Skip to main content
Log in

Quantum identity authentication based on ping-pong technique without entanglements

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

A quantum identity authentication scheme based on ping-pong technique without entanglements is proposed. It can verify the legitimate user’s identity and update the initial authentication key for reuse. The security of the proposed scheme is extensively analyzed and accordingly confirmed in the case of general individual attacks. The present scheme owns high efficiency due to the use of single-particle states in a two-way quantum channel. Moreover, the scheme is economical and feasible with present-day technique.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Créau, C., Salvail, L.: Advances in Cryptology. In: Proceedings of Eurocrypt ’ 95, p. 133. Springer, Berlin (1995)

  2. Bennett, C.H., Brassard, G., Créau, C., Skubiszewska, M.H.: Advances in Cryptology. In: Proceedings of Crypto ’ 91. Lecture Notes in Computer Science, vol. 576, p. 133. Springer, Berlin (1992)

  3. Mayers, D.: The trouble with quantum bit commitment. e-print quant/9603015 (1996)

  4. Dušek, M., Hadeřka, O., Hendrych, M., Myška, R.: Quantum identification system. Phys. Rev. A 60, 149 (1999)

    Article  ADS  Google Scholar 

  5. Zeng, G., Zhang, W.: Identity verification in quantum key distribution. Phys. Rev. A 61, 022303 (2000)

    Article  ADS  Google Scholar 

  6. Ljunggren, D., Bourennane, M., Karlsson, A.: Authority-based user authentication in quantum key distribution. Phys. Rev. A 62, 022305 (2000)

    Article  ADS  Google Scholar 

  7. Mihara, T.: Quantum identification schemes with entanglements. Phys. Rev. A 65, 052326 (2002)

    Article  ADS  Google Scholar 

  8. Zhou, N., Zeng, G.H., Zeng, W.J., Zhu, F.C.: Cross-center quantum identification scheme based on teleportation and entanglement swapping. Opt. Commun. 254, 380 (2005)

    Article  ADS  Google Scholar 

  9. Lee, H., Lim, J., Yang, H.J.: Quantum direct communication with authentication. Phys. Rev. A 73, 042305 (2006)

    Article  ADS  Google Scholar 

  10. Zhang, Z.J., Liu, J., Wang, D., Shi, S.H.: Comment on quantum direct communication with authentication. Phys. Rev. A 75, 026301 (2007)

    Article  ADS  Google Scholar 

  11. Zhang, Z., Zeng, G., Zhou, N., Xiong, J.: Quantum identity authentication based on ping-pong technique for photons. Phys. Lett. A 356, 199 (2006)

    Article  ADS  MATH  Google Scholar 

  12. Yen, C.A., Horng, S.J., Goan, H.S., Kao, T.W., Chou, Y.H.: Quantum direct communication with mutual authentication. Quantum Inf. Comput. 9, 376 (2009)

    MathSciNet  MATH  Google Scholar 

  13. Liu, D., Pei, C.X., Quan, D.X., Zhao, N.: A new quantum secure direct communication scheme with authentication. Chin. Phys. Lett. 27, 050306 (2010)

    Article  ADS  Google Scholar 

  14. Yang, J., Wang, C., Zhang, R.: Quantum secure direct communication with authentication expansion using single photons. Commun. Theor. Phys. 54, 829 (2010)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  15. Tsai, C.W., Wei, T.S., Hwang, T.: One- way quantum authenticated secure communication using rotation operation. Commun. Theor. Phys. 56, 1023 (2011)

    Article  ADS  MATH  Google Scholar 

  16. Sun, Z.W., Du, R.G., Long, D.Y.: Quantum secure direct communication with quantum identification. Int. J. Quantum Inf. 10, 125008 (2012)

    MathSciNet  Google Scholar 

  17. Chang, Y., Zhang, S.B., Yan, L.L., Sheng, Z.: A multiparty controlled bidirectional quantum secure direct communication and authentication protocol based on EPR pairs. Chin. Phys. Lett. 30, 060301 (2013)

    Article  ADS  Google Scholar 

  18. Yang, Y.G., Tian, J., Xia, J., Zhang, H.: Quantum authenticated direct communication using Bell states. Int. J. Theor. Phys. 52, 336 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  19. Yu, C.H., Guo, G.D., Lin, S.: Quantum secure direct communication with authentication using two nonorthogonal states. Int. J. Theor. Phys. 52, 1937 (2013)

    Article  MathSciNet  Google Scholar 

  20. Yang, Y.G., Wang, H.Y., Jia, X., Zhang, H.: A quantum protocol for (t, n)-threshold identity authentication based on Greenberger–Horne–Zeilinger states. Int. J. Theor. Phys. 52, 524 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  21. Lin, S., Huang, C., Liu, X.F.: Multi-user quantum key distribution based on Bell states with mutual authentication. Phys. Scr. 87, 035008 (2013)

    Article  ADS  Google Scholar 

  22. Boström, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)

    Article  ADS  Google Scholar 

  23. Cai, Q.Y.: The “Ping-Pong” protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91, 109801 (2003)

    Article  ADS  Google Scholar 

  24. Cai, Q.Y., Li, B.W.: Improving the capacity of the Boström–Felbinger protocol. Phys. Rev. A 69, 054301 (2004)

    Article  ADS  Google Scholar 

  25. Wojcik, A.: Eavesdropping on the “ping-pong” quantum communication protocol. Phys. Rev. Lett. 90, 157901 (2003)

    Article  ADS  Google Scholar 

  26. Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23 (2006)

    Article  ADS  MATH  Google Scholar 

  27. Lucamarini, M., Mancini, S.: Secure deterministic communication without entanglement. Phys. Rev. Lett. 94, 140501 (2005)

  28. Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145 (2002)

    Article  ADS  Google Scholar 

  29. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: International Conference of Computers in Systems and Signal Processing, Dec 1984, Bangalore, India (IEEE, New York 1984), p. 175 (1984)

  30. Li, X.H., Deng, F.G., Li, C.Y., Liang, Y.J., Zhou, P., Zhou, H.Y.: Deterministic secure quantum communication without maximally entangled states. J. Kerean Phys. Soc. 49, 1354 (2006)

    Google Scholar 

Download references

Acknowledgments

This work is supported by the Talent Project of the West AnHui University for Outstanding Youth under Grant No. 0044113017, the National Undergraduate Innovation and Entrepreneurship Training Program Project under Grant No. 201210376008, the Program for Excellent Talents at the University of Guangdong Province (Guangdong Teacher Letter [1010] No. 79), the 211 Project of Anhui University, the Key Project of Natural Science Fund in Anhui Province under Grant Nos. KJ2013A258 and KJ2013A261, the Anhui Provincial Natural Science Foundation under Nos. 1408085MA20 and 1408085QA13, the National Natural Science Foundation of China under Grant Nos. 10874122, 10975001, 51072002, 51272003, and 61375121.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hao Yuan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yuan, H., Liu, Ym., Pan, Gz. et al. Quantum identity authentication based on ping-pong technique without entanglements. Quantum Inf Process 13, 2535–2549 (2014). https://doi.org/10.1007/s11128-014-0808-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11128-014-0808-9

Keywords

Navigation