1
  • [7] Cai QY, 2004, CHINESE PHYS LETT, V21, P601, DOI 10.1088/0256-307X/21/4/003
  • [8] Carter J.L., 1977, Proceedings of the Ninth Annual ACM Symposium on Theory of Computing, STOC'77, page, P106, DOI DOI 10.1145/800105.803400
  • [9] Secure direct communication with a quantum one-time pad
    Deng, FG
    Long, GL
    [J]. PHYSICAL REVIEW A, 2004, 69 (05): : 052319 - 1
  • [10] Quantum identification system
    Dusek, M
    Haderka, O
    Hendrych, M
    Myska, R
    [J]. PHYSICAL REVIEW A, 1999, 60 (01): : 149 - 156