Quantum identity authentication scheme based on measurement-device-independent quantum key distribution protocol

Utilized to security properties of measurement-device-independent quantum key distribution (MDI-QKD)protocol, quantum identity authentication scheme based on MDI (QIA-MDI)protocol was presented. In this protocol, authentication center (AC)and authentication user have encrypted authentication informa...

Full description

Saved in:
Bibliographic Details
Main Authors: Ying-di DONG, Jin-ye PENG, Xiao-bo ZHANG, Zhen-long ZHANG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2016-02-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016041/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539573598912512
author Ying-di DONG
Jin-ye PENG
Xiao-bo ZHANG
Zhen-long ZHANG
author_facet Ying-di DONG
Jin-ye PENG
Xiao-bo ZHANG
Zhen-long ZHANG
author_sort Ying-di DONG
collection DOAJ
description Utilized to security properties of measurement-device-independent quantum key distribution (MDI-QKD)protocol, quantum identity authentication scheme based on MDI (QIA-MDI)protocol was presented. In this protocol, authentication center (AC)and authentication user have encrypted authentication information and next authenticated key by shared key, and then they transmitted the encrypted information to untrusted third party for Bell-state measurement (BSM). The secret authentication information was obtained through the BSM result, which can verify the communicator identity and update shared key. The security performance of the proposed scheme is extensively analyzed and accordingly con?rmed in the case of attacks.
format Article
id doaj-art-4f27e19a60b048d2b30d3bb19fe46e1d
institution Kabale University
issn 1000-436X
language zho
publishDate 2016-02-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-4f27e19a60b048d2b30d3bb19fe46e1d2025-01-14T06:54:53ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2016-02-013715215759699424Quantum identity authentication scheme based on measurement-device-independent quantum key distribution protocolYing-di DONGJin-ye PENGXiao-bo ZHANGZhen-long ZHANGUtilized to security properties of measurement-device-independent quantum key distribution (MDI-QKD)protocol, quantum identity authentication scheme based on MDI (QIA-MDI)protocol was presented. In this protocol, authentication center (AC)and authentication user have encrypted authentication information and next authenticated key by shared key, and then they transmitted the encrypted information to untrusted third party for Bell-state measurement (BSM). The secret authentication information was obtained through the BSM result, which can verify the communicator identity and update shared key. The security performance of the proposed scheme is extensively analyzed and accordingly con?rmed in the case of attacks.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016041/quantum identity authenticationquantum key distributionmeasurement-device-independentBell-state measurement
spellingShingle Ying-di DONG
Jin-ye PENG
Xiao-bo ZHANG
Zhen-long ZHANG
Quantum identity authentication scheme based on measurement-device-independent quantum key distribution protocol
Tongxin xuebao
quantum identity authentication
quantum key distribution
measurement-device-independent
Bell-state measurement
title Quantum identity authentication scheme based on measurement-device-independent quantum key distribution protocol
title_full Quantum identity authentication scheme based on measurement-device-independent quantum key distribution protocol
title_fullStr Quantum identity authentication scheme based on measurement-device-independent quantum key distribution protocol
title_full_unstemmed Quantum identity authentication scheme based on measurement-device-independent quantum key distribution protocol
title_short Quantum identity authentication scheme based on measurement-device-independent quantum key distribution protocol
title_sort quantum identity authentication scheme based on measurement device independent quantum key distribution protocol
topic quantum identity authentication
quantum key distribution
measurement-device-independent
Bell-state measurement
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016041/
work_keys_str_mv AT yingdidong quantumidentityauthenticationschemebasedonmeasurementdeviceindependentquantumkeydistributionprotocol
AT jinyepeng quantumidentityauthenticationschemebasedonmeasurementdeviceindependentquantumkeydistributionprotocol
AT xiaobozhang quantumidentityauthenticationschemebasedonmeasurementdeviceindependentquantumkeydistributionprotocol
AT zhenlongzhang quantumidentityauthenticationschemebasedonmeasurementdeviceindependentquantumkeydistributionprotocol