• Chinese Journal of Quantum Electronics
  • Vol. 34, Issue 3, 369 (2017)
Xiaofeng CHEN1、* and Xiaofen LIU2
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • show less
    DOI: 10.3969/j.issn.1007-5461. 2017.03.016 Cite this Article
    CHEN Xiaofeng, LIU Xiaofen. Mutual authenticated multiparty quantum key distribution based on single particle state[J]. Chinese Journal of Quantum Electronics, 2017, 34(3): 369 Copy Citation Text show less
    References

    [1] Bennett C H, Brassard G. Quantum cryptography: Public-key distribution and coin tossing[C]. Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore: IEEE Press, 1984: 175-179.

    [2] Bennett C H. Quantum cryptography using any two nonorthogonal states[J]. Phys. Rev. Lett., 1992, 68(21): 3121-3124.

    [3] EKERT A K. Quantum cryptography based on Bell’s theorem[J]. Phys. Rev. Lett., 1991, 67(6): 66l-663.

    [5] Phoenix S J D, Barnett S M, Townsend P D, et al. Multi-user quantum cryptography on optical networks[J]. Journal of Modern Optics, 1995, 42(6): 1155-1163.

    [6] Hong C H, Heo J O, Khym G L, et al. N quantum channels are sufficient for multi-user quantum key distribution protocol between n users[J]. Opt. Commun., 2010, 283(12): 2644-2646.

    [7] Dusek M, et al. Quantum identification system[J]. Phys. Rev. A, 1998, 60(1): 149-156.

    [8] Zeng G H, Zhang W P. Identity verification in quantum key distribution[J]. Phys. Rev. A, 2000, 61(2): 022303.

    [9] Ljunggren D, Bourennane M, Karlsson A. Authority-based user authentication in quantum key distribution[J]. Phys. Rev. A, 2000, 62(2): 117-134.

    [10] Peev M, et al. A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography[J]. Int. J. Quantum Inform., 2005, 3(1): 225-231.

    [11] Hwang T, Lee K C, Li C M. Provably secure three-party authenticated quantum key distribution protocols[J]. IEEE Trans. Dependable Secure Comput., 2007, 4(1): 71-80.

    [12] Cederlof J, Larsson J A. Security aspects of the authentication used in quantum cryptography[J]. IEEE Trans. Inf. Theory., 2008, 54(4): 1735-1741.

    [13] Fung C H, Ma X F, Chau H F. Practical issues in quantum-key-distribution postprocessing[J]. Phys. Rev. A, 2010, 81: 012318.

    [14] Sun Z, Du R, Long D. Quantum secure direct communication with quantum identification[J]. Int. J. Quantum Inform., 2012, 10(1): 1250008.

    [15] Guan D J, Wang Y J, et al. A practical protocol for three-party authenticated quantum key distribution[J]. Quantum Inf. Process., 2014, 13(11): 2355-2374.

    [16] Long G L, Liu X S. Theoretically efficient high-capacity quantum-key-distribution scheme[J]. Phys. Rev. A, 2002, 65: 032302.

    [17] Franklin M K, Reiter M K. Fair exchange with a semi-trusted third party[C]. Proceedings of the 4th ACM conference on Computer and communications security. New York: Association for Computing Machinery, 1997: 1-5.

    [18] Wang G, Ying M. Unambiguous discrimination among quantum operations[J]. Phys. Rev. A, 2006, 73(4): 042301.

    [19] Chefles A. Unambiguous discrimination between linearly-independent quantum states[J]. Phys. Lett. A, 1998, 239(6): 339-347.

    CHEN Xiaofeng, LIU Xiaofen. Mutual authenticated multiparty quantum key distribution based on single particle state[J]. Chinese Journal of Quantum Electronics, 2017, 34(3): 369
    Download Citation