Skip to main content
Log in

Comment on “Quantum Key Distribution and Quantum Authentication Based on Entangled State”

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

Shi et al. (Phys. Lett. A 281:83–87, 2001) proposed a scheme which allows simultaneous realization of quantum key distribution and quantum authentication. However, this study points out a weakness in Shi et al.’s scheme, in which a malicious user can impersonate a legitimate participant without being detected. Furthermore, an improved scheme is proposed to avoid this weakness.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing (invited paper). In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, Dec., pp. 175–179 (1984)

    Google Scholar 

  2. Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121–3124 (1992)

    Article  ADS  MATH  MathSciNet  Google Scholar 

  3. Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65, 0323021 (2002)

    Article  Google Scholar 

  4. Li, C., Song, H.S., Zhou, L., Wu, C.F.: A random quantum key distribution achieved by using Bell states. J. Opt. B, Quantum Semiclass. Opt. 5(2), 155–157 (2003)

    Article  ADS  Google Scholar 

  5. Song, D.: Secure key distribution by swapping quantum entanglement. Phys. Rev. A 69(3), 034301 (2004)

    Article  ADS  Google Scholar 

  6. Namiki, R., Hirono, T.: Efficient-phase-encoding protocols for continuous-variable quantum key distribution using coherent states and postselection. Phys. Rev. A 74, 032302 (2006)

    Article  ADS  Google Scholar 

  7. Hwang, T., Lee, K.C.: EPR quantum key distribution protocols with potential 100% qubit efficiency. IET Proc. Inf. Secur. 1, 43–45 (2007)

    Article  Google Scholar 

  8. Hwang, H., Lee, K.C., Li, C.M.: Provably secure three-party authenticated quantum key distribution protocols. IEEE Trans. Dependable Secure Comput. 4, 71–80 (2007)

    Article  Google Scholar 

  9. Gan, G.: Quantum key distribution scheme with high efficiency. Commun. Theor. Phys. 51(5), 820–822 (2009)

    Article  ADS  MATH  MathSciNet  Google Scholar 

  10. Dušek, M., Haderka, Q., Hendrych, M., Myška, R.: Quantum identification system. Phys. Rev. A 60(1), 149–155 (1998)

    ADS  Google Scholar 

  11. Ljunggren, D., Bourennane, M., Karlsson, A.: Authority-based user authentication in quantum key distribution. Phys. Rev. A 62, 022305 (2000)

    Article  ADS  Google Scholar 

  12. Zeng, G.H., Zhang, W.P.: Identity verification in quantum key distribution. Phys. Rev. A 61, 022303 (2000)

    Article  ADS  Google Scholar 

  13. Shi, B.S., Li, J., Liu, J.M., Fan, X.F., Guo, G.C.: Quantum key distribution and quantum authentication based on entangled state. Phys. Lett. A 281, 83–87 (2001)

    Article  ADS  MATH  MathSciNet  Google Scholar 

  14. Curty, M., Santos, D.J.: Quantum authentication of classical messages. Phys. Rev. A 64, 062309 (2001)

    Article  ADS  Google Scholar 

  15. Mihara, T.: Quantum identification schemes with entanglements. Phys. Rev. A 65, 052326 (2002)

    Article  ADS  Google Scholar 

  16. Li, X.O.: Quantum authentication using entangled states. Int. J. Found. Comput. Sci. 15(4), 609–617 (2004)

    Article  MATH  Google Scholar 

  17. Zhou, N.R., Zeng, G.H., Zeng, W.J., Zhu, F.H.: Cross-center quantum identification scheme based on teleportation and entanglement swapping. Opt. Commun. 254, 380–388 (2005)

    Article  ADS  Google Scholar 

  18. Zhang, Z.H., Zeng, G.H., Zhou, N.R., Xiong, J.: Quantum identity authentication based on ping-pong technique for photons. Phys. Lett. A 356, 199–205 (2006)

    Article  ADS  MATH  Google Scholar 

  19. Yang, Y.G., Wen, Q.Y., Zhu, F.C.: An efficient quantum secure direct communication scheme with authentication. Chin. Phys. B 16(7), 1838–1842 (2007)

    Article  ADS  Google Scholar 

  20. Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Secure authentication of classical messages with single photons. Chin. Phys. B 18(8), 3189–3192 (2009)

    Article  ADS  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tzonelih Hwang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wei, TS., Tsai, CW. & Hwang, T. Comment on “Quantum Key Distribution and Quantum Authentication Based on Entangled State”. Int J Theor Phys 50, 2703–2707 (2011). https://doi.org/10.1007/s10773-011-0768-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-011-0768-0

Keywords

Navigation