2019
DOI: 10.3390/e21050518
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Identity Authentication in the Counterfactual Quantum Key Distribution Protocol

Abstract: In this paper, a quantum identity authentication protocol is presented based on the counterfactual quantum key distribution system. Utilizing the proposed protocol, two participants can verify each other’s identity through the counterfactual quantum communication system. The security of the protocol is proved against individual attacks. Furthermore, according to the characteristics of the counterfactual quantum key distribution system, we propose an authenticated counterfactual quantum key distribution protoco… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 53 publications
0
11
0
Order By: Relevance
“…For example, such an effort was made in [89] where a scheme of QIA was obtained by slightly modifying BB84 protocol of QKD. Lately, a counterfactual QKD scheme was modified to propose a scheme for QIA in [76]. Further, in the early work of Duï¿oeek et al a classical-quantum hybrid scheme of authentication was used where the quantum part was based on QKD.…”
Section: Protocols Based On the Schemes For Qkdmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, such an effort was made in [89] where a scheme of QIA was obtained by slightly modifying BB84 protocol of QKD. Lately, a counterfactual QKD scheme was modified to propose a scheme for QIA in [76]. Further, in the early work of Duï¿oeek et al a classical-quantum hybrid scheme of authentication was used where the quantum part was based on QKD.…”
Section: Protocols Based On the Schemes For Qkdmentioning
confidence: 99%
“…Specifically, it allowed quantum Alice (Bob) to identify classical Bob (Alice). Another facet of modern quantum cryptography also found its place in the authentication protocol in this year when Liu et al introduced a QIA protocol [76] which can be used in the counterfactual QKD schemes. Zheng et al proposed a controlled QSDC (CQSDC) protocol with authentication [77] using five-qubit cluster state.…”
mentioning
confidence: 99%
“…Therefore, in a secure combination of GV95-QKD protocol and GV95-QIA protocol, the two kinds of processes should be mixed randomly. In [45], Liu et al proposed a method of mixing the process of QIA into QKD. Their authenticated counterfactual QKD protocol mixes the process of the QIA protocol they proposed and the counterfactual QKD protocol in [46], and the combined processes can be used to extend the length of the authentication key.…”
Section: A the Mixing Schemementioning
confidence: 99%
“…This paper effectively solves the above problem through two characteristic methods. Specifically, we first present a scheme to mix the process of GV95-QIA protocol into GV95-QKD protocol randomly, which refers to the work of Liu et al in [45]. The purpose of mixing is to ensure that the adversary cannot discriminate between a QIA signal and a QKD signal so that he cannot attack the QKD process through bypassing the QIA process.…”
Section: Introductionmentioning
confidence: 99%
“…Given the unique security of quantum secure communication, various quantum cryptography protocols [2][3][4][5] have been proposed; these include Quantum signature (QS) protocols [6][7][8][9][10] , Quantum key distribution (QKD) protocols [11][12][13] , Quantum identity authentication (QIA) protocols [14][15][16][17] , and Quantum secure direct communication (QSDC) protocols [18][19][20] . Based on these quantum communication protocols, several quantum payment protocols [21][22][23][24] have been designed.…”
Section: Introductionmentioning
confidence: 99%