Quantum identity authentication based on ping-pong technique without entanglements

被引:0
|
作者
Hao Yuan
Yi-min Liu
Guo-zhu Pan
Gang Zhang
Jun Zhou
Zhan-jun Zhang
机构
[1] West Anhui University,Department of Material and Chemical Engineering
[2] Shaoguan University,Department of Physics
[3] Anhui University,School of Physics and Material Science
来源
关键词
Quantum identity authentication; Ping-pong technique ; Single-particle state;
D O I
暂无
中图分类号
学科分类号
摘要
A quantum identity authentication scheme based on ping-pong technique without entanglements is proposed. It can verify the legitimate user’s identity and update the initial authentication key for reuse. The security of the proposed scheme is extensively analyzed and accordingly confirmed in the case of general individual attacks. The present scheme owns high efficiency due to the use of single-particle states in a two-way quantum channel. Moreover, the scheme is economical and feasible with present-day technique.
引用
收藏
页码:2535 / 2549
页数:14
相关论文
共 50 条
  • [1] Quantum identity authentication based on ping-pong technique without entanglements
    Yuan, Hao
    Liu, Yi-min
    Pan, Guo-zhu
    Zhang, Gang
    Zhou, Jun
    Zhang, Zhan-jun
    QUANTUM INFORMATION PROCESSING, 2014, 13 (11) : 2535 - 2549
  • [2] Quantum identity authentication based on ping-pong technique for photons
    Zhang, Zheshen
    Zeng, Guihua
    Zhou, Nanrun
    Xiong, Jin
    PHYSICS LETTERS A, 2006, 356 (03) : 199 - 205
  • [3] A "Ping-Pong" Protocol with Authentication
    Chen Zuning
    Qin Zheng
    ICIEA 2010: PROCEEDINGS OF THE 5TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOL 4, 2010, : 50 - +
  • [4] Ping-pong Technique for CTO
    Kim, Minsoo
    Park, Sangwoo
    Lee, Sun Hack
    Kim, Tae-Oh
    Yoon, Yong-Hoon
    Om, Sang Yong
    Park, Hanbit
    Cho, Sang-Cheol
    Lee, Kyusup
    Kwon, Osung
    Lee, Pil Hyung
    Ahn, Jung-Min
    Kang, Soo-Jin
    Park, Duk-Woo
    Lee, Seung-Whan
    Kim, Young-Hak
    Lee, Cheol Whan
    Park, Seong-Wook
    Park, Seung-Jung
    JOURNAL OF THE AMERICAN COLLEGE OF CARDIOLOGY, 2018, 71 (16) : S169 - S170
  • [5] Eavesdropping on the ping-pong quantum communication protocol
    Woájcik, Antoni
    Physical Review Letters, 2003, 90 (15) : 1 - 157901
  • [6] The "ping-pong" protocol can be attacked without eavesdropping
    Cai, QY
    PHYSICAL REVIEW LETTERS, 2003, 91 (10)
  • [7] Ping-pong player prototype -: A PC-based, low-cost ping-pong robot
    Acosta, L
    Rodrigo, JJ
    Méndez, JA
    Marichal, GN
    Sigut, M
    IEEE ROBOTICS & AUTOMATION MAGAZINE, 2003, 10 (04) : 44 - 52
  • [8] An Analysis of the Ping-Pong Protocol Operation in a Noisy Quantum Channel
    Zawadzki, Piotr
    COMPUTER NETWORKS, CN 2013, 2013, 370 : 354 - 362
  • [9] Secure direct communication based on ping-pong protocol
    Chamoli, Arti
    Bhandari, C. M.
    QUANTUM INFORMATION PROCESSING, 2009, 8 (04) : 347 - 356
  • [10] Improved quantum “Ping-pong” protocol based on GHZ state and classical XOR operation
    Jian Li
    HaiFei Jin
    Bo Jing
    Science China Physics, Mechanics and Astronomy, 2011, 54