Semi-quantum identification

被引:0
作者
Nan-Run Zhou
Kong-Ni Zhu
Wei Bi
Li-Hua Gong
机构
[1] Nanchang University,Department of Electronic Information Engineering
[2] University of Pittsburgh,Department of Electrical and Computer Engineering
[3] SeeleTech Corporation,undefined
[4] Zsbatech Corporation,undefined
来源
Quantum Information Processing | 2019年 / 18卷
关键词
Identity authentication; Semi-quantum identification; Semi-quantum key distribution; Single photon; Quantum cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
To ensure communication security, it is necessary to verify the identities of the communicators. Two semi-quantum identification protocols with single photons involving two parties, i.e., quantum Alice and classical Bob, are presented. In the first semi-quantum identification protocol, classical Bob can authenticate quantum Alice’s identity without the help of an authenticated classical channel. As for the second one, quantum Alice can verify the identity of classical Bob without the classical measurement ability. Semi-quantum identification is significant to ensure the security of semi-quantum key distribution, semi-quantum secret sharing and so on. The proposed two identification protocols against common attacks can be employed in several existing semi-quantum key distribution protocols based on single photons to resist the man-in-the-middle attack.
引用
收藏
相关论文
共 123 条
  • [1] Ekert AK(1991)Quantum cryptography based on Bell’s theorem Phys. Rev. Lett. 67 661-663
  • [2] Bennett CH(1992)Quantum cryptography using any two nonorthogonal states Phys. Rev. Lett. 68 3121-3124
  • [3] Deng F(2004)Bidirectional quantum key distribution protocol with practical faint laser pulses Phys. Rev. A 70 235-238
  • [4] Long G(1998)Unconditional security in quantum cryptography J. ACM 48 351-406
  • [5] Mayers D(1999)Unconditional security of quantum key distribution over arbitrarily long distances Science 283 2050-2056
  • [6] Lo HK(2000)Simple proof of security of the BB84 quantum key distribution protocol Phys. Rev. Lett. 85 441-444
  • [7] Chau HF(2006)A proof of the security of quantum key distribution J. Cryptol. 19 381-439
  • [8] Shor PW(1999)Quantum identification system Phys. Rev. A 60 149-155
  • [9] Preskill J(2000)Identity verification in quantum key distribution Phys. Rev. A 61 022303-1151
  • [10] Biham E(2002)Quantum identification schemes with entanglements Phys. Rev. A 65 052326-388