• Chinese Journal of Quantum Electronics
  • Vol. 29, Issue 2, 178 (2012)
Wei-hong KANG1、*, Zheng-wen CAO1, Rui LUO2, En-chun JIANG2, and Long ZHAO1
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • show less
    DOI: 10.3969/j.issn.1007-5461. 2012.02.008 Cite this Article
    KANG Wei-hong, CAO Zheng-wen, LUO Rui, JIANG En-chun, ZHAO Long. A quantum identity authentication based on chaos[J]. Chinese Journal of Quantum Electronics, 2012, 29(2): 178 Copy Citation Text show less
    References

    [5] Wu Xiaogang, Hu Hanping, Zhang Baoliang. Parameter estimation only from the symbolic sequences generated by chaos system [J]. Chaos, Solitons and Fractals, 2004, 22(2): 359-366.

    [6] Zeng Guihua, Zhang Weiping. Identity verification in quantum cryptography [J]. Phys. Rev. A, 2000, 61(2): 022303/1-5.

    [8] Zhou Nanrun, Zeng Guihua, Zeng Wenjie, et al. Cross-center quantum identity authentication scheme based on teleportation and entanglement swapping [J]. Optics Communications, 2005, 254(4-6): 380-388.

    [12] Cao Zhengwen, Dai Zhaoyang, Xu Ping, et al. A study on quantum key expansion method based on chaos [C]. The 2nd International Conference on Information Science and Engineering (ICISE2010), 2010, 4320-4323 (in Chinese).

    [13] Bennett C H, Brassard G. Quantum cryptography: public key distribution and coin tossing [C]. Proc. of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 1984, 175-179.

    KANG Wei-hong, CAO Zheng-wen, LUO Rui, JIANG En-chun, ZHAO Long. A quantum identity authentication based on chaos[J]. Chinese Journal of Quantum Electronics, 2012, 29(2): 178
    Download Citation