Skip to main content

Quantum Identity-Authentication Scheme Based on Randomly Selected Third-Party

  • Conference paper
  • First Online:
Proceedings of the Fifth Euro-China Conference on Intelligent Data Analysis and Applications (ECC 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 891))

  • 707 Accesses

Abstract

In our article we give a scheme to complete identity-authentication by quantum fingerprinting. Our scheme can overcome the vulnerability of one certification authority and tolerate a controlled error. The cost of our scheme is \( {\text{k}}\log_{2} (n) \) for n bit classical identity information while the complexity of quantum circuit in our scheme is also \( {\text{k}}\log_{2} (n) \).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bryant, W.: Designing an authentication system: a dialogue in four scenes. Project Athena document, February 1988

    Google Scholar 

  2. I’Anson, C., Mitchell, C.: Security defects in CCITT recommendation X.509 the directory authentication framework. Computer communications Review, April 1990

    Article  Google Scholar 

  3. Bennett, C.H., Brassard G.: An update on quantum crytography. Advances in Cryptology. In: Proceeding of Crypto 1984, Barbara, pp 475–480. Springer, Heidelberg (1985)

    Google Scholar 

  4. Mosca, M., Stebila, D., Ustaoglu, B.: Quantum Key Distribution in the Classical Authenticated Key Exchange Framework, Jun 2012. arXiv:1206.6150v1,27

  5. Zeng, G.: Quantum Private Communication, 173 p. Higher Education Press, Beijing (2010)

    Book  Google Scholar 

  6. Buhrman, H., Cleve, R., Watrous, J., de Wolf, R.: Quantum fingerprinting. Phys. Rev. Lett. 87(16), 167902 (2001)

    Article  Google Scholar 

  7. Gottesman, D., Chuang, I.: Quantum digital signatures. Technical Report, Cornell University Library, November 2001. arXiv:quant-ph/0105032

  8. Ablayev, F.: Alexander Vasiliev, Quantum Hashing, Oct 2013. arXiv:1310.4922v1,18

  9. Koca, C., Akan, O.B.: Quantum Memory Management Systems. ACM (2015). ISBN 9781-4503-3674-1/15/09

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhiwen Zhao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zheng, X., Zhang, F., Zhao, Z. (2019). Quantum Identity-Authentication Scheme Based on Randomly Selected Third-Party. In: Krömer, P., Zhang, H., Liang, Y., Pan, JS. (eds) Proceedings of the Fifth Euro-China Conference on Intelligent Data Analysis and Applications. ECC 2018. Advances in Intelligent Systems and Computing, vol 891. Springer, Cham. https://doi.org/10.1007/978-3-030-03766-6_40

Download citation

Publish with us

Policies and ethics