| Literature DB >> 35455145 |
Xiang Li1, Kejia Zhang1,2, Long Zhang1, Xu Zhao1.
Abstract
To guarantee information security in communication, quantum identity authentication plays a key role in politics, economy, finance, daily life and other fields. In this paper, a new quantum multiparty simultaneous identity authentication protocol with Greenberger-Home-Zeilinger (GHZ) state is presented. In this protocol, the authenticator and the certified parties are the participants with quantum ability, whereas the third party is a classical participant. Here, the third-party is honest and the other two parties may be dishonest. With the help of a classical third-party, a quantum authenticator and the multiple certified parties can implement two-way identity authentication at the same time. It reduces the quantum burden of participants and lowers down the trustworthiness, which makes the protocol be feasible in practice. Through further security analysis, the protocol can effectively prevent an illegal dishonest participant from obtaining a legitimate identity. It shows that the protocol is against impersonation attack, intercept-measure-resend attack and entangle-measure attack, etc. In all, the paper provides positive efforts for the subsequent security identity authentication in quantum network.Entities:
Keywords: GHZ state; identity authentication; multiparty authentication; quantum authentication
Year: 2022 PMID: 35455145 PMCID: PMC9029640 DOI: 10.3390/e24040483
Source DB: PubMed Journal: Entropy (Basel) ISSN: 1099-4300 Impact factor: 2.738
Figure 1The process of quantum multiparty identity authentication protocol. (0): shares secret keys with other users during the registration phase. (1): sends quantum sequences to the separately during the preparation phase. (2): send the measured and operated particles to , respectively. (3): At this stage, announces her calculation results to . (4): Finally, compares the results to determine whether the authentication is successful and announces it to all users at the same time. At this point, the agreement is complete. In addition, the figure omits detecting eavesdropping stages for easy viewing. Nonetheless, these steps is essential in the protocol.
The conversion mode of measurement result.
| Quantum Bit | Opreation | Conversion Mode |
|---|---|---|
| bit |
| |
|
| ||
| bit |
| |
|
|
The conversion rule of measurement result.
| Measurement Result | Classical Result |
|---|---|
|
| 0 |
|
| 1 |
Figure 2(Left) the probability of being detected. (Right) the probability of being detected.
Figure 3(Left) the probability of being detected. (Right) the probability of being detected.
Comparison among some different quantum authentication protocols.
| Protocol | Participants | The Third Party | Quantum Resource |
|---|---|---|---|
| Wang et al. [ | Multipartite | Quantum third party | GHZ state |
| Yang et al. [ | Multipartite | Quantum third party | GHZ state |
| Zhang et al. [ | Mutual | Quantum third party | Bell state |
| Jiang et al. [ | Mutual | No third party | Bell state |
| Wu et al. [ | Multipartite | Quantum third party | Bell state and GHZ state |
| Our protocol | Multipartite | Classical third party | GHZ state |