Skip to main content
Entropy logoLink to Entropy
. 2022 Mar 30;24(4):483. doi: 10.3390/e24040483

A New Quantum Multiparty Simultaneous Identity Authentication Protocol with the Classical Third-Party

Xiang Li 1, Kejia Zhang 1,2,*, Long Zhang 1, Xu Zhao 1
Editors: Vladyslav Usenko, Stefano Olivares, Marcin Jarzyna
PMCID: PMC9029640  PMID: 35455145

Abstract

To guarantee information security in communication, quantum identity authentication plays a key role in politics, economy, finance, daily life and other fields. In this paper, a new quantum multiparty simultaneous identity authentication protocol with Greenberger–Home–Zeilinger (GHZ) state is presented. In this protocol, the authenticator and the certified parties are the participants with quantum ability, whereas the third party is a classical participant. Here, the third-party is honest and the other two parties may be dishonest. With the help of a classical third-party, a quantum authenticator and the multiple certified parties can implement two-way identity authentication at the same time. It reduces the quantum burden of participants and lowers down the trustworthiness, which makes the protocol be feasible in practice. Through further security analysis, the protocol can effectively prevent an illegal dishonest participant from obtaining a legitimate identity. It shows that the protocol is against impersonation attack, intercept-measure-resend attack and entangle-measure attack, etc. In all, the paper provides positive efforts for the subsequent security identity authentication in quantum network.

Keywords: quantum authentication, multiparty authentication, GHZ state, identity authentication

1. Introduction

In the past few years, with the rapid development of quantum computing, existing cryptographic schemes face the security threat that the scheme can not resist quantum computing attacks. In order to solve this security problem, the idea of applying quantum technology to the cryptography scheme is proposed, and then quantum cryptography appears. In quantum cryptography, the security is guaranteed by the Heisenberg uncertainty principle, quantum non-cloning theorem and other quantum mechanics principles, which is no longer based on mathematical difficulties problems. With the development of quantum cryptography, various different types of quantum cryptography protocols have been proposed, which mainly involves Quantum Key Distribution (QKD) [1,2,3], Quantum Secure Direct Communication (QSDC) [4,5,6], Quantum Authentication (QA) [7,8,9,10,11], etc. Among them, quantum authentication is becoming an important branch and has attracted more and more attention. Quantum authentication can generally be divided into the following aspects: quantum message authentication (QMA) [12,13,14], quantum entity authentication (QEA) [11,15,16], quantum identity authentication (QIA) [17,18,19,20]. Since authentication is a prerequisite for completing many quantum protocols, it will have more important application prospects in practice.

In 1999, by combining quantum key distribution and classical identification procedure, Dušek et al. first designed a secure identity authentication system [21]. In 2000, Zeng et al. put forward a quantum key verification protocol, which quantum identity authentication occurs while completing the quantum key verification [22]. In 2002, Takashi et al. presented three types of quantum identification schemes [23]. They completed two quantum identifications by using the entangled states and introducing a trusted authority. Besides, a quantum message authentication scheme was proposed via combining the quantum cryptosystem with the ordinary authentication. Until then, most QIA schemes only involved simple authentication between two or three users, but few authentications involved multiple parties. In 2006, Wang et al. proposed a multiparty simultaneous identity authentication (MSQIA) protocol based on entanglement swapping [24]. All the users in the protocol can be authenticated by a trusted third party (TTP) simultaneously. In 2013, Yang et al. proposed a quantum protocol for (t,n)-threshold identity authentication based on GHZ States [25]. In the MSQIA protocol, the trusted third party (TTP) can authenticate the users simultaneously when and only when t or more users among n apply for authentication.

In 2017, Hong et al. presented a QIA protocol based on single photons [26]. The protocol does not require any quantum memory registration and quantum entangled states to complete the authentication. In 2019, Zawadzki et al. proposed an improved version with better security for the protocol of Hong et al. [27]. The improved protocol does not require an authenticated classic channel, Bob simply confirms or denies the entire authentication transaction. In the same year, Zhang et al. presented a quantum simultaneous identity authentication based on Bell states [28]. With the help of a third party, the mutual identity authentication protocol was designed by combining Bell states and Pauli operations. This protocol can prevent a third party from knowing the originally shared key. Then, Jiang et al. proposed a mutual simultaneous identity authentication protocol between quantum user and classical user by using Bell states in 2021, which did not require the third party or complicated operations [29]. In the protocol, only the single-qubit measurement and XOR operations were performed to complete the authentication. Nevertheless, the protocols mentioned above cannot achieve multiparty simultaneous authentication.

However, in real life, it is difficult for the third-party to have quantum capability. In this paper, a new quantum multiparty simultaneous identity authentication protocol based on (r+1)-particle GHZ state the classical third-party is presented. In the protocol, the third-party does not require to prepare any quantum resources during quantum authentication communication. Moreover, the third-party only perform certain operations in the initial registration and the final certification stage, and he does not participate in the following steps. Thus, the authority of third-party is reduced and the protocol is more reasonable in reality. Furthermore, in our protocol, authenticator randomly generates quantum resource, whereas the authenticated users require to conduct measurement and reflection operations, etc.

The rest of the paper is organized as follows: in Section 2, some preliminaries are presented in this section. In Section 3, a quantum multiparty simultaneous identification protocol is proposed. In Section 4, the security analysis is described in detail. Finally, a conclusion is given in Section 5.

2. Preliminaries

The following basic theories needed to complete the authentication protocol. The r+1-particle GHZ state is widely used in quantum communication, it can be expressed as:

G±12rr+1=12(|g0g1grr+1±|g01g11gr1r+1) (1)

where gi0,1i=0,1,,r, ⊕ is the XOR operation, 1 and 0 are the two eigenstates of the Z-basis.

3. Quantum Multiparty Identity Authentication Protocol

In this section, we will introduce the details of our multi-party simultaneous identity authentication protocol. Alice is an authenticator, whereas Bob1,Bob2,,Bobr are the certified users. We suppose that a third party, Trent, can help user Alice to simultaneously authenticate the identity of r legal users Bob1,Bob2,,Bobr. The process of identity authentication protocol is shown in Figure 1. There are no noise and losses in the quantum channel.

Figure 1.

Figure 1

The process of quantum multiparty identity authentication protocol. (0): Trent shares secret keys with other users during the registration phase. (1): Alice sends quantum sequences to the Bob1,Bob2,,Bobr separately during the preparation phase. (2): Bob1,Bob2,,Bobr send the measured and operated particles to Alice, respectively. (3): At this stage, Alice announces her calculation results to Trent. (4): Finally, Trent compares the results to determine whether the authentication is successful and announces it to all users at the same time. At this point, the agreement is complete. In addition, the figure omits detecting eavesdropping stages for easy viewing. Nonetheless, these steps is essential in the protocol.

3.1. Registration

In the beginning, Alice and Bobi(i=1,2,,r) are registered with Trent, then their legal identification will be determined, respectively. In other words, each of them shares a secret identity number K with Trent. The secret identity number KA0,KB1,KB2,, KBr between Trent and Alice or Bob1,Bob2,,Bobr are represented by

KA0=KA01,KA02,,KA0NKB1=KB11,KB12,,KB1NKB2=KB21,KB22,,KB2NKBr=KBr1,KBr2,,KBrN (2)

where KA0i0,1i=1,2,,N and KBi1,KBi2,,KBiN0,1i=1,2,,r.

3.2. Authentication

3.2.1. Preparation

Alice randomly generates a sequence of N (r+1)-particle GHZ states quantum systems, each of which is in the form

G1=12SA01SB11SBr1+SA011SB111SBr11A01B11Br1G2=12SA02SB12SBr2+SA021SB121SBr21A02B12Br2GN=12SA0NSB1NSBrN+SA0N1SB1N1SBrN1A0NB1NBrN (3)

where the subscripts A0mB1mB2mBrmm=1,2,,N represent the (r+1)-particles of the m-th GHZ states. Alice divides all the particle of these GHZ states into (r+1) ordered sequences SA0,SB1,SB2,,SBr. Next, Alice randomly generates rN decoy photons from 0,1,+,, and inserts N decoy photons into SB1,SB2,,SBr, respectively. Finally, Alice holds sequence SA0 and transmits the sequences SB1,SB2,,SBr to Bob1,Bob2,,Bobr, respectively.

3.2.2. The First Eavesdropping Detection

Once Bob1,Bob2,,Bobr received sequences SB1,SB2,,SBr, Alice announces the initial positions of the rN decoy qubits. Afterwards, Bob1,Bob2,,Bobr store the sequence briefly. Then they select a subset of N decoy particles to perform the following operations: measuring the decoy photons on the Z-bases or X-bases randomly; preparing states which are same to the measured results; transmitting these decoy states from SB1,SB2,,SBr to Alice, respectively.

Once confirming that Alice has received the states, Bob1,Bob2,,Bobr publish the positions, measurement results and measurement bases of the corresponding decoy photons sequence, respectively. Alice will measure these particles by using the same basis and get the measured result R , then compare R with the measured result of her initial prepared state and checks whether the results are correct.

At last, Alice computes the total error rate. If the error rate of these particles is acceptable, the protocol will continue. Otherwise, they will give up continuing to authenticate.

3.2.3. Measurement and Operation

Bob1,Bob2,,Bobr separately make Z-basis measurements on the SB1,,SBr sequences and record the measurement results RB1,RB2,,RBr. Then they perform the following operation in order according to the secret identity number KA0,KB1,, KBr, respectively. If the bit of authentication key is 0, Bob1,Bob2,,Bobr will perform X operation on the particles which are in the sequences SB1,SB2,,SBr, respectively. If the bit of authentication key is 1, Bob1,Bob2,,Bobr will implement Y operation on the corresponding particles of sequences SB1,SB2,,SBr. The specific operations and corresponding conversion results are shown in Table 1.

Table 1.

The conversion mode of measurement result.

Quantum Bit Opreation Conversion Mode
bit =0 X: Measuring the received particles and preparing the same particles. |0|0
|1|1
bit =1 Y: Measuring the received particles and preparing the opposite particles. |0|1
|1|0

Next, Bob1,Bob2,,Bobr insert N decoy photons from 0,1,+, into the sequence RB1,RB2,,RBr, respectively. At this point, sequence RB1,RB2,,RBr is converted to sequence RB1,RB2,,RBr. At last, Bob1,Bob2,,Bobr transfer the sequences RB1,RB2,,RBr to Alice.

3.2.4. The Second Eavesdropping Detection

Firstly, Bob1,Bob2,,Bobr confirm that Alice has received the sequence RB1,RB2, ,RBr. Then they announce the positions, measurement results and measurement bases of the corresponding N decoy photons in the sequences, respectively. After that, Alice performs the same operation as the first detection eavesdrop. Finally, Alice counts the total error rate. If the error rate exceeds the security threshold, the protocol will be terminated. Otherwise, they will continue to authenticate.

3.2.5. Verification

After passing the second eavesdropping detection, sequences RB1,RB2,,RBr are restored to RB1,RB2,,RBr by Alice. Then she performs Z-basis measurement on the qubits at the corresponding positions of SA0,RB1,RB2,,RBr. After the measurement, according to the conversion rules are shown in Table 2, the measurement results are converted into classical results x,R¯B1,R¯B2,,R¯Br, which can be denoted as

x=x1,x2,,xNR¯B1=RB11,RB12,,RB1NR¯B2=RB21,RB22,,RB2NR¯Br=RBr1,RBr2,,RBrN (4)
Table 2.

The conversion rule of measurement result.

Measurement Result Classical Result
|0 0
|1 1

Then Alice publishes the results of Qj=xjyjzj, where xj is the measurement result of SA0, yj=RB1jRB2jRBrj, zj=SA0jSB1jSB2jSBrj (j=1,2,,N and ⊕ is the XOR operation). Afterward, Trent calculates Qj=KA0jKB1jKBrj. If Qj=Qj, Alice and Bob1,Bob2,,Bobr will be seen as legitimate participants. Otherwise, there will be illegal communicators in the protocol. Finally, Trent announces to Alice and Bob1,Bob2,,Bobr whether the certification is successful.

4. Security Analysis

Security is the most important part of quantum communication protocols. In this section, the security of the multiparty identity authentication protocol is discussed. During the transmitting procedure of quantum signals, there may be an eavesdropper who wants to pass the identity authentication by illegal operations. In general, eavesdroppers are divided into two situations, which are internal eavesdropper and external eavesdropper. Next, the security of the protocol is analyzed for both aspects.

4.1. Internal Attack

4.1.1. Impersonation Attack

In the proposed quantum multiparty identity authentication protocol, Alice is the authenticator and resource provider, whereas Bob1,,Bobr play the authenticated roles. In this subsection, Bobe is one of Bob1,,Bobr and he may have two methods to execute the impersonation attack.

On the one hand, we suppose that attacker Bobe attempts to impersonate verifier Alice. Bobe randomly generates quantum states and allocates entangled particles to Bob1,,Bobr. In the paper, Bobe can follow the protocol steps faithfully, but he tries to extract the authentication keys between Trent and Alice. When Bobe proceeded to the Section 3.2.5, he could only perform random XOR operations on qubits due to his ignorance of the pre-shared key KA0. He also does not know the measurement results x of sequence SA0. If Bob wants to publish the calculation results Qi, he will need to randomly choose one of the classical bit values of 0 or 1 to perform the XOR operations. Therefore, the probability that Bobe can successfully impersonate Alice is 12N. As shown on the left of Figure 2, when the number N of particles is large enough, the probability P1=112N of failure of Bobe approximates 1.

Figure 2.

Figure 2

(Left) the probability P1 of Bobe being detected. (Right) the probability P2 of Bobe being detected.

On the other hand, attacker Bobe may impersonate the legitimate user Bobj(ej). Firstly, Bobj has previously registered his identity information with Trent. That is, he has shared the secret identity key with Trent. In Section 3.2.3, Bobe requires to perform corresponding operation on the measurement result RBj by combining Bobj’s identity numbers KBj and the transition rules of Table 1. Next, although Bobe knows the conversion rules, he is ignorant of Bobj’s identity KBj. Hence he can perform X or Y operations on the received sequence randomly. The probability of choosing either the correct operation or the incorrect operation is 12. Besides, the probability that the Bobe gets the correct conversion result is 12N. Finally, the probability P2=112×12N of Bobe’s attack being found tends to be 1 in the Figure 2. Therefore, the protocol can effectively resist impersonation attacks.

4.1.2. Entangle and Measure Attack

Moreover, we discuss whether some illegal users can get secret information through entanglement measurement attack in the process of information interaction. When the qubits are sent from Alice to Bobj, we suppose BobE performs operation UE on the system composed of decoy photons 0,1,+,and the ancillary state which is prepared by BobE as UE. We can get

UE0e=a0e00+b1e01UE1e=c0e10+d1e11 (5)
UE+e=120ae00+ce10+1be01+de11=12+ae00+be01+ce10+de11+ae00be01+ce10de11 (6)
UEe=120ae00ce10+1be01de11=12+ae00+be01ce10de11+ae00be01ce10+de11 (7)

where e00,e01,e10,e11 belong to the Hilbert space of BobE’s probes anda2+b2+c2+d2=1. After transmission, BobE measures ancillary qubit to get Bobj’s operations. In order to pass the eavesdropping detection without introducing any errors, he should perform the following actions:

b=c=0ae00+be01ce10de11=0ae00be01ce10+de11=0 (8)

However, if b=c=0, it means ae00=de11. It shows that BobE cannot distinguish between ae00 and de11. Hence, the proposed protocol can resist the entangle-measure attack.

4.1.3. Intercept–Measure–Resend Attack

Actually, Bobe as one of Bob1,,Bobr can only get his identity number from the third party Trent. Now, we consider whether he can get the identity of Bobjej. First of all, he could not have obtained any related information about the identity of Bobj by accessing Trent since the third party is absolutely honest with our protocol. Furthermore, he also can’t get the true identity of Bobj through the intercept–measure–resend attack.

In Section 3.2.1, Alice inserts rN decoy photons into the sequences SB1,SB2,,SBr each for the eavesdropping detection, respectively. However, Bobe does not know the initial positions and initial states of the decoy particles in the sequence Alice sent to Bobj. Bobe is a quantum participant who can perform measurement operations on the Z-basis and X-basis. Therefore, if he wants to intercept the particle that Alice is transmitting to Bobj in Section 3.2.1, the measurement based on Z-bases and X-bases randomly can be performed. There are four measurements for these bases, |1, |0, |+and|. Furthermore, it is difficult to just select the correct N position in the 2N sequence. His probability of success is 12×14N=18N.

As shown on the left of Figure 3, when N is large enough, the probability P3=118N is approximate to 1. Therefore, it is almost impossible for illegal behavior of Bobe not to be detected.

Figure 3.

Figure 3

(Left) the probability P3 of Bobe being detected. (Right) the probability P4 of Eve being detected.

4.2. External Attack

Unlike internal attackers, external attackers are illegal eavesdroppers from the outside. Eve is an eavesdropper who wishes to obtain some secret information to pass the identity authentication. Eve often uses the impersonation attack, the entangle and measure attack and the intercept–measure–resend attack, etc. The security of some attacks is analyzed below.

We assume that Eve tries to impersonate Bobi(i=1,2,,r). In the Section 3.2.2, Alice inserted rN decoy particles into the sequence and sent them to Bob1,Bob2,,Bobr for detection eavesdropping, respectively. After Eve receives the particles, she randomly measures and sends the qubits to Alice. Moreover, Eve randomly measures particles based on Z-basis or X-basis since she dose not know the authentication key sequence SBi shared only by Alice and Bobi. The probability of her choosing the right operation is 12 and the probability of picking the correct N particles from 2N sequence is 13. Hence the probability of Eve being detected is P4=112×12×14N. As shown on the right side of Figure 3, if N is large enough, the probability P4 approximates to 1. Therefore, it is difficult for Eve to pass the eavesdropping detection.

Similar to impersonation attacks, Eve is an external attacker while in the entangle and measure attack and the intercept–measure–resend attack. Eve has less information than an internal attacker, hence the probabilities of failure are higher.

5. Further Discussion

In this section, we compare different models to demonstrate that our protocol may be more plausible, then comparing and summarizing the quantum authentication protocols in Table 3. Through the following comparison, it can be found that most of the existing quantum authentication protocols with the third party(TP) and our proposed protocol are two different models.

Table 3.

Comparison among some different quantum authentication protocols.

Protocol Participants The Third Party Quantum Resource
Wang et al. [24] Multipartite Quantum third party GHZ state
Yang et al. [25] Multipartite Quantum third party GHZ state
Zhang et al. [28] Mutual Quantum third party Bell state
Jiang et al. [29] Mutual No third party Bell state
Wu et al. [30] Multipartite Quantum third party Bell state and GHZ state
Our protocol Multipartite Classical third party GHZ state

Model 1: The model of a quantum authentication protocol with a third party is simplified as follows [11,28]: Suppose Alice and Bob are two legitimate participants who want to authenticate each other, and the TP is a third party that helps them authenticate. Before the authentication protocol begins, the legitimate Alice and the legitimate Bob share a key in advance. During the authentication process, the TP will generate the quantum states and distribute them to the participants, Alice and Bob will perform operations according to the keys. Finally, the participants confirm the identity of the other party by comparing the results published by the other party.

Model 2: Our proposed protocol model is simplified as follows (for the convenience of comparison, the multi-party protocol is simplified to two parties): Suppose Alice and Bob are two legitimate participants who want to authenticate each other, and the TP is a third party that helps them authenticate. Before the authentication protocol begins, Alice and Bob register their legal identities with the TP. That is, they share the secret keys with the TP, respectively. During the authentication process, Alice will generate the quantum states and distribute them to herself and Bob, and then Alice and Bob will perform certain operations based on the keys. Finally, The TP confirms the identity of the participants by comparing the calculation results of itself and Alice, and announces the results to the participants.

In practice, Model 2 is more suitable for quantum multi-party authentication than Model 1. If Alice and Bob1,Bob2,,Bobr want to share keys, any two parties must share keys, which will increase a lot of unnecessary work. It is a very complicated process for each participant to share keys with each other, so we introduce a third party to actually conduct centralized key management, which simplifies the process of key distribution. Moreover, even if TP is not introduced, Model 1 can complete the mutual authentication. For example, Ref. [26] and Ref. [27] accomplish mutual authentication without introducing a third party. Therefore, in fact, our model makes more sense in practice.

Furthermore, we compare and summarize the quantum authentication protocols in Table 3. Compared with the previous quantum identity authentication, we extend the two-party authentication to multi-party authentication, which does not require all communicators to own quantum capacity. In this paper, quantum Alice and Bob1,Bob2,,Bobr are able to complete identity authentication simultaneously based on (r+1)-particle GHZ states with the help of classical Trent. Only the initial registration and the final certification stage require him to perform some classical operations, and he does not participate in the rest of the time. In other words, the rights of the third party are better reduced.

6. Conclusions

In this paper, with the help of a classical third-party, a quantum multiparty simultaneous identity authentication protocol with GHZ state is presented. A trusted third-party centrally manages the keys of the participants, and Alice and Bob1,Bob2,,Bobr complete authentication at the same time. The analysis of this protocol can effectively prevent illegal participants or attackers from obtaining legal identity information, and it can resist all kinds of ordinary attacks from the inside and outside. In addition, similar with the previous quantum multiparty simultaneous identity authentication protocol, the security analysis is based on the case of “no noise and no loss” in quantum channels [9,24,31]. In this case, our paper is also designed against the assumption of “no noise and no loss” in quantum channels. However, we need to make it clear that the security analysis under different noise rates is indeed an important content. We hope that this protocol have better application scenarios in the future.

Abbreviations

The following abbreviations are used in this manuscript:

GHZ Greenberger–Home–Zeilinger
QIA Quantum Identity Authentication
QKD Quantum Key Distribution
TTP trusted third party

Author Contributions

Conceptualization, X.L. and K.Z.; methodology, X.L.; software, X.L.; validation, X.L., K.Z., L.Z. and X.Z.; writing—original draft preparation, X.L.; writing—review and editing, X.L.and K.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China under Grant No. 61802118, the Heilongjiang Provincial Natural Science Foundation of China under Grant No. YQ2020F013, the Open Foundation of State key Laboratory of Networking and Switching Technology (BUPT) under Grant No. SKLNST-2018-1-07. The Outstanding Youth Fund of Heilongjiang University supported Kejia Zhang.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Footnotes

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Deng F.G., Long G.L. Bidirectional quantum key distribution protocol with practical faint laser pulses. Phys. Rev. A. 2005;70:012311. doi: 10.1103/PhysRevA.70.012311. [DOI] [Google Scholar]
  • 2.Wang X., Hu J. Quantum key distribution with the decoy-state method. Sci. Sin. Phys. Mech. Astron. 2011;41:459–465. doi: 10.1360/132011-65. [DOI] [Google Scholar]
  • 3.Wu J.Z., Yan L. International Conference on Artificial Intelligence and Security. Springer; Cham, Switzerland: 2020. Quantum Key Distribution Protocol Based on GHZ Like State and Bell State; pp. 298–306. [Google Scholar]
  • 4.Wang C., Deng F.G., Li Y.S., Liu X.S., Long G.L. Quantum secure direct communication with high dimension quantum superdense coding. Phys. Rev. A. 2005;71:044305. doi: 10.1103/PhysRevA.71.044305. [DOI] [Google Scholar]
  • 5.Yu C.H., De Guo G., Lin S. Quantum secure direct communication with authentication using two nonorthogonal states. Int. J. Theor. Phys. 2013;52:1937–1945. doi: 10.1007/s10773-012-1336-y. [DOI] [Google Scholar]
  • 6.Jin X.R., Ji X., Zhang Y.Q., Shou Z., Hong S.K., Yeon K.H. Three-party quantum secure direct communication based on GHZ states. Phys. Lett. A. 2006;354:67–70. doi: 10.1016/j.physleta.2006.01.035. [DOI] [Google Scholar]
  • 7.Gao T.F., Yan L., Wang Z.X. Controlled quantum teleportation and secure direct communication. Chin. Phys. 2005;14:893–897. [Google Scholar]
  • 8.Lee H., Lim J., Yang H.J. Quantum direct communication with authentication. Phys. Rev. A. 2006;73:042305. doi: 10.1103/PhysRevA.73.042305. [DOI] [Google Scholar]
  • 9.Yang Y.G., Wen Q.Y. Economical multiparty simultaneous quantum identity authentication based on Greenberger–Horne–Zeilinger states. Chin. Phys. B. 2009;18:3233–3236. [Google Scholar]
  • 10.Kang M.S., Choi Y.H., Kim Y.S., Cho Y.W., Lee S.Y., Han S.W., Moon S. Quantum message authentication scheme based on remote state preparation. Phys. Scripta. 2018;93:115102. doi: 10.1088/1402-4896/aae1a1. [DOI] [Google Scholar]
  • 11.Kang M.S., Heo J., Hong C.H. Controlled mutual quantum entity authentication with an untrusted third party. Quantum Inf. Process. 2018;17:159. doi: 10.1007/s11128-018-1927-5. [DOI] [Google Scholar]
  • 12.Curty M., Santos D. Quantum authentication of classical messages. Phys. Rev. A. 2012;64:168. doi: 10.1103/PhysRevA.64.062309. [DOI] [Google Scholar]
  • 13.Bartkiewicz K., Černoch A., Lemr K. Using quantum routers to implement quantum message authentication and Bell-state manipulation. Phys. Rev. A. 2014;90:022335. doi: 10.1103/PhysRevA.90.022335. [DOI] [Google Scholar]
  • 14.Lee H., Hong C., Kim H., Lim J., Yang H.J. Arbitrated quantum signature scheme with message recovery. Phys. Lett. A. 2004;321:295–300. doi: 10.1016/j.physleta.2003.12.036. [DOI] [Google Scholar]
  • 15.Kang M.S., Hong C.H., Heo J., Lim J.I. Controlled mutual quantum entity authentication using entanglement swapping. Chin. Phys. B. 2015;24:120–128. doi: 10.1088/1674-1056/24/9/090306. [DOI] [Google Scholar]
  • 16.Wang Q., Zhang S., Wang S.L., Shi R.H. Comment on “Controlled mutual quantum entity authentication with an untrusted third party”. Quantum Inf. Process. 2020;19:125. doi: 10.1007/s11128-020-2611-0. [DOI] [Google Scholar]
  • 17.Yuan H., Liu Y.M., Pan G.Z., Zhang G., Zhou J., Zhang Z.J. Quantum identity authentication based on ping-pong technique without entanglements. Quantum Inf. Process. 2014;13:2535–2549. doi: 10.1007/s11128-014-0808-9. [DOI] [Google Scholar]
  • 18.Ma H., Huang P., Bao W., Zeng G. Continuous-variable quantum identity authentication based on quantum teleportation. Quantum Inf. Process. 2016;15:2605–2620. doi: 10.1007/s11128-016-1283-2. [DOI] [Google Scholar]
  • 19.Chen Z.Y., Zhou K.L., Liao Q. Quantum identity authentication scheme of vehicular ad-hoc networks. Int. J. Theor. Phys. 2018;58:40–57. doi: 10.1007/s10773-018-3908-y. [DOI] [Google Scholar]
  • 20.Liu B., Gao Z., Xiao D., Huang W., Zhang Z., Xu B. Quantum identity authentication in the counterfactual quantum key distribution protocol. Entropy. 2019;21:518. doi: 10.3390/e21050518. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 21.Dušek M., Haderka O., Hendrych M., Myška R. Quantum identification system. Phys. Rev. A. 1999;60:149–156. doi: 10.1103/PhysRevA.60.149. [DOI] [Google Scholar]
  • 22.Zeng G., Zhang W. Identity verification in quantum key distribution. Phys. Rev. A. 2000;61:22303. doi: 10.1103/PhysRevA.61.022303. [DOI] [Google Scholar]
  • 23.Mihara T. Quantum identification schemes with entanglements. Phys. Rev. A. 2002;65:52326. doi: 10.1103/PhysRevA.65.052326. [DOI] [Google Scholar]
  • 24.Wang J., Quan Z., Chao J.T. Multiparty simultaneous quantum identity authentication based on entanglement swapping. Chin. Phys. Lett. 2006;23:2360–2363. [Google Scholar]
  • 25.Yang Y.G., Wang H.Y., Jia X., Zhang H. A quantum protocol for (t,n)-threshold identity authentication based on greenberger-horne-zeilinger states. Int. J. Theor. Phys. 2013;52:524–530. doi: 10.1007/s10773-012-1356-7. [DOI] [Google Scholar]
  • 26.Hong C.H., Heo J., Jang J.G., Kwon D. Quantum identity authentication with single photon. Quantum Inf. Process. 2017;16:236. doi: 10.1007/s11128-017-1681-0. [DOI] [Google Scholar]
  • 27.Zawadzki P. Quantum identity authentication without entanglement. Quantum Inf. Process. 2019;18:7. doi: 10.1007/s11128-018-2124-2. [DOI] [Google Scholar]
  • 28.Zhang S., Chen Z.K., Shi R.H., Liang F.Y. A novel quantum identity authentication based on bell states. Int. J. Theor. Phys. 2020;59:236–249. doi: 10.1007/s10773-019-04319-w. [DOI] [Google Scholar]
  • 29.Jiang S.Q., Zhou R.G., Hu W.W. Semi-quantum mutual identity authentication using Bell states. Int. J. Theor. Phys. 2019;60:3353–3362. doi: 10.1007/s10773-021-04911-z. [DOI] [Google Scholar]
  • 30.Wu Y., Chang H., Guo G., Lin S. Multi-party quantum key agreement protocol with authentication. Mod. Phys. Lett. B. 2021;21:495. doi: 10.1007/s10773-021-04954-2. [DOI] [Google Scholar]
  • 31.Yang Y.G., Wen Q., Xing Z. Multiparty simultaneous quantum identity authentication with secret sharing. Sci. China Ser. G Phys. Mech. Astron. 2008;51:321–327. doi: 10.1007/s11433-008-0034-5. [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

Not applicable.


Articles from Entropy are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES