Quantum direct communication with authentication
نویسندگان
چکیده
منابع مشابه
Quantum direct communication with mutual authentication
Cheng-An Yen, Shi-Jinn Horng, Hsi-Sheng Goan, Tzong-Wann Kao, Yao-Hsin Chou Department of Computer Science and Information Engineering National Taiwan University of Science and Technology, Taipei 10607, Taiwan Department of Electronic Engineering, National United University Miao-Li 36003, Taiwan Department of Physics, Center for Quantum Science and Engineering, and Center for Theoretical Scienc...
متن کاملImproving the security of quantum direct communication with authentication
Two protocols of quantum direct communication with authentication [Phys. Rev. A 73, 042305 (2006)] are recently proposed by Lee, Lim and Yang. In this paper we will show that the authenticator Trent should be prevented from knowing the secret message of communication and the protocols can be eavesdropped by Trent using the the intercept-measure-resend attack. To fix this leak, we revise the ori...
متن کاملQuantum Secure Direct Communication with Quantum Memory.
Quantum communication provides an absolute security advantage, and it has been widely developed over the past 30 years. As an important branch of quantum communication, quantum secure direct communication (QSDC) promotes high security and instantaneousness in communication through directly transmitting messages over a quantum channel. The full implementation of a quantum protocol always require...
متن کاملImproving Classical Authentication with Quantum Communication
Abstract We propose a quantum-enhanced protocol to authenticate classical messages, with improved security with respect to the classical scheme introduced by Brassard in 1983. In that protocol, the shared key is the seed of a pseudo-random generator (PRG) and a hash function is used to create the authentication tag of a public message. We show that a quantum encoding of secret bits offers more ...
متن کاملQuantum Communication Complexity of Quantum Authentication Protocols
In order to perform Quantum Cryptography procedures it is often essencial to ensure that the parties of the communication are authentic. Such task is accomplished by quantum authentication protocols which are distributed algorithms based on the intrinsic properties of Quantum Mechanics. The choice of an authentication protocol must consider that quantum states are very delicate and that the cha...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review A
سال: 2006
ISSN: 1050-2947,1094-1622
DOI: 10.1103/physreva.73.042305