Continuous-variable quantum identity authentication based on quantum teleportation
DOI10.1007/S11128-016-1283-2zbMATH Open1348.81142OpenAlexW2301090655MaRDI QIDQ332064FDOQ332064
Authors: Peng Huang, Hong-Xin Ma, Wan-Su Bao, Gui-Hua Zeng
Publication date: 27 October 2016
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-016-1283-2
Recommendations
- Quantum identity authentication without entanglement
- Quantum identity authentication in the orthogonal-state-encoding QKD system
- Controlled secure direct quantum communication inspired scheme for quantum identity authentication
- Teleportation-based continuous variable quantum cryptography
- A novel quantum identity authentication based on Bell states
- QUANTUM AUTHENTICATION USING ENTANGLED STATES
- Quantum identity authentication using Gaussian-modulated squeezed states
- An efficient quantum identity authentication key agreement protocol without entanglement
- Quantum identity authentication based on ping-pong technique for photons
- A novel quantum identity authentication protocol without entanglement and preserving pre-shared key information
Cryptography (94A60) Quantum measurement theory, state operations, state preparations (81P15) Quantum coherence, entanglement, quantum correlations (81P40) Quantum information, communication, networks (quantum-theoretic aspects) (81P45) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- A Mathematical Theory of Communication
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography: public key distribution and coin tossing
- New hash functions and their use in authentication and set equality
- Quantum cryptography using any two nonorthogonal states
- Quantum cryptography
- Continuous variable quantum secret sharing via quantum teleportation
- Quantum identity authentication based on ping-pong technique for photons
- Bound on noise of coherent source for secure continuous-variable quantum key distribution
- QUANTUM AUTHENTICATION USING ENTANGLED STATES
- Quantum key distribution and quantum authentication based on entangled state
- Quantum identity authentication using Gaussian-modulated squeezed states
Cited In (17)
- Quantum key agreement via non-maximally entangled cluster states
- A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?
- How to verify identity in the continuous variable quantum system?
- Quantum mutual implicit authentication key agreement protocol without entanglement with key recycling
- A novel quantum identity authentication protocol without entanglement and preserving pre-shared key information
- Quantum identity authentication with single photon
- Fingerprint-based quantum authentication scheme using encoded graph states
- Three-party quantum key agreement protocol with seven-qubit entangled states
- Quantum confidentiality query protocol based on Bell state identity
- Title not available (Why is that?)
- A composed protocol of quantum identity authentication plus quantum key distribution based on squeezed states
- Quantum identity authentication based on ping-pong technique for photons
- Continuous variable quantum steganography protocol based on quantum identity
- Bidirectional quantum operation teleportation with two four-qubit cluster states
- Multi-party quantum key agreement with five-qubit brown states
- Quantum identity authentication using Gaussian-modulated squeezed states
- Quantum identity authentication in the orthogonal-state-encoding QKD system
This page was built for publication: Continuous-variable quantum identity authentication based on quantum teleportation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q332064)