A novel quantum identity authentication protocol without entanglement and preserving pre-shared key information
From MaRDI portal
Publication:2693840
DOI10.1007/s11128-023-03832-6OpenAlexW4318704925MaRDI QIDQ2693840
B. Devendar Rao, Ramkumar Jayaraman
Publication date: 24 March 2023
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-023-03832-6
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (6)
Semi-quantum ring signature protocol based on multi-particle GHZ state ⋮ A measurement device independent multi-party quantum key agreement protocol with identity authentication ⋮ Quantum mutual implicit authentication key agreement protocol without entanglement with key recycling ⋮ Secured shared authentication key with two-way clock synchronization over multiparty quantum communication ⋮ Three-party quantum key agreement protocol based on logical four-particle cluster state to resist collective noise ⋮ Improvement and flexible multiparty extension of semi-quantum key agreement protocol
Cites Work
- Unnamed Item
- Continuous-variable quantum identity authentication based on quantum teleportation
- Quantum cryptography: public key distribution and coin tossing
- Quantum identity authentication based on ping-pong technique without entanglements
- Quantum identity authentication without entanglement
- Quantum identity authentication based on ping-pong technique for photons
- Quantum identity authentication with single photon
- Blind quantum signature with blind quantum computation
- A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?
- A novel quantum identity authentication based on Bell states
- A novel quantum deniable authentication protocol without entanglement
- Multiparty simultaneous quantum identity authentication with secret sharing
- Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes
- An efficient quantum identity authentication key agreement protocol without entanglement
- QUANTUM AUTHENTICATION USING ENTANGLED STATES
- An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement
- Quantum cryptography based on Bell’s theorem
- Quantum secret sharing with identity authentication based on Bell states
- Generalised phase kick-back: the structure of computational algorithms from physical principles
- A fair and efficient solution to the socialist millionaires' problem
This page was built for publication: A novel quantum identity authentication protocol without entanglement and preserving pre-shared key information