Skip to main content
Log in

Continuous-variable quantum identity authentication based on quantum teleportation

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

A continuous-variable quantum identity authentication protocol, which is based on quantum teleportation, is presented by employing two-mode squeezed vacuum state and coherent state. The proposed protocol can verify user’s identity efficiently with a new defined fidelity parameter. Update of authentication key can also be implemented in our protocol. Moreover, the analysis shows its feasibility and security under the general Gaussian-cloner attack on authentication key, which is guaranteed by quantum entanglement, insertion of decoy state and random displacement.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145 (2002)

    Article  ADS  Google Scholar 

  2. Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)

    Article  ADS  Google Scholar 

  3. Bennet, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In Proceedings of IEEE International Conference on Computers, Systems and Signal processing, vol. 175 (1984)

  4. Ekert, A.K.: Quantum cryptography based on Bells theorem. Phys. Rev. Lett. 67, 661 (1991)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  5. Bennet, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121 (1992)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  6. Ma, X., et al.: Quantum teleportation over 143 kilometres using active feed-forward. Nature 489, 269–273 (2012)

    Article  ADS  Google Scholar 

  7. Zhou, Z., Bao, W., Chen, W., Li, H., Yin, Z., Wang, Y., Han, Z.: Phase-encoded measurement-device-independent quantum key distribution with practical spontaneous-parametric-down-conversion sources. Phys. Rev. A 88, 052333 (2013)

    Article  ADS  Google Scholar 

  8. Wang, J., et al.: Direct and full-scale experimental verifications towards ground-satellite quantum key distribution. Nat. Photonics 7, 387–393 (2013)

    Article  ADS  Google Scholar 

  9. Ralph, T.C.: Continuous variable quantum cryptography. Phys. Rev. A 61, 010303(R) (1999)

    Article  MathSciNet  Google Scholar 

  10. Hillery, M.: Quantum cryptography with squeezed states. Phys. Rev. A 61, 022309 (2000)

    Article  ADS  Google Scholar 

  11. Cerf, N.J., Lévy, M., Assche, G.V.: Quantum distribution of Gaussian keys using squeezed states. Phys. Rev. A 63, 052311 (2001)

    Article  ADS  Google Scholar 

  12. Grosshans, F., Grangier, P.: Continuous variable quantum cryptography using coherent state. Phys. Rev. Lett. 88, 057902 (2002)

    Article  ADS  Google Scholar 

  13. Grosshans, F., Assche, G.V., Wenger, J., Brouri, R., Cerf, N.J., Grangier, P.: Quantum key distribution using gaussian-modulated coherent states. Nature 421, 238–241 (2003)

    Article  ADS  Google Scholar 

  14. He, G., Zhu, J., Zeng, G.: Quantum secure communication using continuous variable Einstein–Podolsky–Rosen correlations. Phys. Rev. A 73, 012314 (2006)

    Article  ADS  Google Scholar 

  15. García-Patrón, R., Cerf, N.J.: Continuous-variable quantum key distribution protocols over noisy channels. Phys. Rev. Lett. 102, 130501 (2009)

    Article  ADS  Google Scholar 

  16. Huang, P., He, G.Q., Fang, J., Zeng, G.H.: Performance improvement of continuous-variable quantum key distribution via photon subtraction. Phys. Rev. A 87, 012317 (2013)

    Article  ADS  Google Scholar 

  17. Huang, P., He, G.Q., Zeng, G.H.: Bound on noise of coherent source for secure continuous-variable quantum key distribution. Int. J. Theor. Phys. 52, 1572–1582 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  18. Gong, L.H., Song, H.C., He, C.S., Liu, Y., Zhou, N.R.: A continuous variable quantum deterministic key distribution based on two-mode squeezed states. Phys. Scripta 89, 035101 (2014)

    Article  ADS  Google Scholar 

  19. Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050–2056 (1999)

    Article  ADS  Google Scholar 

  20. Ranner, R., Gisin, N., Kraus, B.: Information-theoretic security proof for quantum-key-distribution protocols. Phys. Rev. A 72, 012332 (2005)

    Article  ADS  Google Scholar 

  21. Inamori, H., Lutkenhaus, H., Mayers, D.: Unconditional security of practical quantum key distribution. Eur. Phys. J. D 41, 599 (2007)

    Article  ADS  Google Scholar 

  22. Tomamichel, M., Renner, R.: Uncertainty relation for smooth entropies. Phys. Rev. Lett. 106, 110506 (2011)

    Article  ADS  Google Scholar 

  23. Leverrier, A., Garcia-Patron, R., Renner, R., Cerf, N.J.: Security of continuous-variable quantum key distribution against general attacks. Phys. Rev. Lett. 110, 030502 (2013)

    Article  ADS  Google Scholar 

  24. Wegman, M.N., Carter, J.L.: New hash functions and their use in authentication and set equality. J. Comput. Syst. Sci. 22, 265–279 (1981)

    Article  MathSciNet  MATH  Google Scholar 

  25. Dusek, M., Haderka, O., Hendrych, M., Myska, R.: Quantum identification system. Phys. Rev. A 60, 149 (1999)

    Article  ADS  Google Scholar 

  26. Ljunggren, D., Bourennane, M., Karlsson, A.: Authority-based user authentication in quantum key distribution. Phys. Rev. A 62, 022305 (2000)

    Article  ADS  Google Scholar 

  27. Zeng, G., Zhang, W.: Identity verification in quantum key distribution. Phys. Rev. A 61, 022303 (2000)

    Article  ADS  Google Scholar 

  28. Li, X., Barnum, H.: Quantum authentication using entangled states. Int. J. Found. Comput. Sci. 15, 609 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  29. Shi, B., Li, J., Liu, J., Fan, X., Guo, G.: Quantum key distribution and quantum authentication based on entangled state. Phys. Lett. A 281, 83–87 (2001)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  30. Zhang, Z., Zeng, G., Zhou, N., Xiong, J.: Quantum identity authentication based on ping-pong technique for photons. Phys. Lett. A 356, 199–205 (2006)

    Article  ADS  MATH  Google Scholar 

  31. Huang, P., Zhu, J., Lu, Y., Zeng, G.: Quantum identity authentication using gaussian-modulated squeezed states. Int. J. Quantum Inf. 9, 701 (2011)

    Article  MATH  Google Scholar 

  32. Song, H., Gong, L., Zhou, N.: Continuous-variable quantum deterministic key distribution protocol based on quantum teleportation. Acta Phys. Sin. 61, 154206 (2012)

    Google Scholar 

  33. Zhou, N.R., Song, H.C., Gong, L.H.: Continuous variable quantum secret sharing via quantum teleportation. Int. J. Theor. Phys. 52, 4174–4184 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  34. Vaidman, L.: Teleportation of quantum states. Phys. Rev. A 49, 1473 (1994)

    Article  ADS  MathSciNet  Google Scholar 

  35. Cerf, N.J., Ipe, A., Rottenberg, X.: Cloning of continuous quantum variables. Phys. Rev. Lett. 85, 1754 (2000)

    Article  ADS  Google Scholar 

  36. Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27, 379–423 (1948)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Basic Research Program of China (Grant No. 2013CB338002), the National Natural Science Foundation of China (Grants Nos. 61170228, 61332019, 61471239, 61501290), the Hi-Tech Research and Development Program of China (Grant No. 2013AA122901) and the China Postdoctoral Science Foundation (Grant No. 2013M540365).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Peng Huang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ma, H., Huang, P., Bao, W. et al. Continuous-variable quantum identity authentication based on quantum teleportation. Quantum Inf Process 15, 2605–2620 (2016). https://doi.org/10.1007/s11128-016-1283-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11128-016-1283-2

Keywords

Navigation