A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?
From MaRDI portal
Publication:2102791
DOI10.1007/s11128-022-03717-0OpenAlexW4308410485MaRDI QIDQ2102791
Publication date: 9 December 2022
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/2112.04234
quantum identity authenticationsecure quantum communicationclassification of the protocols for quantum identity authentication
Related Items (5)
A measurement device independent multi-party quantum key agreement protocol with identity authentication ⋮ Secured shared authentication key with two-way clock synchronization over multiparty quantum communication ⋮ Measurement-device-independent quantum key agreement based on entanglement swapping ⋮ A novel quantum identity authentication protocol without entanglement and preserving pre-shared key information ⋮ Controlled secure direct quantum communication inspired scheme for quantum identity authentication
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A general method for selecting quantum channel for bidirectional controlled state teleportation and other schemes of controlled quantum communication
- Which verification qubits perform best for secure communication in noisy channel?
- Quantum cloning attacks against PUF-based quantum authentication systems
- Continuous-variable quantum identity authentication based on quantum teleportation
- Quantum cryptography: public key distribution and coin tossing
- Quantum deniable authentication protocol
- Orthogonal-state-based deterministic secure quantum communication without actual transmission of the message qubits
- Two-step orthogonal-state-based protocol of quantum secure direct communication with the help of order-rearrangement technique
- Quantum identity authentication based on ping-pong technique without entanglements
- Quantum identity authentication without entanglement
- Quantum communication complexity
- Quantum identity authentication based on ping-pong technique for photons
- New hash functions and their use in authentication and set equality
- Why quantum bit commitment and ideal quantum coin tossing are impossible.
- Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue
- Asymmetric quantum dialogue in noisy environment
- Quantum identity authentication with single photon
- Blind quantum signature with blind quantum computation
- Qubit authentication
- Quantum authenticated direct communication using Bell states
- Controlled mutual quantum entity authentication with an untrusted third party
- Quantum conference
- Quantum secure direct communication with mutual authentication using a single basis
- Controlled quantum secure direct communication with authentication protocol based on five-particle cluster state and classical XOR operation
- Quantum and semi-quantum sealed-bid auction: vulnerabilities and advantages
- Authenticated semi-quantum secret sharing based on GHZ-type states
- On the group-theoretic structure of a class of quantum dialogue protocols
- A novel quantum identity authentication based on Bell states
- A novel quantum deniable authentication protocol without entanglement
- Multiparty simultaneous quantum identity authentication with secret sharing
- Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes
- Applications of quantum cryptographic switch: various tasks related to controlled quantum communication can be performed using Bell states and permutation of particles
- Continuous variable direct secure quantum communication using Gaussian states
- An efficient quantum identity authentication key agreement protocol without entanglement
- Quantum private query with authentication
- SECURITY OF QUANTUM-READOUT PUFs AGAINST QUADRATURE-BASED CHALLENGE-ESTIMATION ATTACKS
- Quantum readout of Physical Unclonable Functions
- QUANTUM IDENTITY AUTHENTICATION USING GAUSSIAN-MODULATED SQUEEZED STATES
- QUANTUM AUTHENTICATION USING ENTANGLED STATES
- Quantum Key Distribution with Classical Bob
- SECURITY OF QUANTUM KEY DISTRIBUTION
- Secure multi-party quantum computation
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography using any two nonorthogonal states
- Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment
- A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY
- Continuous variable controlled quantum dialogue and secure multiparty quantum computation
- Quantum Authentication with Key Recycling
- Quantum secret sharing with identity authentication based on Bell states
This page was built for publication: A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?