首页 | 本学科首页   官方微博 | 高级检索  
     

Quantum Authentication Based on the Lengthened String Scheme
引用本文:GUO Fen-zhuo~(1,2),WEN Qiao-yan~1,ZHU Fu-chen~3 1.School of Science,Beijing University of Posts and Telecommunications,Beijing 100876,P.R. China, 2.State Key Laboratory of Integrated Services Network,Xidian University,Xi'an 710071,P.R. China, 3.National Laboratory for Secure Communication,Chengdu 610041,P.R. China. Quantum Authentication Based on the Lengthened String Scheme[J]. 中国邮电高校学报(英文版), 2004, 11(Z1)
作者姓名:GUO Fen-zhuo~(1  2)  WEN Qiao-yan~1  ZHU Fu-chen~3 1.School of Science  Beijing University of Posts and Telecommunications  Beijing 100876  P.R. China   2.State Key Laboratory of Integrated Services Network  Xidian University  Xi'an 710071  P.R. China   3.National Laboratory for Secure Communication  Chengdu 610041  P.R. China
作者单位:1,2
基金项目:国家自然科学基金,National Laboratory for Secure Communication Science Foundation of China,ISN Open Foundation
摘    要:
1 Introduction Conventionallyhowtoachieveasecurekeyisthekeypointofacryptosystem ,andQuantumKeyDis tribution (QKD) providesawaytoachieveuncondi tionallysecurekey .Furthermore ,thesimulationofquantumkeydistributeononclassicalcomputershasbeendiscussedinRef.[1 ].Toguaranteethesecuri tyofthe quantumkeyinpracticalapplications,QuantumKeyAuthentication (QKA)isasimpor tantasQKD .ButtheconventionalQKD protocolssuchasBB84[2 ] ,B92 [3] ,andEPR[4] etc,havenotdonetheidentificationwork .Indeedin…


Quantum Authentication Based on the Lengthened String Scheme
GUO Fen-zhuo,WEN Qiao-yan,ZHU Fu-chen. Quantum Authentication Based on the Lengthened String Scheme[J]. The Journal of China Universities of Posts and Telecommunications, 2004, 11(Z1)
Authors:GUO Fen-zhuo  WEN Qiao-yan  ZHU Fu-chen
Abstract:
Assuming there is a shared string between the users, we present a novel scheme, the lengthened string scheme (LSS), where the shared string is lengthened firstly by a specially designed algorithm, then some special treatments are applied on the lengthened one before it is used to authenticate. Based on the lengthened string scheme (LSS) we propose a quantum authentication protocol using entanglements. And the robustness of our protocol is discussed. In fact all the quantum key distribution protocols can do identification simultaneously based on the LSS.
Keywords:quantum cryptography  quantum authentication  quantum key distribution  LSS
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号