Abstract
Based on the entanglement swapping, a quantum authentication scheme with a trusted- party is proposed in this paper. With this scheme, two users can perform mutual identity authentication to confirm each other’s validity. In addition, the scheme is proved to be secure under circumstances where a malicious attacker is capable of monitoring the classical and quantum channels and has the power to forge all information on the public channel.
Similar content being viewed by others
References
Dusek, M., Haderka, O., Hendrych, M., Myska, R.: Quantum identification system. Phys. Rev. A 60(1), 149–156 (1999)
Xiao-jun, W.: Research on secure quantum identification and information signature protocols. Ph.D., Beijing Jiaotong University (2008)
Wen-jie, Z., Nan-run, Z., Gui-hua, Z.: Cross-center quantum identity authentication scheme based on teleportation. J. Optoelectron. 16(1) (2005)
Xiao-jun, W.: Identification scheme in quantum communication network. Beijing Jiaotong University 28(5) (2004)
Mihara, T.: Quantum identification schemes with entanglements. Phys. Rev. A 65(5) (2002)
Zukowski, M., Zeilinger, A., Horne, M.A., Ekert, A.K.: Event-ready-detectors bell experiment via entanglement swapping. Phys. Rev. Lett. 71(26), 4287–4290 (1993)
Bennett, C.H., Brassard, G., Crepeau, C., Jozsa, R., Peres, A., Wootters, W.K.: Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 70(13), 1895–1899 (1993)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Penghao, N., Yuan, C. & Chong, L. Quantum Authentication Scheme Based on Entanglement Swapping. Int J Theor Phys 55, 302–312 (2016). https://doi.org/10.1007/s10773-015-2662-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-015-2662-7