2022
DOI: 10.1007/s11128-022-03572-z
|View full text |Cite
|
Sign up to set email alerts
|

Measurement device–independent quantum secure direct communication with user authentication

Abstract: Quantum Secure Direct Communication (QSDC) is an important branch of quantum cryptography, which enable secure transmission of messages without prior key encryption. However, traditional quantum communication protocols rely on the security and trustworthiness of the devices employed to implement the protocols, which can be susceptible to attacks. Device-independent (DI) quantum protocols, on the other hand, aim to secure quantum communication independent of the devices used by leveraging fundamental principles… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 13 publications
(2 citation statements)
references
References 82 publications
(62 reference statements)
0
2
0
Order By: Relevance
“…Quantum identity authentication (QIA) allows a communication party to prove his identity based on the basic principle of quantum mechanics, which has been adopted in some quantum secure communication protocols to resist the impersonation attack from the eavesdropper (Eve). [53][54][55][56][57][58][59][60][61] For example, in 2000, Zeng et al put forward a new QKD protocol which can simultaneously distribute the secret keys and verify the communicators' identity. [53] In 2006, the QKD protocol with the blind polarization basis method was proposed.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Quantum identity authentication (QIA) allows a communication party to prove his identity based on the basic principle of quantum mechanics, which has been adopted in some quantum secure communication protocols to resist the impersonation attack from the eavesdropper (Eve). [53][54][55][56][57][58][59][60][61] For example, in 2000, Zeng et al put forward a new QKD protocol which can simultaneously distribute the secret keys and verify the communicators' identity. [53] In 2006, the QKD protocol with the blind polarization basis method was proposed.…”
Section: Introductionmentioning
confidence: 99%
“…[62][63][64][65][66][67] Recently, some QSDC protocols with identity authentication were proposed. [56,59,60] However, the existing QSDC protocols with identity authentication cannot be extended to the MQSDC.…”
Section: Introductionmentioning
confidence: 99%