[1] |
LI Xiaoyu, BARNUM H. Quantum Authentication Using Entangled States[J]. International Journal of Foundations of Computer Science, 2004, 15(4): 609-617.
|
[2] |
WANG Jian, ZHANG Quan, TANG Chaojing. Multiparty Simultaneous Quantum Identity Authentication Based on Entanglement Swapping[J]. Chinese Physics Letters, 2006, 23(9): 2360-2363.
|
[3] |
LIU Lijuan, LI Zhihui, ZHI Danli. A Multi-Party Quantum Key Distribution Protocol with Quantum Identity Authentication[J]. Netinfo Security, 2020, 20(11): 59-66.
|
|
刘利娟, 李志慧, 支丹利. 可实现身份认证的多方量子密钥分发协议[J]. 信息网络安全, 2020, 20(11): 59-66.
|
[4] |
LI Xiang, ZHANG Kejia, ZHANG Long, et al. A New Quantum Multiparty Simultaneous Identity Authentication Protocol with the Classical Third-Party[EB/OL]. (2022-05-30)[2024-04-25]. https://pubmed.ncbi.nlm.nih.gov/35455145/.
|
[5] |
ZHANG Shun, CHEN Zhangkai, LIANG Fengyu, et al. A Quantum Identity Authentication Based on Bell State[J]. Netinfo Security, 2019, 19(11): 43-48.
|
|
张顺, 陈张凯, 梁风雨, 等. 基于Bell态的量子双向身份认证协议[J]. 信息网络安全, 2019, 19(11): 43-48.
|
[6] |
ZHONG Jifeng, RUAN Banyao, LIU Zhihao. Quantum Secret Sharing with Identity Authentication Based on GHZ States Entanglement Swapping[EB/OL]. (2023-10-15)[2024-04-25]. https://link.springer.com/article/10.1007/s10773-023-05455-0#citeas.
|
[7] |
ZHANG Zheshen, ZENG Guihua, ZHOU Nanrun, et al. Quantum Identity Authentication Based on Ping-Pong Technique for Photons[J]. Physics Letters A, 2006, 356(3): 199-205.
|
[8] |
ZHANG Shun, CHEN Zhangkai, SHI Runhua, et al. A Novel Quantum Identity Authentication Based on Bell States[J]. International Journal of Theoretical Physics, 2020, 59(1): 236-249.
|
[9] |
MIHARA T. Quantum Identification Schemes with Entanglements[EB/OL]. (2002-05-08)[2024-04-25]. https://journals.aps.org/pra/abstract/10.1103/PhysRevA.65.052326.
|
[10] |
LJUNGGREN D, KARLSSON A, BOURENNANE M. Authority-Based User Authentication in Quantum Key Distribution[EB/OL]. [2024-04-25]. https://www.nstl.gov.cn/paper_detail.html?id=3f85086e6a8da4313351ca0f000b833d.
|
[11] |
MAJUMDAR R, DAS S. SOK: An Evaluation of Quantum Authentication through Systematic Literature Review[EB/OL]. [2024-04-25]. https://xueshu.baidu.com/usercenter/paper/show?paperid=1r3k0c60a0510ax0n4340c30t9582975&site=xueshu_se.
|
[12] |
YUAN Hao, LIU Yimin, PAN Guozhu, et al. Quantum Identity Authentication Based on Ping-Pong Technique without Entanglements[J]. Quantum Information Processing, 2014, 13(11): 2535-2549.
|
[13] |
LUCAMARINI M, MANCINI S. Secure Deterministic Communication without Entanglement[EB/OL]. (2005-04-14)[2024-04-25]. https://journals.aps.org/prl/abstract/10.1103/PhysRevLett.94.140501.
|
[14] |
SHI Weimin, ZHANG Jianbiao, ZHOU Yihua, et al. A Novel Quantum Deniable Authentication Protocol without Entanglement[J]. Quantum Information Processing, 2015, 14(6): 2183-2193.
|
[15] |
SHI Weimin, ZHOU Yihua, YANG Yuguang. Quantum Deniable Authentication Protocol[J]. Quantum Information Processing, 2014, 13(7): 1501-1510.
|
[16] |
GOTTESMAN D, CHUANG I. Quantum Digital Signatures[EB/OL]. (2002-12-26)[2024-04-25]. https://arxiv.org/pdf/quant-ph/0105032.
|
[17] |
RASS S, KÖNIG S, SCHAUER, et al. Implementation and Evaluation of Intrinsic Authentication in Quantum Key Distribution Protocols[J]. International Journal on Advances in Security, 2016, 9(1): 59-65.
|
[18] |
HONG C H, HEO J, JANG J G, et al. Quantum Identity Authentication with Single Photon[EB/OL]. (2017-08-17)[2024-04-25]. https://link.springer.com/article/10.1007/s11128-017-1681-0.
|
[19] |
RAO B D, JAYARAMAN R. A Novel Quantum Identity Authentication Protocol without Entanglement and Preserving Pre-Shared Key Information[EB/OL]. (2023-01-31)[2024-04-25]. https://link.springer.com/article/10.1007/s11128-023-03832-6.
|
[20] |
ZHANG Qi, DU Mingming, ZHONG Wei, et al. Single-Photon Based Three-Party Quantum Secure Direct Communication with Identity Authentication[EB/OL]. (2023-11-27)[2024-04-25]. https://onlinelibrary.wiley.com/doi/10.1002/andp.202300407.
|
[21] |
WANG Yuqi, JIAN Liya, LIU Shiming, et al. Two-Party Quantum Identity Authentication without Entanglement[EB/OL]. (2023-10-09)[2024-04-25]. https://pubs.aip.org/aip/jap/article-abstract/134/14/144401/2915874/Two-party-quantum-identity-authentication-without?redirectedFrom=fulltext.
|
[22] |
XU Yuguang, ZHANG Lu, ZHU Hongfeng. Quantum Mutual Implicit Authentication Key Agreement Protocol without Entanglement with Key Recycling[EB/OL]. (2023-11-14)[2024-04-25]. https://link.springer.com/article/10.1007/s10773-023-05501-x.
|
[23] |
LI Guodong, LIU Jiacheng, WANG Qingle, et al. Employing Single Photons for Measurement-Device-Independent Quantum Secure Direct Communication with Identity Authentication[J]. IEEE Communications Letters, 2024, 28(3): 473-477.
|
[24] |
AZAHARI N S B, HARUN N Z B, AHMAD ZUKARNAIN Z B. Quantum Identity Authentication for Non-Entanglement Multiparty Communication: A Review, State of Art and Future Directions[J]. ICT Express, 2023, 9(4): 534-547.
|
[25] |
IVONOVIC I D. Geometrical Description of Quantal State Determination[J]. Journal of Physics A: Mathematical and General, 1981, 14(12): 3241-3245.
|
[26] |
WOOTTERS W K, FIELDS B D. Optimal State-Determination by Mutually Unbiased Measurements[J]. Annals of Physics, 1989, 191(2): 363-381.
|
[27] |
QIN Huawang, TSO R, DAI Yuewei. Multi-Dimensional Quantum State Sharing Based on Quantum Fourier Transform[EB/OL]. (2018-01-24)[2024-04-25]. https://link.springer.com/article/10.1007/s11128-018-1827-8.
|
[28] |
NIELSEN M A, CHUANG I L. Quantum Computation and Quantum Information[M]. Cambridge: Cambridge University Press, 2000.
|
[29] |
SHOR P W, PRESKILL J. Simple Proof of Security of the BB84 Quantum Key Distribution Protocol[J]. Physical Review Letters, 2000, 85(2): 441-444.
pmid: 10991303
|