Quantum identity authentication based on ping-pong technique for photons

نویسندگان

  • Zheshen Zhang
  • Guihua Zeng
  • Nanrun Zhou
  • Jin Xiong
چکیده

To prevent active attack, an one-way quantum identity authentication scheme is proposed by employing mechanism of ping-pong protocol and property of quantum controlled-NOT gate. It can verify the user’s identity as well as distribute an updated key as the authentication key. Analytical results show the proposed scheme is secure under general individual attack. © 2006 Elsevier B.V. All rights reserved. PACS: 03.67.Dd; 03.65.Ud

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving security of quantum identity authentication based on ping-pong technique for photons

Recently Z. S. Zhang et al [Phys. Lett. A 356(2006)199] have proposed an one-way quantum identity authentication scheme and claimed that it can verify the user’s identity and update securely the initial authentication key for reuse. In this paper we will show that, under an eavesdropper’s intercept-measure-resend attack, Zhang et al’s scheme is only a one-time-use scheme for the updated key can...

متن کامل

Improving the capacity of the ping-pong protocol

Since Bennett and Brassard presented the pioneer quantum key distribution (QKD) protocol in 1984 [1], there are a lot of theoretical QKD schemes [1-12] today. Recently, Beige et al. proposed a quantum secure direct communication scheme [13], which allows messages communicated directly without first establishing a random key to encrypt them. Bostroem and Felbingeer presented a ping-pong protocol...

متن کامل

Eavesdropping on the “ping-pong” type quantum communication protocols with invisible photon

The crucial issue of quantum communication protocol is its security. A quantum communication scheme must be based on the existing or nearly existing technology, but its security must be guaranteed against an eavesdropper whose technology is limited only by the laws of quantum mechanics. In this paper, we show that all the deterministic and direct two-way quantum communication protocols, sometim...

متن کامل

Deterministic Secure Communication Using Quantum Nonlocality

Quantum key distribution (QKD) is a protocol which is provably secure, by which private bit can be created between two parties over a public channel. Based on the postulate of quantum measurement [1] and no-cloning theorem [2], different QKD protocol are presented [3]. However, these type of cryptographic schemes are usually nondeterministic. A Beige et al. have presented a quantum communicatio...

متن کامل

Eavesdropping on the "ping-pong" quantum communication protocol.

Security of the "ping-pong" quantum communication protocol recently proposed by Boström and Felbinger [Phys. Rev. Lett. 89, 187902 (2002)]] is analyzed in the case of considerable quantum channel losses. The eavesdropping scheme is presented, which reveals that the ping-pong protocol is not secure for transmission efficiencies lower than 60%. Our scheme induces 50% losses, which, however, can b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006