Quantum identity authentication based on round robin differencial phase shift communication line
From MaRDI portal
Publication:2114015
Quantum computation (81P68) Reliability, testing and fault tolerance of networks and computer systems (68M15) Quantum information, communication, networks (quantum-theoretic aspects) (81P45) Quantum coding (general) (81P70) Phase transitions (general) in equilibrium statistical mechanics (82B26) Quantum cryptography (quantum-theoretic aspects) (81P94) Authentication, digital signatures and secret sharing (94A62)
Recommendations
- Authenticated QKD based on orthogonal states
- Controlled secure direct quantum communication inspired scheme for quantum identity authentication
- Quantum identity authentication with single photon
- A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?
- Quantum identity authentication in the orthogonal-state-encoding QKD system
Cites work
- scientific article; zbMATH DE number 481378 (Why is no real title available?)
- A Generic Construction of Quantum-Oblivious-Key-Transfer-Based Private Query with Ideal Database Security and Zero Failure
- Deterministic secure quantum communication with collective detection using single photons
- New hash functions and their use in authentication and set equality
- QUANTUM AUTHENTICATION USING ENTANGLED STATES
- Quantum Private Queries
- Quantum cryptography: public key distribution and coin tossing
- Quantum identity authentication based on ping-pong technique for photons
- Quantum identity authentication based on ping-pong technique without entanglements
- Quantum identity authentication with single photon
- Quantum key distribution and quantum authentication based on entangled state
- Quantum secret sharing
- Security of quantum secret sharing with two-particle entanglement against individual attacks
Cited in
(5)- High-efficient quantum key agreement protocol with entanglement measure
- A measurement device independent multi-party quantum key agreement protocol with identity authentication
- A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?
- Quantum identity authentication based on ping-pong technique for photons
- Controlled secure direct quantum communication inspired scheme for quantum identity authentication
This page was built for publication: Quantum identity authentication based on round robin differencial phase shift communication line
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2114015)