Quantum identity authentication in the orthogonal-state-encoding QKD system

As is known, quantum key distribution could achieve information-theoretical security under several basic requirements, one of which is reliable identity authentications between the participants. Compared with classical identity authentication, quantum identity authentication (QIA) is considered to be more secure and more efficient to combine with quantum key distribution (QKD), and therefore, more and more scholars are involved in the study of QIA. During the last 3 decades, various types of QKD protocols have been proposed utilizing different kinds of quantum technologies. One of the most special QKD protocols is the orthogonal-state-encoding QKD protocol proposed by Goldenberg and Vaidman (Phys Rev Lett 75:1239–1243, 1995), which is usually called GV95 protocol. Almost all of the QKD protocols employ nonorthogonal states to prevent and detect eavesdropping, and the most famous exception is GV95. In this paper, we present a QIA protocol based on the GV95 technology, which can be performed in a revised circuit of the GV95 protocol. And we also analyze the security of both Alice’s and Bob’s identities.

[1]  V. Buzek,et al.  Quantum secret sharing , 1998, quant-ph/9806063.

[2]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[3]  S. Barnett,et al.  Quantum state discrimination , 2008, 0810.1970.

[4]  Qiaoyan Wen,et al.  Security of a kind of quantum secret sharing with single photons , 2011, Quantum Inf. Comput..

[5]  Ying Sun,et al.  Quantum private query based on single-photon interference , 2016, Quantum Inf. Process..

[6]  M. Bourennane,et al.  Authority-based user authentication in quantum key distribution , 2000 .

[7]  K. Boström,et al.  Deterministic secure direct communication using entanglement. , 2002, Physical review letters.

[8]  G. Long,et al.  Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.

[9]  Fei Gao,et al.  Security of quantum secret sharing with two-particle entanglement against individual attacks , 2009, Quantum Inf. Comput..

[10]  Qiao-Yan Wen,et al.  Eavesdropping and Improvement to Multiparty Quantum Secret Sharing with Collective Eavesdropping-Check , 2009, International Journal of Theoretical Physics.

[11]  Wei Cui,et al.  Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.

[12]  Wen Qiao-Yan,et al.  Fault tolerant quantum secure direct communication with quantum encryption against collective noise , 2012 .

[13]  Tang Chao-jing,et al.  Multiparty Simultaneous Quantum Identity Authentication Based on Entanglement Swapping , 2006 .

[14]  Fei Gao,et al.  Postprocessing of the Oblivious Key in Quantum Private Query , 2014, IEEE Journal of Selected Topics in Quantum Electronics.

[15]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[16]  R. Cleve,et al.  HOW TO SHARE A QUANTUM SECRET , 1999, quant-ph/9901025.

[17]  Daesung Kwon,et al.  Quantum identity authentication with single photon , 2017, Quantum Information Processing.

[18]  Christoph Simon,et al.  Practical private database queries based on a quantum-key-distribution protocol , 2010, 1002.4360.

[19]  Bin Liu,et al.  QKD-based quantum private query without a failure probability , 2015, Science China Physics, Mechanics & Astronomy.

[20]  Jun Zhou,et al.  Quantum identity authentication based on ping-pong technique without entanglements , 2014, Quantum Information Processing.

[21]  Jian Li,et al.  Quantum key distribution and quantum authentication based on entangled state , 2001, quant-ph/0102058.

[22]  Qiaoyan Wen,et al.  Robust variations of the Bennett-Brassard 1984 protocol against collective noise , 2009 .

[23]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[24]  M. Dušek,et al.  Quantum identification system , 1998, quant-ph/9809024.

[25]  Chen Yuan,et al.  Quantum Authentication Scheme Based on Entanglement Swapping , 2016 .

[26]  Bin Liu,et al.  Quantum private comparison employing single-photon interference , 2017, Quantum Inf. Process..

[27]  Song Lin,et al.  Quantum key distribution: defeating collective noise without reducing efficiency , 2014, Quantum Inf. Comput..

[28]  Quan Zhang,et al.  Multiparty simultaneous quantum identity authentication based on entanglement swapping , 2006 .

[29]  Yan-Bing Li Analysis of counterfactual quantum key distribution using error-correcting theory , 2014, Quantum Inf. Process..

[30]  Su-Juan Qin,et al.  Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state , 2010 .

[31]  Guihua Zeng,et al.  Ja n 20 07 Improving security of quantum identity authentication based on ping-pong technique for photons , 2009 .

[32]  Peng Huang,et al.  Continuous-variable quantum identity authentication based on quantum teleportation , 2016, Quantum Information Processing.

[33]  Bin Liu,et al.  A Generic Construction of Quantum-Oblivious-Key-Transfer-Based Private Query with Ideal Database Security and Zero Failure , 2017, IEEE Transactions on Computers.

[34]  Qiaoyan Wen,et al.  Finite-key analysis for measurement-device-independent quantum key distribution , 2012 .

[35]  Goldenberg,et al.  Quantum cryptography based on orthogonal states. , 1995, Physical review letters.

[36]  Ying Guo,et al.  Graph state-based quantum authentication scheme , 2017 .

[37]  Qiaoyan Wen,et al.  Quantum secure direct communication with χ -type entangled states , 2008 .

[38]  Larry Carter,et al.  New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..

[39]  M. Curty,et al.  Quantum authentication of classical messages , 2001, quant-ph/0103122.

[40]  G. Long,et al.  Controlled order rearrangement encryption for quantum key distribution , 2003, quant-ph/0308172.

[41]  Xing Zhang,et al.  Multiparty simultaneous quantum identity authentication with secret sharing , 2008 .

[42]  Kaoru Shimizu,et al.  Single-photon-interference communication equivalent to Bell-state-basis cryptographic quantum communication , 2000 .