期刊文献+

基于纠缠交换的分布式量子身份认证方案 被引量:2

Quantum authentication protocols based on entanglement swapping in distributed network
下载PDF
导出
摘要 分析了在网络环境下的量子身份认证技术,提出了在分布式网络环境下,通信双方共享密钥串,利用纠缠交换技术进行身份认证的方案,并分析了方案的可行性。 This paper analyzed the quantum identity authentication technology in the network environment and brought forward a scheme of quantum identity authentication based on the swapping of the EPR entanglement and analyzed its security.Thus a scheme of sharing secret key string between two sides in the distributed network environment was presented.It made use of the entanglement swapping to authenticate the identity.
作者 刘岳启 张琨
出处 《计算机工程与应用》 CSCD 北大核心 2008年第32期90-92,共3页 Computer Engineering and Applications
基金 国家自然科学基金重大项目(the Grand National Natural Science Foundation of China under Grant No.90718021) 江苏省淮阴师范学院青年教师基金项目(No.07HSQN004)。
关键词 量子密码 纠缠交换 身份认证 quantum cryptography entanglement swapping identity authentication
  • 相关文献

参考文献17

二级参考文献51

  • 1温晓军,刘云,张振江.量子通信网络中的身份认证方案[J].北京交通大学学报,2004,28(5):66-68. 被引量:7
  • 2徐胜波.移动通信系统中认证方案的分析与设计[M].西安电子科技大学,1997..
  • 3[1]Wiesner S. Conjugate coding. Sigact News, 1983; 15(1):78~88
  • 4[2]Bennett C H, Brassard G . An update on quantum cryptography. In: Advances in Cryptology: Proceedings of Crypto’84, Springer-Verlag, August 1984:475~480
  • 5[3]Differ W, Hellman M E. New directions in cryptography. IEEE Trans Inform Theory, 1976:644~654
  • 6[1]Wiesner S. Conjugate coding[J]. SIGACT News, 1983, 15:78-88.
  • 7[2]Bennett C H, Brassard G, Breidbart S, et al. Quantum cryptography, or unforgeable subway tokens[A]. Advances in Cryptography: Proceedings of CRYPTO 82[C]. New York: Plenum Press,1983.267-275.
  • 8[3]Bennett C H, Brassard G. Quantum cryptography and its application provably secure key expansion, public-key distribution, and coin-tossing[A]. IEEE International Symposium on Information Theory[C]. St-Jovite: Qebec Press,1983.91-95.
  • 9[4]Bennett C H, Brassard G. Quantum cryptography: public-key distribution and coin tossing[A]. Proceedings of the International Conference on Computers, Systems and Signal Processing[C]. India: Bangalore Press,1984.175-179.
  • 10[5]Ekert A K. Quantum cryptography based on Bell′s theorem[J]. Phys Rev Lett, 1991,67: 661-663.

共引文献83

同被引文献20

  • 1张军,彭承志,包小辉,杨涛,潘建伟.量子密码实验新进展——13km自由空间纠缠光子分发:朝向基于人造卫星的全球化量子通信[J].物理,2005,34(10):701-707. 被引量:12
  • 2Shamir A. How to share a secret [J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 3Blakely G. Safeguarding cryptographic keys [C]. Proceedings of the National Computer Conference, NewYork: AFIPS Press, 1979, 313-317.
  • 4Hillery M, Buzek V, Berthiaume A. Quantum secret sharing [J]. Phys. Rev. A, 1999, 59: 1829-1834.
  • 5Karlsson A, Koashi M, Imoto N. Quantum entanglment for secret sharing and secret splitting [J]. Phys. Rev. A, 1999, 59: 162-169.
  • 6Hsu L Y. Quantum secret-sharing protocol based Grover's algorithm [J]. Phys. Rev. A, 2003, 68: 022306.
  • 7Karimipour V, Bahraminasab A, Bagherinezhad S. Entanglement swapping of generalized cat states and secr- sharing [J]. Phys. Rev. A, 2002, 65: 042320.
  • 8Bandyopadhyay S. Teleportation and secret sharing with pur entangled states [J]. Phys. Rev. A, 2000, 62: 012308.
  • 9Guo F Z, Wen Q Y, Zhu F C. Quantum scret sharing based on multi-particle entanglement [J]. Journal of China Universities of Posts and Telecommunications, 2005, 12(1): 15219.
  • 10Ljuuggren D, Bourennane M, Karlsson A. Authority-based user authentication in quantum key distribution [J]. Phys. Rev. A, 2000, 62: 022305.

引证文献2

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部