2023
DOI: 10.1140/epjqt/s40507-023-00170-5
|View full text |Cite
|
Sign up to set email alerts
|

Quantum identity authentication based on the extension of quantum rotation

Abstract: In this work, we propose a bit-oriented QIA protocol based on special properties of quantum rotation and the public key cryptographic framework. The proposed protocol exhibited good resistance to both forward search and measure-resend attacks, whereby its security performance was directly related to the length of the authentication code. From our analysis, it was demonstrated that the protocol has good performance, in terms of quantum bit efficiency. In addition, the protocol is well-expandable. The developed … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 51 publications
0
2
0
Order By: Relevance
“…Quantum mechanics has brought new possibilities to the development of the IoT, and so far, various quantum communication and quantum computing technologies have emerged. These include quantum authentication technology [4][5][6], quantum neural networks [7,8], and quantum signature technology [9,10], which greatly enhance computational efficiency and security. Quantum authentication technology aims to verify quantum channels' security, ensuring communication integrity and confidentiality.…”
Section: Introductionmentioning
confidence: 99%
“…Quantum mechanics has brought new possibilities to the development of the IoT, and so far, various quantum communication and quantum computing technologies have emerged. These include quantum authentication technology [4][5][6], quantum neural networks [7,8], and quantum signature technology [9,10], which greatly enhance computational efficiency and security. Quantum authentication technology aims to verify quantum channels' security, ensuring communication integrity and confidentiality.…”
Section: Introductionmentioning
confidence: 99%
“…In the last decades, the principles of quantum mechanics supplied many interesting cryptographic applications such as quantum key distribution, quantum secure direct communication (QSDC), quantum digital signature, and quantum secret sharing (QSS) [6,7]. In contrast to classical secret sharing, the security of QSS is based on the fundamental principles of quantum mechanics rather than mathematical difficult problems, which makes it secure against any opponent even if he/she has infinite computing resources.…”
Section: Introductionmentioning
confidence: 99%