Abstract
A quantum identity authentication scheme based on ping-pong technique without entanglements is proposed. It can verify the legitimate user’s identity and update the initial authentication key for reuse. The security of the proposed scheme is extensively analyzed and accordingly confirmed in the case of general individual attacks. The present scheme owns high efficiency due to the use of single-particle states in a two-way quantum channel. Moreover, the scheme is economical and feasible with present-day technique.
Similar content being viewed by others
References
Créau, C., Salvail, L.: Advances in Cryptology. In: Proceedings of Eurocrypt ’ 95, p. 133. Springer, Berlin (1995)
Bennett, C.H., Brassard, G., Créau, C., Skubiszewska, M.H.: Advances in Cryptology. In: Proceedings of Crypto ’ 91. Lecture Notes in Computer Science, vol. 576, p. 133. Springer, Berlin (1992)
Mayers, D.: The trouble with quantum bit commitment. e-print quant/9603015 (1996)
Dušek, M., Hadeřka, O., Hendrych, M., Myška, R.: Quantum identification system. Phys. Rev. A 60, 149 (1999)
Zeng, G., Zhang, W.: Identity verification in quantum key distribution. Phys. Rev. A 61, 022303 (2000)
Ljunggren, D., Bourennane, M., Karlsson, A.: Authority-based user authentication in quantum key distribution. Phys. Rev. A 62, 022305 (2000)
Mihara, T.: Quantum identification schemes with entanglements. Phys. Rev. A 65, 052326 (2002)
Zhou, N., Zeng, G.H., Zeng, W.J., Zhu, F.C.: Cross-center quantum identification scheme based on teleportation and entanglement swapping. Opt. Commun. 254, 380 (2005)
Lee, H., Lim, J., Yang, H.J.: Quantum direct communication with authentication. Phys. Rev. A 73, 042305 (2006)
Zhang, Z.J., Liu, J., Wang, D., Shi, S.H.: Comment on quantum direct communication with authentication. Phys. Rev. A 75, 026301 (2007)
Zhang, Z., Zeng, G., Zhou, N., Xiong, J.: Quantum identity authentication based on ping-pong technique for photons. Phys. Lett. A 356, 199 (2006)
Yen, C.A., Horng, S.J., Goan, H.S., Kao, T.W., Chou, Y.H.: Quantum direct communication with mutual authentication. Quantum Inf. Comput. 9, 376 (2009)
Liu, D., Pei, C.X., Quan, D.X., Zhao, N.: A new quantum secure direct communication scheme with authentication. Chin. Phys. Lett. 27, 050306 (2010)
Yang, J., Wang, C., Zhang, R.: Quantum secure direct communication with authentication expansion using single photons. Commun. Theor. Phys. 54, 829 (2010)
Tsai, C.W., Wei, T.S., Hwang, T.: One- way quantum authenticated secure communication using rotation operation. Commun. Theor. Phys. 56, 1023 (2011)
Sun, Z.W., Du, R.G., Long, D.Y.: Quantum secure direct communication with quantum identification. Int. J. Quantum Inf. 10, 125008 (2012)
Chang, Y., Zhang, S.B., Yan, L.L., Sheng, Z.: A multiparty controlled bidirectional quantum secure direct communication and authentication protocol based on EPR pairs. Chin. Phys. Lett. 30, 060301 (2013)
Yang, Y.G., Tian, J., Xia, J., Zhang, H.: Quantum authenticated direct communication using Bell states. Int. J. Theor. Phys. 52, 336 (2013)
Yu, C.H., Guo, G.D., Lin, S.: Quantum secure direct communication with authentication using two nonorthogonal states. Int. J. Theor. Phys. 52, 1937 (2013)
Yang, Y.G., Wang, H.Y., Jia, X., Zhang, H.: A quantum protocol for (t, n)-threshold identity authentication based on Greenberger–Horne–Zeilinger states. Int. J. Theor. Phys. 52, 524 (2013)
Lin, S., Huang, C., Liu, X.F.: Multi-user quantum key distribution based on Bell states with mutual authentication. Phys. Scr. 87, 035008 (2013)
Boström, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)
Cai, Q.Y.: The “Ping-Pong” protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91, 109801 (2003)
Cai, Q.Y., Li, B.W.: Improving the capacity of the Boström–Felbinger protocol. Phys. Rev. A 69, 054301 (2004)
Wojcik, A.: Eavesdropping on the “ping-pong” quantum communication protocol. Phys. Rev. Lett. 90, 157901 (2003)
Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23 (2006)
Lucamarini, M., Mancini, S.: Secure deterministic communication without entanglement. Phys. Rev. Lett. 94, 140501 (2005)
Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145 (2002)
Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: International Conference of Computers in Systems and Signal Processing, Dec 1984, Bangalore, India (IEEE, New York 1984), p. 175 (1984)
Li, X.H., Deng, F.G., Li, C.Y., Liang, Y.J., Zhou, P., Zhou, H.Y.: Deterministic secure quantum communication without maximally entangled states. J. Kerean Phys. Soc. 49, 1354 (2006)
Acknowledgments
This work is supported by the Talent Project of the West AnHui University for Outstanding Youth under Grant No. 0044113017, the National Undergraduate Innovation and Entrepreneurship Training Program Project under Grant No. 201210376008, the Program for Excellent Talents at the University of Guangdong Province (Guangdong Teacher Letter [1010] No. 79), the 211 Project of Anhui University, the Key Project of Natural Science Fund in Anhui Province under Grant Nos. KJ2013A258 and KJ2013A261, the Anhui Provincial Natural Science Foundation under Nos. 1408085MA20 and 1408085QA13, the National Natural Science Foundation of China under Grant Nos. 10874122, 10975001, 51072002, 51272003, and 61375121.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yuan, H., Liu, Ym., Pan, Gz. et al. Quantum identity authentication based on ping-pong technique without entanglements. Quantum Inf Process 13, 2535–2549 (2014). https://doi.org/10.1007/s11128-014-0808-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11128-014-0808-9