A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States

2011 ◽  
Vol 56 (2) ◽  
pp. 268-272 ◽  
Author(s):  
Sheng Zhang ◽  
Jian Wang ◽  
Chao-Jing Tang ◽  
Quan Zhang
Entropy ◽  
2019 ◽  
Vol 21 (5) ◽  
pp. 518 ◽  
Author(s):  
Bin Liu ◽  
Zhifeng Gao ◽  
Di Xiao ◽  
Wei Huang ◽  
Zhiqing Zhang ◽  
...  

In this paper, a quantum identity authentication protocol is presented based on the counterfactual quantum key distribution system. Utilizing the proposed protocol, two participants can verify each other’s identity through the counterfactual quantum communication system. The security of the protocol is proved against individual attacks. Furthermore, according to the characteristics of the counterfactual quantum key distribution system, we propose an authenticated counterfactual quantum key distribution protocol based on a novel strategy of mixing the two types of quantum cryptographic protocols randomly. The authenticated quantum key distribution can also be used to update the extent of the authentication keys.


2010 ◽  
Vol 08 (05) ◽  
pp. 779-786
Author(s):  
SHENG ZHANG ◽  
JIAN WANG ◽  
CHAO-JING TANG ◽  
QUAN ZHANG

We present a new non-Gaussian quantum key distribution (QKD) protocol using squeezed states. Compared with a binary modulation, the efficiency can be improved when a four alphabetic letters modulation is chosen. We then analyze the security of the protocol under a collective entangling cloner attack, which is a powerful attack strategy in continuous variable QKD. We also show how the modulation coefficient affects the key rate, then the key rate can be maximized by choosing an optimal coefficient.


2011 ◽  
Vol 09 (02) ◽  
pp. 701-721 ◽  
Author(s):  
PENG HUANG ◽  
JUN ZHU ◽  
YUAN LU ◽  
GUI-HUA ZENG

Two continuous-variable quantum identity authentication schemes, which are utilized to prevent active attack, are presented by using Gaussian-modulated squeezed states. The proposed schemes can both verify user's identity as well as distribute an updated new key as the authentication key. A new defined fidelity parameter is proposed to verify the identity of the communicator and detect eavesdropping. The analytical results show the feasibility of these two identity authentication schemes and the security under the attack of general Gaussian-cloner strategy and collective attack.


2016 ◽  
Vol 14 (01) ◽  
pp. 1650002 ◽  
Author(s):  
Song Lin ◽  
Hui Wang ◽  
Gong-De Guo ◽  
Guo-Hua Ye ◽  
Hong-Zhen Du ◽  
...  

Quantum key distribution (QKD) has been growing rapidly in recent years and becomes one of the hottest issues in quantum information science. During the implementation of QKD on a network, identity authentication has been one main problem. In this paper, an efficient authenticated multi-user quantum key distribution (MQKD) protocol with single particles is proposed. In this protocol, any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center. Meanwhile, the particles, which are used as quantum information carriers, are not required to be stored, therefore the proposed protocol is feasible with current technology. Finally, security analysis shows that this protocol is secure in theory.


Sign in / Sign up

Export Citation Format

Share Document