2022
DOI: 10.1007/s10773-022-04986-2
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Identity Authentication Scheme Based on Quantum Walks on Graphs with IBM Quantum Cloud Platform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…As a minor protocol, QIA should be used as little as possible to ensure that it does not burden the major protocol in quantum communication networks. Some other protocols [27][28][29] face a similar problem of using too many resources for additional purposes, which seem to deviate from the original intent of QIA.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…As a minor protocol, QIA should be used as little as possible to ensure that it does not burden the major protocol in quantum communication networks. Some other protocols [27][28][29] face a similar problem of using too many resources for additional purposes, which seem to deviate from the original intent of QIA.…”
Section: Introductionmentioning
confidence: 99%
“…The quantum bit efficiency of some protocols is variable, and the range is given in this table. Among them,[29] cannot evaluate the quantum bit efficiency due to the use of quantum walks 3. Note denotes additional purposes that can be achieved by QIA protocol.…”
mentioning
confidence: 99%
“…A quantum walk algorithm can be implemented on many graph structures, and its function is very significant [7][8][9][10][11][12][13][14]. Also, quantum walks have important applications in quantum cryptography and quantum communication [15,16]. Noise research in the quantum walk algorithm is also one of the key points, and general quantum walk calculation based on the Bose-Hubbard model has been proposed [17,18].…”
Section: Introductionmentioning
confidence: 99%
“…Although in some MQKA protocols, authentication of classical channels has been required to prevent classical messages from being tampered, message authentication is different from identity authentication. Therefore, in designing a secure QKA protocol, the authentication of users should be considered as in other authenticated quantum cryptographic protocols [20][21][22][23][24].…”
mentioning
confidence: 99%