Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
194 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Secured Quantum Identity Authentication Protocol for Quantum Networks (2312.05774v1)

Published 10 Dec 2023 in quant-ph, cs.CR, and cs.NI

Abstract: Quantum Internet signifies a remarkable advancement in communication technology, harnessing the principles of quantum entanglement and superposition to facilitate unparalleled levels of security and efficient computations. Quantum communication can be achieved through the utilization of quantum entanglement. Through the exchange of entangled pairs between two entities, quantum communication becomes feasible, enabled by the process of quantum teleportation. Given the lossy nature of the channels and the exponential decoherence of the transmitted photons, a set of intermediate nodes can serve as quantum repeaters to perform entanglement swapping and directly entangle two distant nodes. Such quantum repeaters may be malicious and by setting up malicious entanglements, intermediate nodes can jeopardize the confidentiality of the quantum information exchanged between the two communication nodes. Hence, this paper proposes a quantum identity authentication protocol that protects quantum networks from malicious entanglements. Unlike the existing protocols, the proposed quantum authentication protocol does not require periodic refreshments of the shared secret keys. Simulation results demonstrate that the proposed protocol can detect malicious entanglements with a 100% probability after an average of 4 authentication rounds.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (9)
  1. C. h. Hong, J. Heo, J. G. Jang, and D. Kwon, “Quantum identity authentication with single photon,” Quantum Information Processing, vol. 16, no. 10, p. 236, Aug 2017. [Online]. Available: https://doi.org/10.1007/s11128-017-1681-0
  2. H. Zhu, L. Wang, and Y. Zhang, “An efficient quantum identity authentication key agreement protocol without entanglement,” Quantum Information Processing, vol. 19, no. 10, p. 381, Oct 2020. [Online]. Available: https://doi.org/10.1007/s11128-020-02887-z
  3. B. Liu et al., “Quantum identity authentication in the counterfactual quantum key distribution protocol,” Entropy, vol. 21, no. 5, 2019. [Online]. Available: https://www.mdpi.com/1099-4300/21/5/518
  4. Z. Chen, K. Zhou, and Q. Liao, “Quantum identity authentication scheme of vehicular ad-hoc networks,” International Journal of Theoretical Physics, vol. 58, no. 1, pp. 40–57, Jan 2019. [Online]. Available: https://doi.org/10.1007/s10773-018-3908-y
  5. X.-y. Zheng and Y.-x. Long, “Controlled quantum secure direct communication with authentication protocol based on five-particle cluster state and classical xor operation,” Quantum Information Processing, vol. 18, no. 5, p. 129, Mar 2019. [Online]. Available: https://doi.org/10.1007/s11128-019-2239-0
  6. S. Jiang, R.-G. Zhou, and W. Hu, “Semi-quantum mutual identity authentication using bell states,” International Journal of Theoretical Physics, vol. 60, no. 9, pp. 3353–3362, Sep 2021. [Online]. Available: https://doi.org/10.1007/s10773-021-04911-z
  7. A. Babu and N. Shanthi, “Quantum identity authentication using non-orthogonal state encoding,” in 2021 2nd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS), 2021, pp. 334–337.
  8. G. Chen, Y. Wang, L. Jian, Y. Zhou, and S. Liu, “Quantum identity authentication based on the extension of quantum rotation,” EPJ Quantum Technology, vol. 10, no. 1, p. 11, Apr 2023. [Online]. Available: https://doi.org/10.1140/epjqt/s40507-023-00170-5
  9. S. DiAdamo, J. Nötzel, B. Zanger, and M. M. Beşe, “Qunetsim: A software framework for quantum networks,” IEEE Transactions on Quantum Engineering, 2021.

Summary

We haven't generated a summary for this paper yet.

X Twitter Logo Streamline Icon: https://streamlinehq.com