基于单粒子态的双向认证多方量子密钥分发
陈晓峰, 刘晓芬. 基于单粒子态的双向认证多方量子密钥分发[J]. 量子电子学报, 2017, 34(3): 369.
CHEN Xiaofeng, LIU Xiaofen. Mutual authenticated multiparty quantum key distribution based on single particle state[J]. Chinese Journal of Quantum Electronics, 2017, 34(3): 369.
[1] Bennett C H, Brassard G. Quantum cryptography: Public-key distribution and coin tossing[C]. Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore: IEEE Press, 1984: 175-179.
[2] Bennett C H. Quantum cryptography using any two nonorthogonal states[J]. Phys. Rev. Lett., 1992, 68(21): 3121-3124.
[3] EKERT A K. Quantum cryptography based on Bell’s theorem[J]. Phys. Rev. Lett., 1991, 67(6): 66l-663.
[4] Wu Hua, Zhao Yikang, Zhao Yong, et al. Field application and security management of a telephone network and a high speed data transmission system with practical ber quantum cryptography[J]. Scientia Sinica Informationis (中国科学:信息科学), 2014, 44(3): 312-321 (in Chinese).
[5] Phoenix S J D, Barnett S M, Townsend P D, et al. Multi-user quantum cryptography on optical networks[J]. Journal of Modern Optics, 1995, 42(6): 1155-1163.
[6] Hong C H, Heo J O, Khym G L, et al. N quantum channels are sufficient for multi-user quantum key distribution protocol between n users[J]. Opt. Commun., 2010, 283(12): 2644-2646.
[7] Dusek M, et al. Quantum identification system[J]. Phys. Rev. A, 1998, 60(1): 149-156.
[8] Zeng G H, Zhang W P. Identity verification in quantum key distribution[J]. Phys. Rev. A, 2000, 61(2): 022303.
[9] Ljunggren D, Bourennane M, Karlsson A. Authority-based user authentication in quantum key distribution[J]. Phys. Rev. A, 2000, 62(2): 117-134.
[10] Peev M, et al. A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography[J]. Int. J. Quantum Inform., 2005, 3(1): 225-231.
[11] Hwang T, Lee K C, Li C M. Provably secure three-party authenticated quantum key distribution protocols[J]. IEEE Trans. Dependable Secure Comput., 2007, 4(1): 71-80.
[12] Cederlof J, Larsson J A. Security aspects of the authentication used in quantum cryptography[J]. IEEE Trans. Inf. Theory., 2008, 54(4): 1735-1741.
[13] Fung C H, Ma X F, Chau H F. Practical issues in quantum-key-distribution postprocessing[J]. Phys. Rev. A, 2010, 81: 012318.
[14] Sun Z, Du R, Long D. Quantum secure direct communication with quantum identification[J]. Int. J. Quantum Inform., 2012, 10(1): 1250008.
[15] Guan D J, Wang Y J, et al. A practical protocol for three-party authenticated quantum key distribution[J]. Quantum Inf. Process., 2014, 13(11): 2355-2374.
[16] Long G L, Liu X S. Theoretically efficient high-capacity quantum-key-distribution scheme[J]. Phys. Rev. A, 2002, 65: 032302.
[17] Franklin M K, Reiter M K. Fair exchange with a semi-trusted third party[C]. Proceedings of the 4th ACM conference on Computer and communications security. New York: Association for Computing Machinery, 1997: 1-5.
[18] Wang G, Ying M. Unambiguous discrimination among quantum operations[J]. Phys. Rev. A, 2006, 73(4): 042301.
[19] Chefles A. Unambiguous discrimination between linearly-independent quantum states[J]. Phys. Lett. A, 1998, 239(6): 339-347.
陈晓峰, 刘晓芬. 基于单粒子态的双向认证多方量子密钥分发[J]. 量子电子学报, 2017, 34(3): 369. CHEN Xiaofeng, LIU Xiaofen. Mutual authenticated multiparty quantum key distribution based on single particle state[J]. Chinese Journal of Quantum Electronics, 2017, 34(3): 369.