Papers
Topics
Authors
Recent
Detailed Answer
Quick Answer
Concise responses based on abstracts only
Detailed Answer
Well-researched responses based on abstracts and relevant paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses
Gemini 2.5 Flash
Gemini 2.5 Flash 37 tok/s
Gemini 2.5 Pro 44 tok/s Pro
GPT-5 Medium 14 tok/s Pro
GPT-5 High 14 tok/s Pro
GPT-4o 90 tok/s Pro
Kimi K2 179 tok/s Pro
GPT OSS 120B 462 tok/s Pro
Claude Sonnet 4 37 tok/s Pro
2000 character limit reached

Secured Quantum Identity Authentication Protocol for Quantum Networks (2312.05774v1)

Published 10 Dec 2023 in quant-ph, cs.CR, and cs.NI

Abstract: Quantum Internet signifies a remarkable advancement in communication technology, harnessing the principles of quantum entanglement and superposition to facilitate unparalleled levels of security and efficient computations. Quantum communication can be achieved through the utilization of quantum entanglement. Through the exchange of entangled pairs between two entities, quantum communication becomes feasible, enabled by the process of quantum teleportation. Given the lossy nature of the channels and the exponential decoherence of the transmitted photons, a set of intermediate nodes can serve as quantum repeaters to perform entanglement swapping and directly entangle two distant nodes. Such quantum repeaters may be malicious and by setting up malicious entanglements, intermediate nodes can jeopardize the confidentiality of the quantum information exchanged between the two communication nodes. Hence, this paper proposes a quantum identity authentication protocol that protects quantum networks from malicious entanglements. Unlike the existing protocols, the proposed quantum authentication protocol does not require periodic refreshments of the shared secret keys. Simulation results demonstrate that the proposed protocol can detect malicious entanglements with a 100% probability after an average of 4 authentication rounds.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (9)
  1. C. h. Hong, J. Heo, J. G. Jang, and D. Kwon, “Quantum identity authentication with single photon,” Quantum Information Processing, vol. 16, no. 10, p. 236, Aug 2017. [Online]. Available: https://doi.org/10.1007/s11128-017-1681-0
  2. H. Zhu, L. Wang, and Y. Zhang, “An efficient quantum identity authentication key agreement protocol without entanglement,” Quantum Information Processing, vol. 19, no. 10, p. 381, Oct 2020. [Online]. Available: https://doi.org/10.1007/s11128-020-02887-z
  3. B. Liu et al., “Quantum identity authentication in the counterfactual quantum key distribution protocol,” Entropy, vol. 21, no. 5, 2019. [Online]. Available: https://www.mdpi.com/1099-4300/21/5/518
  4. Z. Chen, K. Zhou, and Q. Liao, “Quantum identity authentication scheme of vehicular ad-hoc networks,” International Journal of Theoretical Physics, vol. 58, no. 1, pp. 40–57, Jan 2019. [Online]. Available: https://doi.org/10.1007/s10773-018-3908-y
  5. X.-y. Zheng and Y.-x. Long, “Controlled quantum secure direct communication with authentication protocol based on five-particle cluster state and classical xor operation,” Quantum Information Processing, vol. 18, no. 5, p. 129, Mar 2019. [Online]. Available: https://doi.org/10.1007/s11128-019-2239-0
  6. S. Jiang, R.-G. Zhou, and W. Hu, “Semi-quantum mutual identity authentication using bell states,” International Journal of Theoretical Physics, vol. 60, no. 9, pp. 3353–3362, Sep 2021. [Online]. Available: https://doi.org/10.1007/s10773-021-04911-z
  7. A. Babu and N. Shanthi, “Quantum identity authentication using non-orthogonal state encoding,” in 2021 2nd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS), 2021, pp. 334–337.
  8. G. Chen, Y. Wang, L. Jian, Y. Zhou, and S. Liu, “Quantum identity authentication based on the extension of quantum rotation,” EPJ Quantum Technology, vol. 10, no. 1, p. 11, Apr 2023. [Online]. Available: https://doi.org/10.1140/epjqt/s40507-023-00170-5
  9. S. DiAdamo, J. Nötzel, B. Zanger, and M. M. Beşe, “Qunetsim: A software framework for quantum networks,” IEEE Transactions on Quantum Engineering, 2021.
List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

Summary

We haven't generated a summary for this paper yet.

Dice Question Streamline Icon: https://streamlinehq.com

Follow-Up Questions

We haven't generated follow-up questions for this paper yet.

X Twitter Logo Streamline Icon: https://streamlinehq.com

Don't miss out on important new AI/ML research

See which papers are being discussed right now on X, Reddit, and more:

“Emergent Mind helps me see which AI papers have caught fire online.”

Philip

Philip

Creator, AI Explained on YouTube