Controlled mutual quantum entity authentication with an untrusted third party
From MaRDI portal
Publication:1993779
DOI10.1007/s11128-018-1927-5zbMath1448.81284OpenAlexW2804374358WikidataQ59448765 ScholiaQ59448765MaRDI QIDQ1993779
Publication date: 5 November 2018
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-018-1927-5
Authentication, digital signatures and secret sharing (94A62) Quantum coherence, entanglement, quantum correlations (81P40) Quantum information, communication, networks (quantum-theoretic aspects) (81P45) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (8)
Response to: ``Comment on: ``Controlled mutual quantum entity authentication with an untrusted third party'' ⋮ Comment on: ``Controlled mutual quantum entity authentication with an untrusted third party ⋮ Secured shared authentication key with two-way clock synchronization over multiparty quantum communication ⋮ Quantum secret sharing with identity authentication based on GHZ states entanglement swapping ⋮ Measurement-device-independent mutual quantum entity authentication ⋮ A novel quantum identity authentication based on Bell states ⋮ A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice? ⋮ Controlled secure direct quantum communication inspired scheme for quantum identity authentication
Cites Work
- Joint remote state preparation of arbitrary two-particle states via GHZ-type states
- Quantum cryptography: public key distribution and coin tossing
- A novel protocol for multiparty quantum key management
- Quantum teleportation via \(GHZ\)-like state
- Controlled teleportation against uncooperation of part of supervisors
- Quantum identity authentication with single photon
- Multi-party quantum secret sharing with the single-particle quantum state to encode the information
- Schemes generating entangled states and entanglement swapping between photons and three-level atoms inside optical cavities for quantum communication
- A class of protocols for quantum private comparison based on the symmetry of states
- Three-party remote state preparation schemes based on entanglement
- The quantum steganography protocol via quantum noisy channels
- Quantum Secret Sharing Using GHZ-Like State
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography using any two nonorthogonal states
- Measurement-device-independent semiquantum key distribution
- Universal Blind Quantum Computation
- Quantum secret sharing
- Deterministic secure direct communication using GHZ states and swapping quantum entanglement
This page was built for publication: Controlled mutual quantum entity authentication with an untrusted third party