期刊文献+

Controlled mutual quantum entity authentication using entanglement swapping 被引量:1

Controlled mutual quantum entity authentication using entanglement swapping
下载PDF
导出
摘要 In this paper, we suggest a controlled mutual quantum entity authentication protocol by which two users mutually certify each other on a quantum network using a sequence of Greenberger–Horne–Zeilinger(GHZ)-like states. Unlike existing unidirectional quantum entity authentication, our protocol enables mutual quantum entity authentication utilizing entanglement swapping; moreover, it allows the managing trusted center(TC) or trusted third party(TTP) to effectively control the certification of two users using the nature of the GHZ-like state. We will also analyze the security of the protocol and quantum channel. In this paper, we suggest a controlled mutual quantum entity authentication protocol by which two users mutually certify each other on a quantum network using a sequence of Greenberger–Horne–Zeilinger(GHZ)-like states. Unlike existing unidirectional quantum entity authentication, our protocol enables mutual quantum entity authentication utilizing entanglement swapping; moreover, it allows the managing trusted center(TC) or trusted third party(TTP) to effectively control the certification of two users using the nature of the GHZ-like state. We will also analyze the security of the protocol and quantum channel.
出处 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第9期116-124,共9页 中国物理B(英文版)
基金 Project supported by the Research Foundation of Korea University
关键词 quantum authentication quantum cryptography quantum communication GHZ-like state quantum authentication,quantum cryptography,quantum communication,GHZ-like state
  • 相关文献

参考文献58

  • 1Menezes A J, von Oorschot P C and Vantone S A 1996 Handbook of Applied Cryptography (Boca Raton: CRC Press).
  • 2Schneier B 1995 Applied Cryptography (2nd edn.) (Wiley).
  • 3Stinson D R 2005 Cryptography: Theory and Practice (3rd edn.) (Boca Raton: CRC Press).
  • 4Forouzan B A 2008 Cryptography and Network Security (International Edition) (New York: McGraw Hill).
  • 5ISO/IEC 9798-1 2010 Information Technology-Security Techniques-Entity Authentication-Part 1: General.
  • 6Bennett C H and Brassard G 1984 Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, p. 175.
  • 7Du?ek M, Haderka O, Hendrych M and Mayska R 1999 Phys. Rev. A 60 149.
  • 8Ljunggren D, Bourennane M and Karlsson A 2000 Phys. Rev. A 62 022305.
  • 9Mihara T 2002 Phys. Rev. A 65 052326.
  • 10Zhang Z S, Zeng G H, Zhou N R and Xiong J 2006 Phys. Lett. A 356 199.

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部