• Acta Optica Sinica
  • Vol. 29, Issue 6, 1680 (2009)
Hu Xing1、*, Yu Jijun2, Ning Xiaoling3, and Liu Yu2
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • 3[in Chinese]
  • show less
    DOI: Cite this Article Set citation alerts
    Hu Xing, Yu Jijun, Ning Xiaoling, Liu Yu. Quantum Identity Authentication Using Three-Particle W state[J]. Acta Optica Sinica, 2009, 29(6): 1680 Copy Citation Text show less
    References

    [1] C. H. Bennett, G. Brassard. Quantum cryptography: public key distribution and coin tossing [C]. IEEE Int. Conf. on Computers, Systems and Signal Processing, Bangalore, India (IEEE, New York, 1984): 175~179

    [2] Wang Juxia, Yang Zhiyong, An Yuying. Quantum information transfer via multi-photon interaction [J]. Acta Optica Sinica, 2007, 27(8): 1508~1512

    [3] A. K. Ekert. Quantum cryptography based on bell’s theorem[J]. Phys. Rev. Lett., 1991, 67(6): 661~663

    [4] A. Beige, B.G. Englert, Kurtsiefer et al.. Secure communication with a publicly know key[J]. Acta Phys. Pol. A, 2002, 101(3): 357~368

    [5] Kim Bostrm, Timo Felbinger. Deterministic secure direct communication[J]. Phys. Rev. Lett., 2002, 89(18): 187902-1~4

    [6] Wang Xiaoxin, Liu Yu, Wang Changqiang. Experimental scheme of secure plaintext transmission with quantum direct communication[J]. Acta Optica Sinica, 2005, 25(3): 425~428 (in Chinese)

    [7] Piao Guangchun, Zhang Shou. Controlled quantum dialogue based on W state [J]. Chin. J. Quant. Electron., 2007, 24(3): 311~315

    [8] Miloslav Duek, Ondr^ej Haderka, Martin Hendrych et al.. Quantum identification system[J]. Phys. Rev. A, 1999, 60(1):149~156

    [9] Takashi Mihara. Quantum identification schemes with entanglements[J]. Phys. Rev. A, 2002, 65: 052326-1~052326-4

    [10] Wim van Dam. Comment on “Quantum identification schemes with entanglements” [J]. Phys. Rev. A, 68: 026301-1~026301-4

    [11] He Guangqiang, Zeng Guihua, Zhu Jun. An integrable optic-fiber coherent state quantum identification system [J]. Chin. J. Lasers, 2007, 34(7): 924~929 (in Chinese)

    [12] Guihua Zeng, Weiping Zhang. Identity verification in quantum key distribution [J]. Phys. Rev. A, 2000, 61: 022303-1~022303-5

    [13] Hwayean Lee, Jongin Lim, HyungJin Yang. Quantum direct communication with authentication[J]. Phys. Rev. A, 2006, 73: 042305-1~042305-4

    [14] D. Ljunggren, M. Bourennane, A. Karlsson. Authority-based user authentication in quantum key distribution[J]. Phys. Rev. A, 2000, 62: 022305-1~022305-6

    [15] Shi Baosen, L Jian, Liu Jinming et al.. Quantum key distribution and quantum authentication based on entangled state[J].Phys. Lett. A, 2001, 281: 83~87

    [16] Zhanjun Zhang, Jun Liu, Dong Wang et al.. Comment on “Quantum direct communication with authentication”[J]. Phys. Rev. A, 2007, 75: 026301-1~026301-4

    [17] W. Dür, G. Vidal, J. I. Cirac. Three qubits can be entangled in two inequivalent ways[J]. Phys. Rev. A, 2000, 62: 062314-1~062314-5

    [18] Cao Haijing, Song Heshan. Quantum secure direct communication with W State[J]. Chin. Phys. Lett., 2006, 23(2): 290~292

    [19] Liu Jun, Liu Yimin. Revisiting quantum secure direct communication with W state[J]. Chin. Phys. Lett., 2006, 23(10): 2652~2655

    [20] Yuan Hao, Liu Yimin, Zhang Wen et al.. Eavesdropping on quantum secure communication with W state in noisy channel[J]. Commun. Theor. Phys. 2008, 49(1): 103~106

    [21] C. Bennett, G. Brassard, C. Crepeau et al.. Teleporting an unknown quantum state via dual classical and EPR channels[J]. Phys. Rev. Lett., 1993, 70: 1895~1899

    [22] Yue Li, Yu Liu, Quantum secure direct communication based on supervised teleportation[C]. SPIE, 2007, 6827: 682707~682714

    CLP Journals

    [1] Lü Hongjun, Xie Guangjun. Coding and Correcting Circuits for Two-Quantum Errors[J]. Acta Optica Sinica, 2011, 31(5): 527001

    Hu Xing, Yu Jijun, Ning Xiaoling, Liu Yu. Quantum Identity Authentication Using Three-Particle W state[J]. Acta Optica Sinica, 2009, 29(6): 1680
    Download Citation