Continuous-variable quantum identity authentication based on quantum teleportation
From MaRDI portal
Publication:332064
DOI10.1007/s11128-016-1283-2zbMath1348.81142MaRDI QIDQ332064
Peng Huang, Wan-Su Bao, Hong-Xin Ma, Gui-Hua Zeng
Publication date: 27 October 2016
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-016-1283-2
94A60: Cryptography
81P15: Quantum measurement theory, state operations, state preparations
81P40: Quantum coherence, entanglement, quantum correlations
81P45: Quantum information, communication, networks (quantum-theoretic aspects)
81P94: Quantum cryptography (quantum-theoretic aspects)
Related Items
How to verify identity in the continuous variable quantum system?, Quantum mutual implicit authentication key agreement protocol without entanglement with key recycling, Multi-party quantum key agreement with five-qubit brown states, Quantum identity authentication with single photon, Fingerprint-based quantum authentication scheme using encoded graph states, Three-party quantum key agreement protocol with seven-qubit entangled states, Quantum identity authentication in the orthogonal-state-encoding QKD system, A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?, Quantum confidentiality query protocol based on Bell state identity, Continuous variable quantum steganography protocol based on quantum identity, Quantum key agreement via non-maximally entangled cluster states, A novel quantum identity authentication protocol without entanglement and preserving pre-shared key information
Cites Work
- A Mathematical Theory of Communication
- Continuous variable quantum secret sharing via quantum teleportation
- Quantum cryptography: public key distribution and coin tossing
- Quantum identity authentication based on ping-pong technique for photons
- New hash functions and their use in authentication and set equality
- Bound on noise of coherent source for secure continuous-variable quantum key distribution
- QUANTUM IDENTITY AUTHENTICATION USING GAUSSIAN-MODULATED SQUEEZED STATES
- QUANTUM AUTHENTICATION USING ENTANGLED STATES
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography using any two nonorthogonal states
- Quantum cryptography
- Quantum key distribution and quantum authentication based on entangled state