Abstract
A continuous-variable quantum identity authentication protocol, which is based on quantum teleportation, is presented by employing two-mode squeezed vacuum state and coherent state. The proposed protocol can verify user’s identity efficiently with a new defined fidelity parameter. Update of authentication key can also be implemented in our protocol. Moreover, the analysis shows its feasibility and security under the general Gaussian-cloner attack on authentication key, which is guaranteed by quantum entanglement, insertion of decoy state and random displacement.
Similar content being viewed by others
References
Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145 (2002)
Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)
Bennet, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In Proceedings of IEEE International Conference on Computers, Systems and Signal processing, vol. 175 (1984)
Ekert, A.K.: Quantum cryptography based on Bells theorem. Phys. Rev. Lett. 67, 661 (1991)
Bennet, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121 (1992)
Ma, X., et al.: Quantum teleportation over 143 kilometres using active feed-forward. Nature 489, 269–273 (2012)
Zhou, Z., Bao, W., Chen, W., Li, H., Yin, Z., Wang, Y., Han, Z.: Phase-encoded measurement-device-independent quantum key distribution with practical spontaneous-parametric-down-conversion sources. Phys. Rev. A 88, 052333 (2013)
Wang, J., et al.: Direct and full-scale experimental verifications towards ground-satellite quantum key distribution. Nat. Photonics 7, 387–393 (2013)
Ralph, T.C.: Continuous variable quantum cryptography. Phys. Rev. A 61, 010303(R) (1999)
Hillery, M.: Quantum cryptography with squeezed states. Phys. Rev. A 61, 022309 (2000)
Cerf, N.J., Lévy, M., Assche, G.V.: Quantum distribution of Gaussian keys using squeezed states. Phys. Rev. A 63, 052311 (2001)
Grosshans, F., Grangier, P.: Continuous variable quantum cryptography using coherent state. Phys. Rev. Lett. 88, 057902 (2002)
Grosshans, F., Assche, G.V., Wenger, J., Brouri, R., Cerf, N.J., Grangier, P.: Quantum key distribution using gaussian-modulated coherent states. Nature 421, 238–241 (2003)
He, G., Zhu, J., Zeng, G.: Quantum secure communication using continuous variable Einstein–Podolsky–Rosen correlations. Phys. Rev. A 73, 012314 (2006)
García-Patrón, R., Cerf, N.J.: Continuous-variable quantum key distribution protocols over noisy channels. Phys. Rev. Lett. 102, 130501 (2009)
Huang, P., He, G.Q., Fang, J., Zeng, G.H.: Performance improvement of continuous-variable quantum key distribution via photon subtraction. Phys. Rev. A 87, 012317 (2013)
Huang, P., He, G.Q., Zeng, G.H.: Bound on noise of coherent source for secure continuous-variable quantum key distribution. Int. J. Theor. Phys. 52, 1572–1582 (2013)
Gong, L.H., Song, H.C., He, C.S., Liu, Y., Zhou, N.R.: A continuous variable quantum deterministic key distribution based on two-mode squeezed states. Phys. Scripta 89, 035101 (2014)
Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050–2056 (1999)
Ranner, R., Gisin, N., Kraus, B.: Information-theoretic security proof for quantum-key-distribution protocols. Phys. Rev. A 72, 012332 (2005)
Inamori, H., Lutkenhaus, H., Mayers, D.: Unconditional security of practical quantum key distribution. Eur. Phys. J. D 41, 599 (2007)
Tomamichel, M., Renner, R.: Uncertainty relation for smooth entropies. Phys. Rev. Lett. 106, 110506 (2011)
Leverrier, A., Garcia-Patron, R., Renner, R., Cerf, N.J.: Security of continuous-variable quantum key distribution against general attacks. Phys. Rev. Lett. 110, 030502 (2013)
Wegman, M.N., Carter, J.L.: New hash functions and their use in authentication and set equality. J. Comput. Syst. Sci. 22, 265–279 (1981)
Dusek, M., Haderka, O., Hendrych, M., Myska, R.: Quantum identification system. Phys. Rev. A 60, 149 (1999)
Ljunggren, D., Bourennane, M., Karlsson, A.: Authority-based user authentication in quantum key distribution. Phys. Rev. A 62, 022305 (2000)
Zeng, G., Zhang, W.: Identity verification in quantum key distribution. Phys. Rev. A 61, 022303 (2000)
Li, X., Barnum, H.: Quantum authentication using entangled states. Int. J. Found. Comput. Sci. 15, 609 (2004)
Shi, B., Li, J., Liu, J., Fan, X., Guo, G.: Quantum key distribution and quantum authentication based on entangled state. Phys. Lett. A 281, 83–87 (2001)
Zhang, Z., Zeng, G., Zhou, N., Xiong, J.: Quantum identity authentication based on ping-pong technique for photons. Phys. Lett. A 356, 199–205 (2006)
Huang, P., Zhu, J., Lu, Y., Zeng, G.: Quantum identity authentication using gaussian-modulated squeezed states. Int. J. Quantum Inf. 9, 701 (2011)
Song, H., Gong, L., Zhou, N.: Continuous-variable quantum deterministic key distribution protocol based on quantum teleportation. Acta Phys. Sin. 61, 154206 (2012)
Zhou, N.R., Song, H.C., Gong, L.H.: Continuous variable quantum secret sharing via quantum teleportation. Int. J. Theor. Phys. 52, 4174–4184 (2013)
Vaidman, L.: Teleportation of quantum states. Phys. Rev. A 49, 1473 (1994)
Cerf, N.J., Ipe, A., Rottenberg, X.: Cloning of continuous quantum variables. Phys. Rev. Lett. 85, 1754 (2000)
Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27, 379–423 (1948)
Acknowledgments
This work was supported by the National Basic Research Program of China (Grant No. 2013CB338002), the National Natural Science Foundation of China (Grants Nos. 61170228, 61332019, 61471239, 61501290), the Hi-Tech Research and Development Program of China (Grant No. 2013AA122901) and the China Postdoctoral Science Foundation (Grant No. 2013M540365).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ma, H., Huang, P., Bao, W. et al. Continuous-variable quantum identity authentication based on quantum teleportation. Quantum Inf Process 15, 2605–2620 (2016). https://doi.org/10.1007/s11128-016-1283-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11128-016-1283-2