Netinfo Security ›› 2024, Vol. 24 ›› Issue (9): 1364-1374.doi: 10.3969/j.issn.1671-1122.2024.09.005
Previous Articles Next Articles
DUAN Haozhe, LI Zhihui(), WEI Xingjia, HU Kexin
Received:
2024-05-06
Online:
2024-09-10
Published:
2024-09-27
CLC Number:
DUAN Haozhe, LI Zhihui, WEI Xingjia, HU Kexin. Quantum Identity Authentication Protocol without Entanglement in d-Dimensional Quantum System[J]. Netinfo Security, 2024, 24(9): 1364-1374.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2024.09.005
Bob 控制 比特 | Eve目标比特 | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
… | … | |||||||||||||
Alice | Eve | Alice | Eve | Alice | Eve | … | Alice | Eve | Alice | Eve | … | Alice | Eve | |
… | E | E | … | E | E | |||||||||
… | E | E | … | E | E | |||||||||
… | E | E | … | E | E | |||||||||
… | … | … | … | … | … | … | … | … | … | E | E | … | E | E |
… | E | E | … | E | E | |||||||||
… | E | E | … | E | E | |||||||||
… | E | E | … | E | E | |||||||||
… | E | E | … | E | E | |||||||||
… | … | … | … | … | … | … | … | … | … | E | E | … | E | E |
… | E | E | … | E | E |
比特 | 0 | 1 | 1 | 2 | 3 | 1 | 4 | 3 | 0 | 1 | 2 | 1 | 4 | 4 | 0 | 3 | 2 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
位置 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 |
比特 | 1 | 2 | 1 | 4 | 3 | 4 | 3 | 2 | 1 | 1 | 0 | 4 | 0 | 0 | 4 | 3 | 3 |
位置 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 |
比特 | 0 | 2 | 1 | 3 | 2 | 4 | 3 | 2 | 3 | 4 | 4 | 2 | 1 | 1 | 3 | 0 | 4 |
位置 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 |
比特 | 0 | 0 | 2 | 1 | 3 | 4 | 1 | 2 | 2 | ||||||||
位置 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 |
迭代次数 | Alice与Bob制备基 | Bob编码 | |||||||
---|---|---|---|---|---|---|---|---|---|
3 | 1 | 2 | 0 | 4 | 3 | ||||
1 | 2 | 0 | 1 | 3 | 2 | ||||
2 | 0 | 2 | 4 | 2 | 2 | ||||
0 | 2 | 0 | 0 | 2 | 2 | ||||
2 | 0 | 0 | 2 | 2 | 0 | ||||
4 | 0 | 1 | 0 | 4 | 1 |
迭代次数 | Alice解码所用基 | Alice测量结果 | ||||
---|---|---|---|---|---|---|
4 | 1 | 3 | ||||
1 | 1 | 2 | ||||
2 | 2 | 1 | ||||
3 | 4 | 4 | ||||
0 | 0 | 0 | ||||
3 | 2 | 1 |
Alice解码 | Bob解码所用基 | Bob测量结果 | ||
---|---|---|---|---|
2 | 2 | 2 | ||
4 | 3 | 4 | ||
1 | 3 | 1 | ||
2 | 2 | 2 | ||
3 | 0 | 3 | ||
0 | 4 | 0 |
[1] | LI Xiaoyu, BARNUM H. Quantum Authentication Using Entangled States[J]. International Journal of Foundations of Computer Science, 2004, 15(4): 609-617. |
[2] | WANG Jian, ZHANG Quan, TANG Chaojing. Multiparty Simultaneous Quantum Identity Authentication Based on Entanglement Swapping[J]. Chinese Physics Letters, 2006, 23(9): 2360-2363. |
[3] | LIU Lijuan, LI Zhihui, ZHI Danli. A Multi-Party Quantum Key Distribution Protocol with Quantum Identity Authentication[J]. Netinfo Security, 2020, 20(11): 59-66. |
刘利娟, 李志慧, 支丹利. 可实现身份认证的多方量子密钥分发协议[J]. 信息网络安全, 2020, 20(11): 59-66. | |
[4] | LI Xiang, ZHANG Kejia, ZHANG Long, et al. A New Quantum Multiparty Simultaneous Identity Authentication Protocol with the Classical Third-Party[EB/OL]. (2022-05-30)[2024-04-25]. https://pubmed.ncbi.nlm.nih.gov/35455145/. |
[5] | ZHANG Shun, CHEN Zhangkai, LIANG Fengyu, et al. A Quantum Identity Authentication Based on Bell State[J]. Netinfo Security, 2019, 19(11): 43-48. |
张顺, 陈张凯, 梁风雨, 等. 基于Bell态的量子双向身份认证协议[J]. 信息网络安全, 2019, 19(11): 43-48. | |
[6] | ZHONG Jifeng, RUAN Banyao, LIU Zhihao. Quantum Secret Sharing with Identity Authentication Based on GHZ States Entanglement Swapping[EB/OL]. (2023-10-15)[2024-04-25]. https://link.springer.com/article/10.1007/s10773-023-05455-0#citeas. |
[7] | ZHANG Zheshen, ZENG Guihua, ZHOU Nanrun, et al. Quantum Identity Authentication Based on Ping-Pong Technique for Photons[J]. Physics Letters A, 2006, 356(3): 199-205. |
[8] | ZHANG Shun, CHEN Zhangkai, SHI Runhua, et al. A Novel Quantum Identity Authentication Based on Bell States[J]. International Journal of Theoretical Physics, 2020, 59(1): 236-249. |
[9] | MIHARA T. Quantum Identification Schemes with Entanglements[EB/OL]. (2002-05-08)[2024-04-25]. https://journals.aps.org/pra/abstract/10.1103/PhysRevA.65.052326. |
[10] | LJUNGGREN D, KARLSSON A, BOURENNANE M. Authority-Based User Authentication in Quantum Key Distribution[EB/OL]. [2024-04-25]. https://www.nstl.gov.cn/paper_detail.html?id=3f85086e6a8da4313351ca0f000b833d. |
[11] | MAJUMDAR R, DAS S. SOK: An Evaluation of Quantum Authentication through Systematic Literature Review[EB/OL]. [2024-04-25]. https://xueshu.baidu.com/usercenter/paper/show?paperid=1r3k0c60a0510ax0n4340c30t9582975&site=xueshu_se. |
[12] | YUAN Hao, LIU Yimin, PAN Guozhu, et al. Quantum Identity Authentication Based on Ping-Pong Technique without Entanglements[J]. Quantum Information Processing, 2014, 13(11): 2535-2549. |
[13] | LUCAMARINI M, MANCINI S. Secure Deterministic Communication without Entanglement[EB/OL]. (2005-04-14)[2024-04-25]. https://journals.aps.org/prl/abstract/10.1103/PhysRevLett.94.140501. |
[14] | SHI Weimin, ZHANG Jianbiao, ZHOU Yihua, et al. A Novel Quantum Deniable Authentication Protocol without Entanglement[J]. Quantum Information Processing, 2015, 14(6): 2183-2193. |
[15] | SHI Weimin, ZHOU Yihua, YANG Yuguang. Quantum Deniable Authentication Protocol[J]. Quantum Information Processing, 2014, 13(7): 1501-1510. |
[16] | GOTTESMAN D, CHUANG I. Quantum Digital Signatures[EB/OL]. (2002-12-26)[2024-04-25]. https://arxiv.org/pdf/quant-ph/0105032. |
[17] | RASS S, KÖNIG S, SCHAUER, et al. Implementation and Evaluation of Intrinsic Authentication in Quantum Key Distribution Protocols[J]. International Journal on Advances in Security, 2016, 9(1): 59-65. |
[18] | HONG C H, HEO J, JANG J G, et al. Quantum Identity Authentication with Single Photon[EB/OL]. (2017-08-17)[2024-04-25]. https://link.springer.com/article/10.1007/s11128-017-1681-0. |
[19] | RAO B D, JAYARAMAN R. A Novel Quantum Identity Authentication Protocol without Entanglement and Preserving Pre-Shared Key Information[EB/OL]. (2023-01-31)[2024-04-25]. https://link.springer.com/article/10.1007/s11128-023-03832-6. |
[20] | ZHANG Qi, DU Mingming, ZHONG Wei, et al. Single-Photon Based Three-Party Quantum Secure Direct Communication with Identity Authentication[EB/OL]. (2023-11-27)[2024-04-25]. https://onlinelibrary.wiley.com/doi/10.1002/andp.202300407. |
[21] | WANG Yuqi, JIAN Liya, LIU Shiming, et al. Two-Party Quantum Identity Authentication without Entanglement[EB/OL]. (2023-10-09)[2024-04-25]. https://pubs.aip.org/aip/jap/article-abstract/134/14/144401/2915874/Two-party-quantum-identity-authentication-without?redirectedFrom=fulltext. |
[22] | XU Yuguang, ZHANG Lu, ZHU Hongfeng. Quantum Mutual Implicit Authentication Key Agreement Protocol without Entanglement with Key Recycling[EB/OL]. (2023-11-14)[2024-04-25]. https://link.springer.com/article/10.1007/s10773-023-05501-x. |
[23] | LI Guodong, LIU Jiacheng, WANG Qingle, et al. Employing Single Photons for Measurement-Device-Independent Quantum Secure Direct Communication with Identity Authentication[J]. IEEE Communications Letters, 2024, 28(3): 473-477. |
[24] | AZAHARI N S B, HARUN N Z B, AHMAD ZUKARNAIN Z B. Quantum Identity Authentication for Non-Entanglement Multiparty Communication: A Review, State of Art and Future Directions[J]. ICT Express, 2023, 9(4): 534-547. |
[25] | IVONOVIC I D. Geometrical Description of Quantal State Determination[J]. Journal of Physics A: Mathematical and General, 1981, 14(12): 3241-3245. |
[26] | WOOTTERS W K, FIELDS B D. Optimal State-Determination by Mutually Unbiased Measurements[J]. Annals of Physics, 1989, 191(2): 363-381. |
[27] | QIN Huawang, TSO R, DAI Yuewei. Multi-Dimensional Quantum State Sharing Based on Quantum Fourier Transform[EB/OL]. (2018-01-24)[2024-04-25]. https://link.springer.com/article/10.1007/s11128-018-1827-8. |
[28] | NIELSEN M A, CHUANG I L. Quantum Computation and Quantum Information[M]. Cambridge: Cambridge University Press, 2000. |
[29] |
SHOR P W, PRESKILL J. Simple Proof of Security of the BB84 Quantum Key Distribution Protocol[J]. Physical Review Letters, 2000, 85(2): 441-444.
pmid: 10991303 |
[1] | Shun ZHANG, Zhangkai CHEN, Fengyu LIANG, Runhua SHI. A Quantum Identity Authentication Based on Bell State [J]. Netinfo Security, 2019, 19(11): 43-48. |
[2] | Wei GUO, Shucui XIE, Jianzhong ZHANG, Hongzhen DU. Research on Quantum Information Sharing of a Three-particle Entangled State via a GHZ State [J]. Netinfo Security, 2016, 16(1): 24-28. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||