量子电子学报, 2017, 34 (3): 369, 网络出版: 2017-06-09   

基于单粒子态的双向认证多方量子密钥分发

Mutual authenticated multiparty quantum key distribution based on single particle state
作者单位
1 福建江夏学院电子信息科学学院, 福建 福州 350108
2 福建师范大学数学与计算机科学学院, 福建 福州 350007
引用该论文

陈晓峰, 刘晓芬. 基于单粒子态的双向认证多方量子密钥分发[J]. 量子电子学报, 2017, 34(3): 369.

CHEN Xiaofeng, LIU Xiaofen. Mutual authenticated multiparty quantum key distribution based on single particle state[J]. Chinese Journal of Quantum Electronics, 2017, 34(3): 369.

参考文献

[1] Bennett C H, Brassard G. Quantum cryptography: Public-key distribution and coin tossing[C]. Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore: IEEE Press, 1984: 175-179.

[2] Bennett C H. Quantum cryptography using any two nonorthogonal states[J]. Phys. Rev. Lett., 1992, 68(21): 3121-3124.

[3] EKERT A K. Quantum cryptography based on Bell’s theorem[J]. Phys. Rev. Lett., 1991, 67(6): 66l-663.

[4] Wu Hua, Zhao Yikang, Zhao Yong, et al. Field application and security management of a telephone network and a high speed data transmission system with practical ber quantum cryptography[J]. Scientia Sinica Informationis (中国科学:信息科学), 2014, 44(3): 312-321 (in Chinese).

[5] Phoenix S J D, Barnett S M, Townsend P D, et al. Multi-user quantum cryptography on optical networks[J]. Journal of Modern Optics, 1995, 42(6): 1155-1163.

[6] Hong C H, Heo J O, Khym G L, et al. N quantum channels are sufficient for multi-user quantum key distribution protocol between n users[J]. Opt. Commun., 2010, 283(12): 2644-2646.

[7] Dusek M, et al. Quantum identification system[J]. Phys. Rev. A, 1998, 60(1): 149-156.

[8] Zeng G H, Zhang W P. Identity verification in quantum key distribution[J]. Phys. Rev. A, 2000, 61(2): 022303.

[9] Ljunggren D, Bourennane M, Karlsson A. Authority-based user authentication in quantum key distribution[J]. Phys. Rev. A, 2000, 62(2): 117-134.

[10] Peev M, et al. A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography[J]. Int. J. Quantum Inform., 2005, 3(1): 225-231.

[11] Hwang T, Lee K C, Li C M. Provably secure three-party authenticated quantum key distribution protocols[J]. IEEE Trans. Dependable Secure Comput., 2007, 4(1): 71-80.

[12] Cederlof J, Larsson J A. Security aspects of the authentication used in quantum cryptography[J]. IEEE Trans. Inf. Theory., 2008, 54(4): 1735-1741.

[13] Fung C H, Ma X F, Chau H F. Practical issues in quantum-key-distribution postprocessing[J]. Phys. Rev. A, 2010, 81: 012318.

[14] Sun Z, Du R, Long D. Quantum secure direct communication with quantum identification[J]. Int. J. Quantum Inform., 2012, 10(1): 1250008.

[15] Guan D J, Wang Y J, et al. A practical protocol for three-party authenticated quantum key distribution[J]. Quantum Inf. Process., 2014, 13(11): 2355-2374.

[16] Long G L, Liu X S. Theoretically efficient high-capacity quantum-key-distribution scheme[J]. Phys. Rev. A, 2002, 65: 032302.

[17] Franklin M K, Reiter M K. Fair exchange with a semi-trusted third party[C]. Proceedings of the 4th ACM conference on Computer and communications security. New York: Association for Computing Machinery, 1997: 1-5.

[18] Wang G, Ying M. Unambiguous discrimination among quantum operations[J]. Phys. Rev. A, 2006, 73(4): 042301.

[19] Chefles A. Unambiguous discrimination between linearly-independent quantum states[J]. Phys. Lett. A, 1998, 239(6): 339-347.

陈晓峰, 刘晓芬. 基于单粒子态的双向认证多方量子密钥分发[J]. 量子电子学报, 2017, 34(3): 369. CHEN Xiaofeng, LIU Xiaofen. Mutual authenticated multiparty quantum key distribution based on single particle state[J]. Chinese Journal of Quantum Electronics, 2017, 34(3): 369.

本文已被 1 篇论文引用
被引统计数据来源于中国光学期刊网
引用该论文: TXT   |   EndNote

相关论文

加载中...

关于本站 Cookie 的使用提示

中国光学期刊网使用基于 cookie 的技术来更好地为您提供各项服务,点击此处了解我们的隐私策略。 如您需继续使用本网站,请您授权我们使用本地 cookie 来保存部分信息。
全站搜索
您最值得信赖的光电行业旗舰网络服务平台!