Secured Quantum Identity Authentication Protocol for Quantum Networks (2312.05774v1)
Abstract: Quantum Internet signifies a remarkable advancement in communication technology, harnessing the principles of quantum entanglement and superposition to facilitate unparalleled levels of security and efficient computations. Quantum communication can be achieved through the utilization of quantum entanglement. Through the exchange of entangled pairs between two entities, quantum communication becomes feasible, enabled by the process of quantum teleportation. Given the lossy nature of the channels and the exponential decoherence of the transmitted photons, a set of intermediate nodes can serve as quantum repeaters to perform entanglement swapping and directly entangle two distant nodes. Such quantum repeaters may be malicious and by setting up malicious entanglements, intermediate nodes can jeopardize the confidentiality of the quantum information exchanged between the two communication nodes. Hence, this paper proposes a quantum identity authentication protocol that protects quantum networks from malicious entanglements. Unlike the existing protocols, the proposed quantum authentication protocol does not require periodic refreshments of the shared secret keys. Simulation results demonstrate that the proposed protocol can detect malicious entanglements with a 100% probability after an average of 4 authentication rounds.
- C. h. Hong, J. Heo, J. G. Jang, and D. Kwon, “Quantum identity authentication with single photon,” Quantum Information Processing, vol. 16, no. 10, p. 236, Aug 2017. [Online]. Available: https://doi.org/10.1007/s11128-017-1681-0
- H. Zhu, L. Wang, and Y. Zhang, “An efficient quantum identity authentication key agreement protocol without entanglement,” Quantum Information Processing, vol. 19, no. 10, p. 381, Oct 2020. [Online]. Available: https://doi.org/10.1007/s11128-020-02887-z
- B. Liu et al., “Quantum identity authentication in the counterfactual quantum key distribution protocol,” Entropy, vol. 21, no. 5, 2019. [Online]. Available: https://www.mdpi.com/1099-4300/21/5/518
- Z. Chen, K. Zhou, and Q. Liao, “Quantum identity authentication scheme of vehicular ad-hoc networks,” International Journal of Theoretical Physics, vol. 58, no. 1, pp. 40–57, Jan 2019. [Online]. Available: https://doi.org/10.1007/s10773-018-3908-y
- X.-y. Zheng and Y.-x. Long, “Controlled quantum secure direct communication with authentication protocol based on five-particle cluster state and classical xor operation,” Quantum Information Processing, vol. 18, no. 5, p. 129, Mar 2019. [Online]. Available: https://doi.org/10.1007/s11128-019-2239-0
- S. Jiang, R.-G. Zhou, and W. Hu, “Semi-quantum mutual identity authentication using bell states,” International Journal of Theoretical Physics, vol. 60, no. 9, pp. 3353–3362, Sep 2021. [Online]. Available: https://doi.org/10.1007/s10773-021-04911-z
- A. Babu and N. Shanthi, “Quantum identity authentication using non-orthogonal state encoding,” in 2021 2nd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS), 2021, pp. 334–337.
- G. Chen, Y. Wang, L. Jian, Y. Zhou, and S. Liu, “Quantum identity authentication based on the extension of quantum rotation,” EPJ Quantum Technology, vol. 10, no. 1, p. 11, Apr 2023. [Online]. Available: https://doi.org/10.1140/epjqt/s40507-023-00170-5
- S. DiAdamo, J. Nötzel, B. Zanger, and M. M. Beşe, “Qunetsim: A software framework for quantum networks,” IEEE Transactions on Quantum Engineering, 2021.