• Chinese Journal of Quantum Electronics
  • Vol. 27, Issue 1, 40 (2010)
Si JI1、2、3、*, Zheng TAN1、2、3, Xian-ping SUN1、2、4, and Jun LUO1、2
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • 3[in Chinese]
  • 4[in Chinese]
  • show less
    DOI: Cite this Article
    JI Si, TAN Zheng, SUN Xian-ping, LUO Jun. A quantum identity authentication protocol based on polarization rotation[J]. Chinese Journal of Quantum Electronics, 2010, 27(1): 40 Copy Citation Text show less
    References

    [1] Bennett C H, Brassard G. Quantum cryptography: public key distribution and coin tossing [C]. Proc. IEEE Int. Conf. on Computers, Systems and Signal Processing, Bangalore, India (IEEE, New York, 1984): 175-179.

    [2] Buttler W T, Hughes R J, Lamoreaux S K, et al. Daylight quantum key distribution over 1.6 km [J]. Phys. Rev. Lett., 2000, 84(24): 5652-5655.

    [3] Hiskett P A, Rosenberg D, Peterson C G, et al. Long-distrance quantum key distribution in optical fibre [J]. New J. Phys., 2006, 8: 193.

    [4] Kurtsiefer C, Zarda P, Halder M, et al. Quantum cryptography: A step towards global key distribution [J]. Nature, 2002, 419: 450.

    [5] Shan Xin, Sun Xianping, Luo Jun, et al. Free-space quantum key distribution with Rb vapor filters [J]. Appl. Phys. Lett., 2006, 89(19): 191121.

    [8] Ekert A K. Quantum cryptography based on Bell’s theorem [J]. Phys. Rev. Lett., 1991, 67(6): 661-663.

    [9] Bennett C H. Quantum cryptography using any two nonorthogonal states [J]. Phys. Rev. Lett., 1992, 68: 3121-3124.

    [10] Miloslav Du ek, Ond ej Haderka, Martin Hendrych, et al. Quantum identification system [J]. Phys. Rev. A, 1999, 60(1): 149-156.

    [11] Curty M, Santos D J. Quantum authentication of classical messages [J]. Phys. Rev. A, 2001, 64: 062309-1-6.

    [12] Shi Baosen, Li Jian, Liu Jinming, et al. Quantum key distribution and quantum authentication based on entangled state [J]. Phys. Lett. A, 2001, 281: 83-87.

    [13] Zeng Guihua, Zhang Weiping. Identity verification in quantum key distribution [J]. Phys. Rev. A, 2000, 61: 022303-1-5.

    [14] Zhou Nanrun, Zeng Guihua, Zeng Wenjie, et al. Cross-center quantum identification scheme based on teleportation and entanglement swapping [J]. Opt. Commum., 2005, 254: 380-388.

    [15] He Guangqiang, Zeng Guihua. A secure identification system using coherent states [J]. Chin. Phys., 2006, 15(2): 371-374.

    [16] Kanamori Yoshito, Yoo SeongMoo, Gregory Don A, et al. Authentication protocol using quantum superposition states [J]. Int. J. Network Security, 2009, 9(2): 121-128.

    [17] He Guangqiang, Zeng Guihua. A quantum identification scheme based on polarization modulation [J]. Chin. Phys., 2005, 14(3): 541-545.

    [18] Shan Xin, Sun Xianping, et al. Ultranarrow-bandwidth atomic filter with Raman light amplification [J]. Opt. Lett., 2008, 33(16): 1842.

    JI Si, TAN Zheng, SUN Xian-ping, LUO Jun. A quantum identity authentication protocol based on polarization rotation[J]. Chinese Journal of Quantum Electronics, 2010, 27(1): 40
    Download Citation