| Literature DB >> 33267232 |
Bin Liu1, Zhifeng Gao1, Di Xiao1, Wei Huang2, Zhiqing Zhang3, Bingjie Xu2.
Abstract
In this paper, a quantum identity authentication protocol is presented based on the counterfactual quantum key distribution system. Utilizing the proposed protocol, two participants can verify each other's identity through the counterfactual quantum communication system. The security of the protocol is proved against individual attacks. Furthermore, according to the characteristics of the counterfactual quantum key distribution system, we propose an authenticated counterfactual quantum key distribution protocol based on a novel strategy of mixing the two types of quantum cryptographic protocols randomly. The authenticated quantum key distribution can also be used to update the extent of the authentication keys.Entities:
Keywords: counterfactual quantum communication; quantum identity authentication; quantum key distribution
Year: 2019 PMID: 33267232 PMCID: PMC7515006 DOI: 10.3390/e21050518
Source DB: PubMed Journal: Entropy (Basel) ISSN: 1099-4300 Impact factor: 2.524
Figure 1The schematic of the counterfactual QKD [27]. Here, C is the optical circulator; OD is the optical delay to make the two paths a and b be the same; OL is the optical loop and SW is the optical switch, which help Bob choose the pulse in specific polarization to the detector D2; FM is the faraday mirror, which reflects the pulse while turns the state of the pulse to the orthogonal polarization; and D1 can discriminate the polarizations of the pulse.
Figure 2The schematic of the alternative version of the counterfactual QKD [33]. The alternative version uses two half wave plates HWP and HWP, instead of the OL and SW, to implement the random choices of the participants. Another difference is that the alternative version uses mirrors (M) instead of faraday mirrors in the original one.
Figure 3The schematic of the proposed QIA protocol and the authenticated QKD protocol. HWP is set at right side of BS in our protocol instead of left in the alternative version. Since the polarizations of the pulses detected by D0 is also used to detect the adversary in our protocol, we add a PBS and an additional detector in the D0.
Figure 4The graphs of function when r = 10 (the red line), 15 (the green line), and 20 (the blue ine).