Abstract
Shi et al. (Phys. Lett. A 281:83–87, 2001) proposed a scheme which allows simultaneous realization of quantum key distribution and quantum authentication. However, this study points out a weakness in Shi et al.’s scheme, in which a malicious user can impersonate a legitimate participant without being detected. Furthermore, an improved scheme is proposed to avoid this weakness.
Similar content being viewed by others
References
Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing (invited paper). In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, Dec., pp. 175–179 (1984)
Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121–3124 (1992)
Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65, 0323021 (2002)
Li, C., Song, H.S., Zhou, L., Wu, C.F.: A random quantum key distribution achieved by using Bell states. J. Opt. B, Quantum Semiclass. Opt. 5(2), 155–157 (2003)
Song, D.: Secure key distribution by swapping quantum entanglement. Phys. Rev. A 69(3), 034301 (2004)
Namiki, R., Hirono, T.: Efficient-phase-encoding protocols for continuous-variable quantum key distribution using coherent states and postselection. Phys. Rev. A 74, 032302 (2006)
Hwang, T., Lee, K.C.: EPR quantum key distribution protocols with potential 100% qubit efficiency. IET Proc. Inf. Secur. 1, 43–45 (2007)
Hwang, H., Lee, K.C., Li, C.M.: Provably secure three-party authenticated quantum key distribution protocols. IEEE Trans. Dependable Secure Comput. 4, 71–80 (2007)
Gan, G.: Quantum key distribution scheme with high efficiency. Commun. Theor. Phys. 51(5), 820–822 (2009)
Dušek, M., Haderka, Q., Hendrych, M., Myška, R.: Quantum identification system. Phys. Rev. A 60(1), 149–155 (1998)
Ljunggren, D., Bourennane, M., Karlsson, A.: Authority-based user authentication in quantum key distribution. Phys. Rev. A 62, 022305 (2000)
Zeng, G.H., Zhang, W.P.: Identity verification in quantum key distribution. Phys. Rev. A 61, 022303 (2000)
Shi, B.S., Li, J., Liu, J.M., Fan, X.F., Guo, G.C.: Quantum key distribution and quantum authentication based on entangled state. Phys. Lett. A 281, 83–87 (2001)
Curty, M., Santos, D.J.: Quantum authentication of classical messages. Phys. Rev. A 64, 062309 (2001)
Mihara, T.: Quantum identification schemes with entanglements. Phys. Rev. A 65, 052326 (2002)
Li, X.O.: Quantum authentication using entangled states. Int. J. Found. Comput. Sci. 15(4), 609–617 (2004)
Zhou, N.R., Zeng, G.H., Zeng, W.J., Zhu, F.H.: Cross-center quantum identification scheme based on teleportation and entanglement swapping. Opt. Commun. 254, 380–388 (2005)
Zhang, Z.H., Zeng, G.H., Zhou, N.R., Xiong, J.: Quantum identity authentication based on ping-pong technique for photons. Phys. Lett. A 356, 199–205 (2006)
Yang, Y.G., Wen, Q.Y., Zhu, F.C.: An efficient quantum secure direct communication scheme with authentication. Chin. Phys. B 16(7), 1838–1842 (2007)
Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Secure authentication of classical messages with single photons. Chin. Phys. B 18(8), 3189–3192 (2009)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wei, TS., Tsai, CW. & Hwang, T. Comment on “Quantum Key Distribution and Quantum Authentication Based on Entangled State”. Int J Theor Phys 50, 2703–2707 (2011). https://doi.org/10.1007/s10773-011-0768-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-011-0768-0