Quantum identity authentication based on ping-pong technique without entanglements
From MaRDI portal
Publication:488207
DOI10.1007/s11128-014-0808-9zbMath1352.94077OpenAlexW1977935012MaRDI QIDQ488207
Hao Yuan, Gang Zhang, Jun Zhou, Guo-zhu Pan, Zhan-Jun Zhang, Yi-min Liu
Publication date: 23 January 2015
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-014-0808-9
Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (16)
Witness for non-quasi maximally entangled states ⋮ Quantum mutual implicit authentication key agreement protocol without entanglement with key recycling ⋮ Quantum private comparison protocol based on the entanglement swapping between \(\chi ^+\) state and W-class state ⋮ A robust and efficient quantum private comparison of equality based on the entangled swapping of GHZ-like state and \(\chi^+\) state ⋮ A novel quantum identity authentication protocol without entanglement and preserving pre-shared key information ⋮ Fingerprint-based quantum authentication scheme using encoded graph states ⋮ Semi-quantum mutual identity authentication using Bell states ⋮ Authenticable quantum scheme for secret sharing based on local distinguishability ⋮ High-dimensional quantum threshold anonymous identity authentication scheme ⋮ A novel quantum identity authentication based on Bell states ⋮ Quantum identity authentication in the orthogonal-state-encoding QKD system ⋮ Semi-quantum identification ⋮ A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice? ⋮ Controlled secure direct quantum communication inspired scheme for quantum identity authentication ⋮ Quantum identity authentication based on round robin differencial phase shift communication line ⋮ Quantum confidentiality query protocol based on Bell state identity
Cites Work
- Quantum cryptography: public key distribution and coin tossing
- Eavesdropping on the two-way quantum communication protocols with invisible photons
- Quantum identity authentication based on ping-pong technique for photons
- Quantum authenticated direct communication using Bell states
- A quantum protocol for \((t,n)\)-threshold identity authentication based on Greenberger-Horne-Zeilinger states
- QUANTUM SECURE DIRECT COMMUNICATION WITH QUANTUM IDENTIFICATION
- One-Way Quantum Authenticated Secure Communication Using Rotation Operation
- Quantum Secure Direct Communication with Authentication Expansion Using Single Photons
- Quantum cryptography
- Unnamed Item
This page was built for publication: Quantum identity authentication based on ping-pong technique without entanglements