Quantum identity authentication based on round robin differencial phase shift communication line
DOI10.1007/S10773-022-04988-0zbMATH Open1486.81082OpenAlexW4212837928MaRDI QIDQ2114015FDOQ2114015
Authors: Yi Qian, Can Gui, Bin Liu, Wei Huang, Bingjie Xu
Publication date: 14 March 2022
Published in: International Journal of Theoretical Physics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10773-022-04988-0
Recommendations
- Authenticated QKD based on orthogonal states
- Controlled secure direct quantum communication inspired scheme for quantum identity authentication
- Quantum identity authentication with single photon
- A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?
- Quantum identity authentication in the orthogonal-state-encoding QKD system
Quantum computation (81P68) Reliability, testing and fault tolerance of networks and computer systems (68M15) Quantum information, communication, networks (quantum-theoretic aspects) (81P45) Quantum coding (general) (81P70) Phase transitions (general) in equilibrium statistical mechanics (82B26) Quantum cryptography (quantum-theoretic aspects) (81P94) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Quantum cryptography: public key distribution and coin tossing
- New hash functions and their use in authentication and set equality
- Quantum Private Queries
- Quantum secret sharing
- Quantum identity authentication based on ping-pong technique for photons
- Deterministic secure quantum communication with collective detection using single photons
- QUANTUM AUTHENTICATION USING ENTANGLED STATES
- Quantum key distribution and quantum authentication based on entangled state
- Security of quantum secret sharing with two-particle entanglement against individual attacks
- Title not available (Why is that?)
- Quantum identity authentication based on ping-pong technique without entanglements
- Quantum identity authentication with single photon
- A Generic Construction of Quantum-Oblivious-Key-Transfer-Based Private Query with Ideal Database Security and Zero Failure
Cited In (5)
- A measurement device independent multi-party quantum key agreement protocol with identity authentication
- A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?
- Quantum identity authentication based on ping-pong technique for photons
- High-efficient quantum key agreement protocol with entanglement measure
- Controlled secure direct quantum communication inspired scheme for quantum identity authentication
This page was built for publication: Quantum identity authentication based on round robin differencial phase shift communication line
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2114015)