Quantum authentication protocol using entangled states

نویسندگان

  • Xiaoyu Li
  • Dexi Zhang
چکیده

In this paper we provide a quantum authentication protocol. The two parties share a sequence of EPR(Einstein-Podolsky-Rosen) pairs as the authentication key. To authenticate each other, one party creates auxiliary qubits and make them interact with the authentication key. After measurement in selected basis, he or she affirm the other’s identity. We shown that no one without the authentication key can pass the authentication process. So the protocol is secure. The authentication key is reusable if there are no eavesdroppers and errors in transmission. Key–Words: Quantum cryptography, quantum authentication, EPR pair, CNOT operation, security, reusable.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authentication Protocol Using Quantum Superposition States

When it became known that quantum computers could break the RSA (named for its creators – Rivest, Shamir, and Adleman) encryption algorithm within a polynomialtime, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recentl...

متن کامل

Teleportation via an Entangled Coherent Channel and Decoherence Effect on This Channel

We study an entangled two-mode coherent state within the framework of2×2-dimensional Hilbert space. We investigate the problem of quantum teleportation ofa superposition coherent state via an entangled coherent channel. By three differentmeasures with the titles ``minimum assured fidelity (MASF)”, ``average teleportationfidelity” and ``optimal fidelity (f)” we study the ...

متن کامل

Quantum Bit Commitment Using Entangled States

Based on the fact that the entanglement can not be created locally, we proposed a quantum bit commitment protocol, in which entangled states and quantum algorithms is used. The bit is not encoded with the form of the quantum states, and delaying the measurement is required. Therefore the protocol will not be denied by the Mayers-Lo-Chau no-go theorem, and unconditional security is achieved. Typ...

متن کامل

A Hybrid Authentication Protocol Using Quantum Entanglement and Symmetric Cryptography

This paper presents a hybrid cryptographic protocol, using quantum and classical resources, for authentication and authorization in a network. One or more trusted servers distribute streams of entangled photons to individual resources that seek to communicate. It is assumed that each resource shares a previously distributed secret key with the trusted server, and that resources can communicate ...

متن کامل

Probabilistic Quantum Teleportation

We consider a generalized quantum teleportation protocol for an unknown qubit using non-maximally entangled state as a shared resource. Without recourse to local filtering or entanglement concentration, using standard Bell-state measurement and classical communication one cannot teleport the state with unit fidelity and unit probability. We show that using non-maximally entangled measurements o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006