A Quantum Identity Authentication Protocol Based on Optical Transmission & Face Recognition

被引:3
|
作者
Zhu, Dexin [1 ]
Li, Xiaohui [1 ]
Li, Xiaohong [2 ]
Wei, Rongkai [1 ]
Wu, Jianan [1 ]
Song, Lijun [3 ,4 ]
机构
[1] Changchun Univ, Sch Coll Comp Sci & Technol, Changchun 130021, Jilin, Peoples R China
[2] Jilin Prov Econ Management Cadre Coll, Sch Publ Teaching Dept, Changchun, Jilin, Peoples R China
[3] Jilin Engn Normal Univ, Sch Inst Interdisciplinary Quantum Informat Techo, Changchun 130021, Jilin, Peoples R China
[4] Jilin Engn Lab Quantum Informat Technol, Changchun, Jilin, Peoples R China
关键词
Optical Transmission; Face Image; Quantum Key; Identity Authentication;
D O I
10.3991/ijoe.v14i04.8374
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Specific to security issues concerning identity authentication of mobile applications, a quantum identity authentication protocol based on optical transmission and face recognition is put forward in this paper with consideration of the unconditional security characteristic of quantum key. As for this protocol, optical transmission technology is adopted to acquire quantum key and identity authentication encrypted by quantum key can thus be realized, for which key feature points of face image and user password serve as dual authentication factors. Experimental result and security analysis indicate that this protocol can resist illegal attack and ensure security of identity authentication of mobile applications, which also has great operating efficiency.
引用
收藏
页码:58 / 69
页数:12
相关论文
共 50 条
  • [21] Double-Blind Quantum Identity Authentication Protocol Based on Scalar Product Computation
    Wang, Sheng
    Zhou, Xiaodong
    Feng, Bao
    Chen, Zewen
    Xia, Yan
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL II, CENET 2023, 2024, 1126 : 72 - 80
  • [22] Quantum identity authentication based on the extension of quantum rotation
    Geng Chen
    Yuqi Wang
    Liya Jian
    Yi Zhou
    Shiming Liu
    EPJ Quantum Technology, 2023, 10
  • [23] Quantum identity authentication based on the extension of quantum rotation
    Chen, Geng
    Wang, Yuqi
    Jian, Liya
    Zhou, Yi
    Liu, Shiming
    EPJ QUANTUM TECHNOLOGY, 2023, 10 (01)
  • [24] Quantum identity authentication protocol based on three-photon quantum error avoidance code in edge computing
    Qu, Zhiguo
    Liu, Xinzhu
    Wu, Shengyao
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (06):
  • [25] An Identity-Based Authentication Protocol for Sensor Networks
    Yang, Mee Loong
    Al-Anbuky, Adnan
    Liu, William
    2014 IEEE NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING (IEEE ISSNIP 2014), 2014,
  • [26] An Identity-based Restricted Deniable Authentication Protocol
    Fan, Chengyu
    Zhou, Shijie
    Li, Fagen
    2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 474 - 478
  • [27] Identity (ID)-based authentication and the key agreement protocol
    School of Electronics and Information Engineering, Beijing Jiaotong Univ., Beijing 100044, China
    不详
    不详
    Xi'an Dianzi Keji Daxue Xuebao, 2008, 3 (559-562):
  • [28] Identity based authentication protocol for wireless sensor networks
    Salinas Rosales, Moises
    Duchen Sanchez, Gonzalo
    REVISTA FACULTAD DE INGENIERIA-UNIVERSIDAD DE ANTIOQUIA, 2010, (52): : 196 - 205
  • [29] Identity-based authentication protocol in manufacturing grid
    Shu, Jian
    Xu, Chun-Xiang
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2009, 15 (04): : 797 - 802
  • [30] Authentication protocol based on collective quantum steering
    Mondal, Debasis
    Datta, Chandan
    Singh, Jaskaran
    Kaszlikowski, Dagomir
    PHYSICAL REVIEW A, 2019, 99 (01)