Continuous-variable quantum identity authentication based on quantum teleportation

A continuous-variable quantum identity authentication protocol, which is based on quantum teleportation, is presented by employing two-mode squeezed vacuum state and coherent state. The proposed protocol can verify user’s identity efficiently with a new defined fidelity parameter. Update of authentication key can also be implemented in our protocol. Moreover, the analysis shows its feasibility and security under the general Gaussian-cloner attack on authentication key, which is guaranteed by quantum entanglement, insertion of decoy state and random displacement.

[1]  L. Zhang,et al.  Direct and full-scale experimental verifications towards ground–satellite quantum key distribution , 2012, 1210.7556.

[2]  R. Renner,et al.  An information-theoretic security proof for QKD protocols , 2005, quant-ph/0502064.

[3]  T. Ralph,et al.  Continuous variable quantum cryptography , 1999, quant-ph/9907073.

[4]  Li-Hua Gong,et al.  A continuous variable quantum deterministic key distribution based on two-mode squeezed states , 2014 .

[5]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[6]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[7]  N. Cerf,et al.  Quantum distribution of Gaussian keys using squeezed states , 2000, quant-ph/0008058.

[8]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[9]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[10]  M. Bourennane,et al.  Authority-based user authentication in quantum key distribution , 2000 .

[11]  Wei Chen,et al.  Phase-encoded measurement-device-independent quantum key distribution with practical spontaneous-parametric-down-conversion sources , 2013 .

[12]  H. Inamori,et al.  Unconditional security of practical quantum key distribution , 2007 .

[13]  Raúl García-Patrón,et al.  Continuous-variable quantum key distribution protocols over noisy channels. , 2008, Physical review letters.

[14]  Renato Renner,et al.  Security of continuous-variable quantum key distribution against general attacks. , 2012, Physical review letters.

[15]  Vaidman Teleportation of quantum states. , 1993, Physical review. A, Atomic, molecular, and optical physics.

[16]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[17]  N. Cerf,et al.  Quantum key distribution using gaussian-modulated coherent states , 2003, Nature.

[18]  Guihua Zeng,et al.  Ja n 20 07 Improving security of quantum identity authentication based on ping-pong technique for photons , 2009 .

[19]  Xiaosong Ma,et al.  Quantum teleportation over 143 kilometres using active feed-forward , 2012, Nature.

[20]  R. Renner,et al.  Uncertainty relation for smooth entropies. , 2010, Physical review letters.

[21]  Larry Carter,et al.  New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..

[22]  Xiaoyu Li,et al.  Quantum Authentication Using Entangled States , 2004, Int. J. Found. Comput. Sci..

[23]  Nanrun Zhou,et al.  Continuous Variable Quantum Secret Sharing via Quantum Teleportation , 2013 .

[24]  M. Hillery Quantum cryptography with squeezed states , 1999, quant-ph/9909006.

[25]  Guihua Zeng,et al.  Identity verification in quantum key distribution , 2000 .

[26]  Jun Zhu,et al.  QUANTUM IDENTITY AUTHENTICATION USING GAUSSIAN-MODULATED SQUEEZED STATES , 2011 .

[27]  P. Grangier,et al.  Continuous variable quantum cryptography using coherent states. , 2001, Physical review letters.

[28]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[29]  Jian Li,et al.  Quantum key distribution and quantum authentication based on entangled state , 2001, quant-ph/0102058.

[30]  M. Dušek,et al.  Quantum identification system , 1998, quant-ph/9809024.

[31]  R. Renner,et al.  Information-theoretic security proof for quantum-key-distribution protocols , 2005, quant-ph/0502064.

[32]  Peng Huang,et al.  Performance improvement of continuous-variable quantum key distribution via photon subtraction , 2013 .

[33]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[34]  Guihua Zeng,et al.  Quantum secure communication using continuous variable Einstein-Podolsky-Rosen correlations , 2006 .

[35]  Peng Huang,et al.  Bound on Noise of Coherent Source for Secure Continuous-Variable Quantum Key Distribution , 2013, International Journal of Theoretical Physics.

[36]  Ipe,et al.  Cloning of continuous quantum variables , 1999, Physical review letters.