A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States

被引:4
|
作者
Zhang Sheng [1 ]
Wang Jian [1 ]
Tang Chao-Jing [1 ]
Zhang Quan [1 ]
机构
[1] Natl Univ Def Technol China, Sch Elect Sci & Engn, Changsha 410073, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
quantum key distribution; quantum cryptography; composed protocol; SIGNATURE SCHEME; CRYPTOGRAPHY; SYSTEM;
D O I
10.1088/0253-6102/56/2/13
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
It is established that a single quantum cryptography protocol usually cooperates with other cryptographic systems, such as an authentication system, in the real world. However, few protocols have been proposed on how to combine two or more quantum protocols. To fill this gap, we propose a composed quantum protocol, containing both quantum identity authentication and quantum key distribution, using squeezed states. Hence, not only the identity can be verified, but also a new private key can be generated by our new protocol. We also analyze the security under an optimal attack, and the efficiency, which is defined by the threshold of the tolerant error rate, using Gaussian error function.
引用
收藏
页码:268 / 272
页数:5
相关论文
共 50 条
  • [1] A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States
    张盛
    王剑
    唐朝京
    张权
    [J]. Communications in Theoretical Physics, 2011, 56 (08) : 268 - 272
  • [2] Quantum Identity Authentication in the Counterfactual Quantum Key Distribution Protocol
    Liu, Bin
    Gao, Zhifeng
    Xiao, Di
    Huang, Wei
    Zhang, Zhiqing
    Xu, Bingjie
    [J]. ENTROPY, 2019, 21 (05)
  • [3] A quantum deniable authentication protocol based on two-mode squeezed quantum states
    Shi, Wei-Min
    Chen, Bin-Bin
    Wang, Yan-Mei
    Zhou, Yi-Hua
    Yang, Yu-Guang
    [J]. OPTIK, 2020, 220 (220):
  • [4] Quantum identity authentication scheme based on measurement-device-independent quantum key distribution protocol
    Dong Y.-D.
    Peng J.-Y.
    Zhang X.-B.
    Zhang Z.-L.
    [J]. Tongxin Xuebao/Journal on Communications, 2016, 37 (02): : 151 - 156
  • [5] A Simple Deniable Authentication Protocol Based on Quantum Key Distribution
    Jin, Chen-hui
    Li, Zhi-yong
    Liao, Su-hua
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGY (CNCT 2016), 2016, 54 : 805 - 810
  • [6] A quantum authentication protocol using entangled states as authentication key
    College of Information Engineering, Zhengzhou University, Zhengzhou City 450052, China
    不详
    [J]. WSEAS Trans. Comput., 2006, 5 (830-835):
  • [7] Secure quantum key distribution using squeezed states
    Gottesman, D
    Preskill, J
    [J]. PHYSICAL REVIEW A, 2001, 63 (02):
  • [8] QUANTUM IDENTITY AUTHENTICATION USING GAUSSIAN-MODULATED SQUEEZED STATES
    Huang, Peng
    Zhu, Jun
    Lu, Yuan
    Zeng, Gui-Hua
    [J]. INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2011, 9 (02) : 701 - 721
  • [9] Mutual authentication quantum key agreement protocol based on Bell states
    Ye-Feng He
    Yibo Pang
    Man Di
    [J]. Quantum Information Processing, 21
  • [10] Mutual authentication quantum key agreement protocol based on Bell states
    He, Ye-Feng
    Pang, Yibo
    Di, Man
    [J]. QUANTUM INFORMATION PROCESSING, 2022, 21 (08)