Abstract
To guarantee information security in communication, quantum identity authentication plays a key role in politics, economy, finance, daily life and other fields. In this paper, a new quantum multiparty simultaneous identity authentication protocol with Greenberger–Home–Zeilinger (GHZ) state is presented. In this protocol, the authenticator and the certified parties are the participants with quantum ability, whereas the third party is a classical participant. Here, the third-party is honest and the other two parties may be dishonest. With the help of a classical third-party, a quantum authenticator and the multiple certified parties can implement two-way identity authentication at the same time. It reduces the quantum burden of participants and lowers down the trustworthiness, which makes the protocol be feasible in practice. Through further security analysis, the protocol can effectively prevent an illegal dishonest participant from obtaining a legitimate identity. It shows that the protocol is against impersonation attack, intercept-measure-resend attack and entangle-measure attack, etc. In all, the paper provides positive efforts for the subsequent security identity authentication in quantum network.
Keywords: quantum authentication, multiparty authentication, GHZ state, identity authentication
1. Introduction
In the past few years, with the rapid development of quantum computing, existing cryptographic schemes face the security threat that the scheme can not resist quantum computing attacks. In order to solve this security problem, the idea of applying quantum technology to the cryptography scheme is proposed, and then quantum cryptography appears. In quantum cryptography, the security is guaranteed by the Heisenberg uncertainty principle, quantum non-cloning theorem and other quantum mechanics principles, which is no longer based on mathematical difficulties problems. With the development of quantum cryptography, various different types of quantum cryptography protocols have been proposed, which mainly involves Quantum Key Distribution (QKD) [1,2,3], Quantum Secure Direct Communication (QSDC) [4,5,6], Quantum Authentication (QA) [7,8,9,10,11], etc. Among them, quantum authentication is becoming an important branch and has attracted more and more attention. Quantum authentication can generally be divided into the following aspects: quantum message authentication (QMA) [12,13,14], quantum entity authentication (QEA) [11,15,16], quantum identity authentication (QIA) [17,18,19,20]. Since authentication is a prerequisite for completing many quantum protocols, it will have more important application prospects in practice.
In 1999, by combining quantum key distribution and classical identification procedure, Dušek et al. first designed a secure identity authentication system [21]. In 2000, Zeng et al. put forward a quantum key verification protocol, which quantum identity authentication occurs while completing the quantum key verification [22]. In 2002, Takashi et al. presented three types of quantum identification schemes [23]. They completed two quantum identifications by using the entangled states and introducing a trusted authority. Besides, a quantum message authentication scheme was proposed via combining the quantum cryptosystem with the ordinary authentication. Until then, most QIA schemes only involved simple authentication between two or three users, but few authentications involved multiple parties. In 2006, Wang et al. proposed a multiparty simultaneous identity authentication (MSQIA) protocol based on entanglement swapping [24]. All the users in the protocol can be authenticated by a trusted third party (TTP) simultaneously. In 2013, Yang et al. proposed a quantum protocol for (t,n)-threshold identity authentication based on GHZ States [25]. In the MSQIA protocol, the trusted third party (TTP) can authenticate the users simultaneously when and only when t or more users among n apply for authentication.
In 2017, Hong et al. presented a QIA protocol based on single photons [26]. The protocol does not require any quantum memory registration and quantum entangled states to complete the authentication. In 2019, Zawadzki et al. proposed an improved version with better security for the protocol of Hong et al. [27]. The improved protocol does not require an authenticated classic channel, Bob simply confirms or denies the entire authentication transaction. In the same year, Zhang et al. presented a quantum simultaneous identity authentication based on Bell states [28]. With the help of a third party, the mutual identity authentication protocol was designed by combining Bell states and Pauli operations. This protocol can prevent a third party from knowing the originally shared key. Then, Jiang et al. proposed a mutual simultaneous identity authentication protocol between quantum user and classical user by using Bell states in 2021, which did not require the third party or complicated operations [29]. In the protocol, only the single-qubit measurement and XOR operations were performed to complete the authentication. Nevertheless, the protocols mentioned above cannot achieve multiparty simultaneous authentication.
However, in real life, it is difficult for the third-party to have quantum capability. In this paper, a new quantum multiparty simultaneous identity authentication protocol based on -particle GHZ state the classical third-party is presented. In the protocol, the third-party does not require to prepare any quantum resources during quantum authentication communication. Moreover, the third-party only perform certain operations in the initial registration and the final certification stage, and he does not participate in the following steps. Thus, the authority of third-party is reduced and the protocol is more reasonable in reality. Furthermore, in our protocol, authenticator randomly generates quantum resource, whereas the authenticated users require to conduct measurement and reflection operations, etc.
The rest of the paper is organized as follows: in Section 2, some preliminaries are presented in this section. In Section 3, a quantum multiparty simultaneous identification protocol is proposed. In Section 4, the security analysis is described in detail. Finally, a conclusion is given in Section 5.
2. Preliminaries
The following basic theories needed to complete the authentication protocol. The -particle GHZ state is widely used in quantum communication, it can be expressed as:
| (1) |
where , ⊕ is the XOR operation, and are the two eigenstates of the Z-basis.
3. Quantum Multiparty Identity Authentication Protocol
In this section, we will introduce the details of our multi-party simultaneous identity authentication protocol. is an authenticator, whereas are the certified users. We suppose that a third party, , can help user to simultaneously authenticate the identity of r legal users . The process of identity authentication protocol is shown in Figure 1. There are no noise and losses in the quantum channel.
Figure 1.
The process of quantum multiparty identity authentication protocol. (0): shares secret keys with other users during the registration phase. (1): sends quantum sequences to the separately during the preparation phase. (2): send the measured and operated particles to , respectively. (3): At this stage, announces her calculation results to . (4): Finally, compares the results to determine whether the authentication is successful and announces it to all users at the same time. At this point, the agreement is complete. In addition, the figure omits detecting eavesdropping stages for easy viewing. Nonetheless, these steps is essential in the protocol.
3.1. Registration
In the beginning, and are registered with , then their legal identification will be determined, respectively. In other words, each of them shares a secret identity number K with . The secret identity number , between and or are represented by
| (2) |
where and .
3.2. Authentication
3.2.1. Preparation
randomly generates a sequence of N -particle GHZ states quantum systems, each of which is in the form
| (3) |
where the subscripts represent the -particles of the m-th GHZ states. divides all the particle of these GHZ states into ordered sequences . Next, randomly generates decoy photons from , and inserts N decoy photons into , respectively. Finally, holds sequence and transmits the sequences to , respectively.
3.2.2. The First Eavesdropping Detection
Once received sequences , announces the initial positions of the decoy qubits. Afterwards, store the sequence briefly. Then they select a subset of N decoy particles to perform the following operations: measuring the decoy photons on the Z-bases or X-bases randomly; preparing states which are same to the measured results; transmitting these decoy states from to , respectively.
Once confirming that has received the states, publish the positions, measurement results and measurement bases of the corresponding decoy photons sequence, respectively. will measure these particles by using the same basis and get the measured result R , then compare R with the measured result of her initial prepared state and checks whether the results are correct.
At last, computes the total error rate. If the error rate of these particles is acceptable, the protocol will continue. Otherwise, they will give up continuing to authenticate.
3.2.3. Measurement and Operation
separately make Z-basis measurements on the sequences and record the measurement results . Then they perform the following operation in order according to the secret identity number , , respectively. If the bit of authentication key is 0, will perform X operation on the particles which are in the sequences , respectively. If the bit of authentication key is 1, will implement Y operation on the corresponding particles of sequences . The specific operations and corresponding conversion results are shown in Table 1.
Table 1.
The conversion mode of measurement result.
| Quantum Bit | Opreation | Conversion Mode |
|---|---|---|
| bit | X: Measuring the received particles and preparing the same particles. | |
| bit | Y: Measuring the received particles and preparing the opposite particles. | |
Next, insert N decoy photons from into the sequence , respectively. At this point, sequence is converted to sequence . At last, transfer the sequences to .
3.2.4. The Second Eavesdropping Detection
Firstly, confirm that has received the sequence . Then they announce the positions, measurement results and measurement bases of the corresponding N decoy photons in the sequences, respectively. After that, performs the same operation as the first detection eavesdrop. Finally, counts the total error rate. If the error rate exceeds the security threshold, the protocol will be terminated. Otherwise, they will continue to authenticate.
3.2.5. Verification
After passing the second eavesdropping detection, sequences are restored to by . Then she performs Z-basis measurement on the qubits at the corresponding positions of . After the measurement, according to the conversion rules are shown in Table 2, the measurement results are converted into classical results , which can be denoted as
| (4) |
Table 2.
The conversion rule of measurement result.
| Measurement Result | Classical Result |
|---|---|
| 0 | |
| 1 |
Then publishes the results of , where is the measurement result of , , ( and ⊕ is the XOR operation). Afterward, calculates . If , and will be seen as legitimate participants. Otherwise, there will be illegal communicators in the protocol. Finally, announces to and whether the certification is successful.
4. Security Analysis
Security is the most important part of quantum communication protocols. In this section, the security of the multiparty identity authentication protocol is discussed. During the transmitting procedure of quantum signals, there may be an eavesdropper who wants to pass the identity authentication by illegal operations. In general, eavesdroppers are divided into two situations, which are internal eavesdropper and external eavesdropper. Next, the security of the protocol is analyzed for both aspects.
4.1. Internal Attack
4.1.1. Impersonation Attack
In the proposed quantum multiparty identity authentication protocol, is the authenticator and resource provider, whereas play the authenticated roles. In this subsection, is one of and he may have two methods to execute the impersonation attack.
On the one hand, we suppose that attacker attempts to impersonate verifier . randomly generates quantum states and allocates entangled particles to . In the paper, can follow the protocol steps faithfully, but he tries to extract the authentication keys between and . When proceeded to the Section 3.2.5, he could only perform random XOR operations on qubits due to his ignorance of the pre-shared key . He also does not know the measurement results x of sequence . If Bob wants to publish the calculation results , he will need to randomly choose one of the classical bit values of 0 or 1 to perform the XOR operations. Therefore, the probability that can successfully impersonate is . As shown on the left of Figure 2, when the number N of particles is large enough, the probability of failure of approximates 1.
Figure 2.
(Left) the probability of being detected. (Right) the probability of being detected.
On the other hand, attacker may impersonate the legitimate user . Firstly, has previously registered his identity information with . That is, he has shared the secret identity key with . In Section 3.2.3, requires to perform corresponding operation on the measurement result by combining ’s identity numbers and the transition rules of Table 1. Next, although knows the conversion rules, he is ignorant of ’s identity . Hence he can perform X or Y operations on the received sequence randomly. The probability of choosing either the correct operation or the incorrect operation is . Besides, the probability that the gets the correct conversion result is . Finally, the probability of ’s attack being found tends to be 1 in the Figure 2. Therefore, the protocol can effectively resist impersonation attacks.
4.1.2. Entangle and Measure Attack
Moreover, we discuss whether some illegal users can get secret information through entanglement measurement attack in the process of information interaction. When the qubits are sent from to , we suppose performs operation on the system composed of decoy photons and the ancillary state which is prepared by as . We can get
| (5) |
| (6) |
| (7) |
where belong to the Hilbert space of ’s probes and. After transmission, measures ancillary qubit to get ’s operations. In order to pass the eavesdropping detection without introducing any errors, he should perform the following actions:
| (8) |
However, if , it means . It shows that cannot distinguish between and . Hence, the proposed protocol can resist the entangle-measure attack.
4.1.3. Intercept–Measure–Resend Attack
Actually, as one of can only get his identity number from the third party . Now, we consider whether he can get the identity of . First of all, he could not have obtained any related information about the identity of by accessing since the third party is absolutely honest with our protocol. Furthermore, he also can’t get the true identity of through the intercept–measure–resend attack.
In Section 3.2.1, inserts decoy photons into the sequences each for the eavesdropping detection, respectively. However, does not know the initial positions and initial states of the decoy particles in the sequence sent to . is a quantum participant who can perform measurement operations on the Z-basis and X-basis. Therefore, if he wants to intercept the particle that is transmitting to in Section 3.2.1, the measurement based on Z-bases and X-bases randomly can be performed. There are four measurements for these bases, , , and. Furthermore, it is difficult to just select the correct N position in the sequence. His probability of success is .
As shown on the left of Figure 3, when N is large enough, the probability is approximate to 1. Therefore, it is almost impossible for illegal behavior of not to be detected.
Figure 3.
(Left) the probability of being detected. (Right) the probability of being detected.
4.2. External Attack
Unlike internal attackers, external attackers are illegal eavesdroppers from the outside. is an eavesdropper who wishes to obtain some secret information to pass the identity authentication. often uses the impersonation attack, the entangle and measure attack and the intercept–measure–resend attack, etc. The security of some attacks is analyzed below.
We assume that tries to impersonate . In the Section 3.2.2, inserted decoy particles into the sequence and sent them to for detection eavesdropping, respectively. After receives the particles, she randomly measures and sends the qubits to Alice. Moreover, randomly measures particles based on Z-basis or X-basis since she dose not know the authentication key sequence shared only by and . The probability of her choosing the right operation is and the probability of picking the correct N particles from sequence is . Hence the probability of being detected is =. As shown on the right side of Figure 3, if N is large enough, the probability approximates to 1. Therefore, it is difficult for to pass the eavesdropping detection.
Similar to impersonation attacks, is an external attacker while in the entangle and measure attack and the intercept–measure–resend attack. has less information than an internal attacker, hence the probabilities of failure are higher.
5. Further Discussion
In this section, we compare different models to demonstrate that our protocol may be more plausible, then comparing and summarizing the quantum authentication protocols in Table 3. Through the following comparison, it can be found that most of the existing quantum authentication protocols with the third party(TP) and our proposed protocol are two different models.
Table 3.
Comparison among some different quantum authentication protocols.
| Protocol | Participants | The Third Party | Quantum Resource |
|---|---|---|---|
| Wang et al. [24] | Multipartite | Quantum third party | GHZ state |
| Yang et al. [25] | Multipartite | Quantum third party | GHZ state |
| Zhang et al. [28] | Mutual | Quantum third party | Bell state |
| Jiang et al. [29] | Mutual | No third party | Bell state |
| Wu et al. [30] | Multipartite | Quantum third party | Bell state and GHZ state |
| Our protocol | Multipartite | Classical third party | GHZ state |
Model 1: The model of a quantum authentication protocol with a third party is simplified as follows [11,28]: Suppose and are two legitimate participants who want to authenticate each other, and the TP is a third party that helps them authenticate. Before the authentication protocol begins, the legitimate and the legitimate share a key in advance. During the authentication process, the TP will generate the quantum states and distribute them to the participants, and will perform operations according to the keys. Finally, the participants confirm the identity of the other party by comparing the results published by the other party.
Model 2: Our proposed protocol model is simplified as follows (for the convenience of comparison, the multi-party protocol is simplified to two parties): Suppose and are two legitimate participants who want to authenticate each other, and the TP is a third party that helps them authenticate. Before the authentication protocol begins, and register their legal identities with the TP. That is, they share the secret keys with the TP, respectively. During the authentication process, will generate the quantum states and distribute them to herself and , and then and will perform certain operations based on the keys. Finally, The TP confirms the identity of the participants by comparing the calculation results of itself and , and announces the results to the participants.
In practice, Model 2 is more suitable for quantum multi-party authentication than Model 1. If and want to share keys, any two parties must share keys, which will increase a lot of unnecessary work. It is a very complicated process for each participant to share keys with each other, so we introduce a third party to actually conduct centralized key management, which simplifies the process of key distribution. Moreover, even if TP is not introduced, Model 1 can complete the mutual authentication. For example, Ref. [26] and Ref. [27] accomplish mutual authentication without introducing a third party. Therefore, in fact, our model makes more sense in practice.
Furthermore, we compare and summarize the quantum authentication protocols in Table 3. Compared with the previous quantum identity authentication, we extend the two-party authentication to multi-party authentication, which does not require all communicators to own quantum capacity. In this paper, quantum and are able to complete identity authentication simultaneously based on -particle GHZ states with the help of classical . Only the initial registration and the final certification stage require him to perform some classical operations, and he does not participate in the rest of the time. In other words, the rights of the third party are better reduced.
6. Conclusions
In this paper, with the help of a classical third-party, a quantum multiparty simultaneous identity authentication protocol with GHZ state is presented. A trusted third-party centrally manages the keys of the participants, and and complete authentication at the same time. The analysis of this protocol can effectively prevent illegal participants or attackers from obtaining legal identity information, and it can resist all kinds of ordinary attacks from the inside and outside. In addition, similar with the previous quantum multiparty simultaneous identity authentication protocol, the security analysis is based on the case of “no noise and no loss” in quantum channels [9,24,31]. In this case, our paper is also designed against the assumption of “no noise and no loss” in quantum channels. However, we need to make it clear that the security analysis under different noise rates is indeed an important content. We hope that this protocol have better application scenarios in the future.
Abbreviations
The following abbreviations are used in this manuscript:
| GHZ | Greenberger–Home–Zeilinger |
| QIA | Quantum Identity Authentication |
| QKD | Quantum Key Distribution |
| TTP | trusted third party |
Author Contributions
Conceptualization, X.L. and K.Z.; methodology, X.L.; software, X.L.; validation, X.L., K.Z., L.Z. and X.Z.; writing—original draft preparation, X.L.; writing—review and editing, X.L.and K.Z. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by the National Natural Science Foundation of China under Grant No. 61802118, the Heilongjiang Provincial Natural Science Foundation of China under Grant No. YQ2020F013, the Open Foundation of State key Laboratory of Networking and Switching Technology (BUPT) under Grant No. SKLNST-2018-1-07. The Outstanding Youth Fund of Heilongjiang University supported Kejia Zhang.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
Footnotes
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.
References
- 1.Deng F.G., Long G.L. Bidirectional quantum key distribution protocol with practical faint laser pulses. Phys. Rev. A. 2005;70:012311. doi: 10.1103/PhysRevA.70.012311. [DOI] [Google Scholar]
- 2.Wang X., Hu J. Quantum key distribution with the decoy-state method. Sci. Sin. Phys. Mech. Astron. 2011;41:459–465. doi: 10.1360/132011-65. [DOI] [Google Scholar]
- 3.Wu J.Z., Yan L. International Conference on Artificial Intelligence and Security. Springer; Cham, Switzerland: 2020. Quantum Key Distribution Protocol Based on GHZ Like State and Bell State; pp. 298–306. [Google Scholar]
- 4.Wang C., Deng F.G., Li Y.S., Liu X.S., Long G.L. Quantum secure direct communication with high dimension quantum superdense coding. Phys. Rev. A. 2005;71:044305. doi: 10.1103/PhysRevA.71.044305. [DOI] [Google Scholar]
- 5.Yu C.H., De Guo G., Lin S. Quantum secure direct communication with authentication using two nonorthogonal states. Int. J. Theor. Phys. 2013;52:1937–1945. doi: 10.1007/s10773-012-1336-y. [DOI] [Google Scholar]
- 6.Jin X.R., Ji X., Zhang Y.Q., Shou Z., Hong S.K., Yeon K.H. Three-party quantum secure direct communication based on GHZ states. Phys. Lett. A. 2006;354:67–70. doi: 10.1016/j.physleta.2006.01.035. [DOI] [Google Scholar]
- 7.Gao T.F., Yan L., Wang Z.X. Controlled quantum teleportation and secure direct communication. Chin. Phys. 2005;14:893–897. [Google Scholar]
- 8.Lee H., Lim J., Yang H.J. Quantum direct communication with authentication. Phys. Rev. A. 2006;73:042305. doi: 10.1103/PhysRevA.73.042305. [DOI] [Google Scholar]
- 9.Yang Y.G., Wen Q.Y. Economical multiparty simultaneous quantum identity authentication based on Greenberger–Horne–Zeilinger states. Chin. Phys. B. 2009;18:3233–3236. [Google Scholar]
- 10.Kang M.S., Choi Y.H., Kim Y.S., Cho Y.W., Lee S.Y., Han S.W., Moon S. Quantum message authentication scheme based on remote state preparation. Phys. Scripta. 2018;93:115102. doi: 10.1088/1402-4896/aae1a1. [DOI] [Google Scholar]
- 11.Kang M.S., Heo J., Hong C.H. Controlled mutual quantum entity authentication with an untrusted third party. Quantum Inf. Process. 2018;17:159. doi: 10.1007/s11128-018-1927-5. [DOI] [Google Scholar]
- 12.Curty M., Santos D. Quantum authentication of classical messages. Phys. Rev. A. 2012;64:168. doi: 10.1103/PhysRevA.64.062309. [DOI] [Google Scholar]
- 13.Bartkiewicz K., Černoch A., Lemr K. Using quantum routers to implement quantum message authentication and Bell-state manipulation. Phys. Rev. A. 2014;90:022335. doi: 10.1103/PhysRevA.90.022335. [DOI] [Google Scholar]
- 14.Lee H., Hong C., Kim H., Lim J., Yang H.J. Arbitrated quantum signature scheme with message recovery. Phys. Lett. A. 2004;321:295–300. doi: 10.1016/j.physleta.2003.12.036. [DOI] [Google Scholar]
- 15.Kang M.S., Hong C.H., Heo J., Lim J.I. Controlled mutual quantum entity authentication using entanglement swapping. Chin. Phys. B. 2015;24:120–128. doi: 10.1088/1674-1056/24/9/090306. [DOI] [Google Scholar]
- 16.Wang Q., Zhang S., Wang S.L., Shi R.H. Comment on “Controlled mutual quantum entity authentication with an untrusted third party”. Quantum Inf. Process. 2020;19:125. doi: 10.1007/s11128-020-2611-0. [DOI] [Google Scholar]
- 17.Yuan H., Liu Y.M., Pan G.Z., Zhang G., Zhou J., Zhang Z.J. Quantum identity authentication based on ping-pong technique without entanglements. Quantum Inf. Process. 2014;13:2535–2549. doi: 10.1007/s11128-014-0808-9. [DOI] [Google Scholar]
- 18.Ma H., Huang P., Bao W., Zeng G. Continuous-variable quantum identity authentication based on quantum teleportation. Quantum Inf. Process. 2016;15:2605–2620. doi: 10.1007/s11128-016-1283-2. [DOI] [Google Scholar]
- 19.Chen Z.Y., Zhou K.L., Liao Q. Quantum identity authentication scheme of vehicular ad-hoc networks. Int. J. Theor. Phys. 2018;58:40–57. doi: 10.1007/s10773-018-3908-y. [DOI] [Google Scholar]
- 20.Liu B., Gao Z., Xiao D., Huang W., Zhang Z., Xu B. Quantum identity authentication in the counterfactual quantum key distribution protocol. Entropy. 2019;21:518. doi: 10.3390/e21050518. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 21.Dušek M., Haderka O., Hendrych M., Myška R. Quantum identification system. Phys. Rev. A. 1999;60:149–156. doi: 10.1103/PhysRevA.60.149. [DOI] [Google Scholar]
- 22.Zeng G., Zhang W. Identity verification in quantum key distribution. Phys. Rev. A. 2000;61:22303. doi: 10.1103/PhysRevA.61.022303. [DOI] [Google Scholar]
- 23.Mihara T. Quantum identification schemes with entanglements. Phys. Rev. A. 2002;65:52326. doi: 10.1103/PhysRevA.65.052326. [DOI] [Google Scholar]
- 24.Wang J., Quan Z., Chao J.T. Multiparty simultaneous quantum identity authentication based on entanglement swapping. Chin. Phys. Lett. 2006;23:2360–2363. [Google Scholar]
- 25.Yang Y.G., Wang H.Y., Jia X., Zhang H. A quantum protocol for (t,n)-threshold identity authentication based on greenberger-horne-zeilinger states. Int. J. Theor. Phys. 2013;52:524–530. doi: 10.1007/s10773-012-1356-7. [DOI] [Google Scholar]
- 26.Hong C.H., Heo J., Jang J.G., Kwon D. Quantum identity authentication with single photon. Quantum Inf. Process. 2017;16:236. doi: 10.1007/s11128-017-1681-0. [DOI] [Google Scholar]
- 27.Zawadzki P. Quantum identity authentication without entanglement. Quantum Inf. Process. 2019;18:7. doi: 10.1007/s11128-018-2124-2. [DOI] [Google Scholar]
- 28.Zhang S., Chen Z.K., Shi R.H., Liang F.Y. A novel quantum identity authentication based on bell states. Int. J. Theor. Phys. 2020;59:236–249. doi: 10.1007/s10773-019-04319-w. [DOI] [Google Scholar]
- 29.Jiang S.Q., Zhou R.G., Hu W.W. Semi-quantum mutual identity authentication using Bell states. Int. J. Theor. Phys. 2019;60:3353–3362. doi: 10.1007/s10773-021-04911-z. [DOI] [Google Scholar]
- 30.Wu Y., Chang H., Guo G., Lin S. Multi-party quantum key agreement protocol with authentication. Mod. Phys. Lett. B. 2021;21:495. doi: 10.1007/s10773-021-04954-2. [DOI] [Google Scholar]
- 31.Yang Y.G., Wen Q., Xing Z. Multiparty simultaneous quantum identity authentication with secret sharing. Sci. China Ser. G Phys. Mech. Astron. 2008;51:321–327. doi: 10.1007/s11433-008-0034-5. [DOI] [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
Not applicable.



