Skip to main content
Erschienen in: Quantum Information Processing 10/2017

01.10.2017

Quantum identity authentication with single photon

verfasst von: Chang ho Hong, Jino Heo, Jin Gak Jang, Daesung Kwon

Erschienen in: Quantum Information Processing | Ausgabe 10/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Quantum identity authentication with single photons is proposed in the paper. It can verify a user’s identity without exposing to an authentication key information. The protocol guarantees high efficiency in that it can verify two bits of authentication information using just a single photon. The security of our authentication scheme is analyzed and confirmed in the case of a general attack. Moreover, the proposed protocol is practicable with current technology. Our quantum identity authentication protocol does not require quantum memory registration and any entangled photon sources.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Stinson, D.R.: Cryptography: Theory and Practice, 3rd edn. CRC Press, Boca Raton (2005)MATH Stinson, D.R.: Cryptography: Theory and Practice, 3rd edn. CRC Press, Boca Raton (2005)MATH
2.
Zurück zum Zitat Forouzan, B.A.: Cryptography and Network Security (international edition). McGraw Hill, New York (2008) Forouzan, B.A.: Cryptography and Network Security (international edition). McGraw Hill, New York (2008)
3.
Zurück zum Zitat Kang, M.S., Hong, C.H., Heo, J., Lim, J.I., Yang, H.J.: Controlled mutual quantum entity authentication using entanglement swapping. Chin. Phys. B 24, 090306 (2015)CrossRef Kang, M.S., Hong, C.H., Heo, J., Lim, J.I., Yang, H.J.: Controlled mutual quantum entity authentication using entanglement swapping. Chin. Phys. B 24, 090306 (2015)CrossRef
4.
5.
Zurück zum Zitat Kanamori, Y., Yoo, S.M., Gregory, D.A., Sheldon, F.T.: Authentication protocol using quantum superposition states. Int. J. Netw. Secur. 9, 101 (2009). doi:10.6633/IJNS Kanamori, Y., Yoo, S.M., Gregory, D.A., Sheldon, F.T.: Authentication protocol using quantum superposition states. Int. J. Netw. Secur. 9, 101 (2009). doi:10.​6633/​IJNS
6.
Zurück zum Zitat Bennet, C. H., Brassard, G.: Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, IEEE, New York, p. 175 (1984) Bennet, C. H., Brassard, G.: Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, IEEE, New York, p. 175 (1984)
7.
Zurück zum Zitat DuŜek, M., Haderka, O., Hendrych, M., Mayska, R.: Quantum identification system. Phys. Rev. A 60, 149 (1999)ADSCrossRef DuŜek, M., Haderka, O., Hendrych, M., Mayska, R.: Quantum identification system. Phys. Rev. A 60, 149 (1999)ADSCrossRef
8.
Zurück zum Zitat Mihara, T.: Quantum identification schemes with entanglements. Phys. Rev. A 65, 052326 (2002)ADSCrossRef Mihara, T.: Quantum identification schemes with entanglements. Phys. Rev. A 65, 052326 (2002)ADSCrossRef
9.
Zurück zum Zitat Zhang, Z.S., Zeng, G.H., Zhou, N.R., Xiong, J.: Quantum identity authentication based on ping–pong technique for photons. Phys. Lett. A 356, 199 (2006)ADSCrossRefMATH Zhang, Z.S., Zeng, G.H., Zhou, N.R., Xiong, J.: Quantum identity authentication based on ping–pong technique for photons. Phys. Lett. A 356, 199 (2006)ADSCrossRefMATH
11.
Zurück zum Zitat Svozil, K.: Feasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography. Int. J. Quantum Inf. 3, 649 (2005)CrossRef Svozil, K.: Feasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography. Int. J. Quantum Inf. 3, 649 (2005)CrossRef
12.
Zurück zum Zitat Kuhn, D.R.: A hybrid authentication protocol using quantum entanglement and symmetric cryptography. quant-ph/0301150 (2003) Kuhn, D.R.: A hybrid authentication protocol using quantum entanglement and symmetric cryptography. quant-ph/0301150 (2003)
13.
Zurück zum Zitat Zeng, G., Zhang, W.: Identity verification in quantum key distribution. Phys. Rev. A 61, 022303 (2000) Zeng, G., Zhang, W.: Identity verification in quantum key distribution. Phys. Rev. A 61, 022303 (2000)
14.
Zurück zum Zitat Hwang, W.-Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003)ADSCrossRef Hwang, W.-Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003)ADSCrossRef
15.
Zurück zum Zitat Lo, H.-K.: Quantum key distribution with vacua or dim pulses as decoy states. In: Proceedings of IEEE ISIT. IEEE, p. 137 (2004) Lo, H.-K.: Quantum key distribution with vacua or dim pulses as decoy states. In: Proceedings of IEEE ISIT. IEEE, p. 137 (2004)
16.
Zurück zum Zitat Lo, H.-K., Ma, X., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005)ADSCrossRef Lo, H.-K., Ma, X., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005)ADSCrossRef
17.
Zurück zum Zitat Wang, X.-B.: Beating the pns attack in practical quantum cryptography. Phys. Rev. Lett. 94, 230503 (2005)ADSCrossRef Wang, X.-B.: Beating the pns attack in practical quantum cryptography. Phys. Rev. Lett. 94, 230503 (2005)ADSCrossRef
18.
Zurück zum Zitat Wang, X.-B.: A decoy-state protocol for quantum cryptography with 4 intensities of coherent states. Phys. Rev. A 72, 012322 (2005)ADSCrossRef Wang, X.-B.: A decoy-state protocol for quantum cryptography with 4 intensities of coherent states. Phys. Rev. A 72, 012322 (2005)ADSCrossRef
19.
Zurück zum Zitat Harrington, J.W., Ettinger, J.M., Hughes, R.J., Nordholt, J.E.: Enhancing practical security of quantum key distribution with a few decoy states. quant-ph/0503002 (2005) Harrington, J.W., Ettinger, J.M., Hughes, R.J., Nordholt, J.E.: Enhancing practical security of quantum key distribution with a few decoy states. quant-ph/0503002 (2005)
20.
Zurück zum Zitat Zhao, Y., Qi, B., Ma, X., Lo, H.-K., Qian, L.: Experimental quantum key distribution with decoy states. Phys. Rev. Lett. 96, 070502 (2006)ADSCrossRef Zhao, Y., Qi, B., Ma, X., Lo, H.-K., Qian, L.: Experimental quantum key distribution with decoy states. Phys. Rev. Lett. 96, 070502 (2006)ADSCrossRef
21.
Zurück zum Zitat Zhao, Y., Qi, B., Ma, X., Lo, H.-K., Qian, L.: Simulation and implementation of decoy state quantum key distribution over 60 km telecom fiber. In: Proceedings of IEEE ISIT. IEEE, p. 2094 (2006) Zhao, Y., Qi, B., Ma, X., Lo, H.-K., Qian, L.: Simulation and implementation of decoy state quantum key distribution over 60 km telecom fiber. In: Proceedings of IEEE ISIT. IEEE, p. 2094 (2006)
22.
Zurück zum Zitat Rosenberg, D., Harrington, J.W., Rice, P.R., Hiskett, P.A., Peterson, C.G., Hughes, R.J., Lita, A.E., Nam, S.W., Nordholt, J.E.: Long-distance decoy-state quantum key distribution in optical fiber. Phys. Rev. Lett. 98, 010503 (2007)ADSCrossRef Rosenberg, D., Harrington, J.W., Rice, P.R., Hiskett, P.A., Peterson, C.G., Hughes, R.J., Lita, A.E., Nam, S.W., Nordholt, J.E.: Long-distance decoy-state quantum key distribution in optical fiber. Phys. Rev. Lett. 98, 010503 (2007)ADSCrossRef
23.
Zurück zum Zitat Peng, C.-Z., Zhang, J., Yang, D., Gao, W.-B., Ma, H.-X., Yin, H., Zeng, H.-P., Yang, T., Wang, X.-B., Pan, J.-W.: Experimental long-distance decoy-state quantum key distribution based on polarization encoding. Phys. Rev. Lett. 98, 010505 (2007)ADSCrossRef Peng, C.-Z., Zhang, J., Yang, D., Gao, W.-B., Ma, H.-X., Yin, H., Zeng, H.-P., Yang, T., Wang, X.-B., Pan, J.-W.: Experimental long-distance decoy-state quantum key distribution based on polarization encoding. Phys. Rev. Lett. 98, 010505 (2007)ADSCrossRef
24.
Zurück zum Zitat Ursin, R., Tiefenbacher, F., Schmitt-Manderbach, T., Weier, H., Scheidl, T., Lindenthal, M., Blauensteiner, B., Jennewein, T., Perdigues, J., Trojek, P., Füerst, B.M., Meyenburg, M., Rarity, J., Sodnik, Z., Barbieri, C., Weinfurter, H., Zeilinger, A.: Entanglement-based quantum communication over 144 km. Nat. Phys. 3, 481 (2007)CrossRef Ursin, R., Tiefenbacher, F., Schmitt-Manderbach, T., Weier, H., Scheidl, T., Lindenthal, M., Blauensteiner, B., Jennewein, T., Perdigues, J., Trojek, P., Füerst, B.M., Meyenburg, M., Rarity, J., Sodnik, Z., Barbieri, C., Weinfurter, H., Zeilinger, A.: Entanglement-based quantum communication over 144 km. Nat. Phys. 3, 481 (2007)CrossRef
25.
Zurück zum Zitat Yuan, Z.L., Sharpe, A.W., Shields, A.J.: Unconditionally secure one-way quantum key distribution using decoy pulses. Appl. Phys. Lett. 90, 011118 (2007)ADSCrossRef Yuan, Z.L., Sharpe, A.W., Shields, A.J.: Unconditionally secure one-way quantum key distribution using decoy pulses. Appl. Phys. Lett. 90, 011118 (2007)ADSCrossRef
26.
Zurück zum Zitat Ma, H., Huang, P., Bao, W., Zeng, G.: Continuous-variable quantum identity authentication based on quantum teleportation. Quantum Inf. Process 15, 2605 (2016) Ma, H., Huang, P., Bao, W., Zeng, G.: Continuous-variable quantum identity authentication based on quantum teleportation. Quantum Inf. Process 15, 2605 (2016)
27.
Zurück zum Zitat Brassard, G., Lütkenhaus, N., Mor, T., Sanders, B.C.: Security aspects of practical quantum cryptography. Phys. Rev. Lett. 85, 1330 (2000)ADSCrossRefMATH Brassard, G., Lütkenhaus, N., Mor, T., Sanders, B.C.: Security aspects of practical quantum cryptography. Phys. Rev. Lett. 85, 1330 (2000)ADSCrossRefMATH
28.
Zurück zum Zitat Huttner, B., Imoto, N., Gisin, N., Mor, T.: Quantum cryptography with coherent states. Phys. Rev. A 51, 1863 (1995)ADSCrossRef Huttner, B., Imoto, N., Gisin, N., Mor, T.: Quantum cryptography with coherent states. Phys. Rev. A 51, 1863 (1995)ADSCrossRef
29.
Zurück zum Zitat Lütkenhaus, N., Jahma, M.: Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack. New J. Phys. 4, 44 (2002)CrossRef Lütkenhaus, N., Jahma, M.: Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack. New J. Phys. 4, 44 (2002)CrossRef
30.
Zurück zum Zitat Lütkenhaus, N.: Security against individual attacks for realistic quantum key distribution. Phys. Rev. A 61, 052304 (2000)ADSCrossRef Lütkenhaus, N.: Security against individual attacks for realistic quantum key distribution. Phys. Rev. A 61, 052304 (2000)ADSCrossRef
31.
Zurück zum Zitat Félix, S., Gisin, N., Stefanov, A., Zbinden, H.: Faint laser quantum key distribution: eavesdropping exploiting multiphoton pulses. J. Mod. Opt. 48(13), 2009 (2001)ADSCrossRefMATH Félix, S., Gisin, N., Stefanov, A., Zbinden, H.: Faint laser quantum key distribution: eavesdropping exploiting multiphoton pulses. J. Mod. Opt. 48(13), 2009 (2001)ADSCrossRefMATH
32.
Zurück zum Zitat Inamori, H., Lütkenhaus, N., Mayers, D.: Unconditional security of practical quantum key distribution. Eur. Phys. J. D 41, 599 (2007)ADSCrossRef Inamori, H., Lütkenhaus, N., Mayers, D.: Unconditional security of practical quantum key distribution. Eur. Phys. J. D 41, 599 (2007)ADSCrossRef
33.
Zurück zum Zitat Koashi, M., Preskill, J.: Secure quantum key distribution with an uncharacterized source. Phys. Rev. Lett. 90, 057902 (2003)ADSCrossRef Koashi, M., Preskill, J.: Secure quantum key distribution with an uncharacterized source. Phys. Rev. Lett. 90, 057902 (2003)ADSCrossRef
36.
Zurück zum Zitat Scully, M.O., Zubairy, M.S.: Quantum Optics, Chapter 2.2. Cambridge University Press, Cambridge (1997)CrossRef Scully, M.O., Zubairy, M.S.: Quantum Optics, Chapter 2.2. Cambridge University Press, Cambridge (1997)CrossRef
37.
Zurück zum Zitat Lo, H.-K., Lütkenhaus, N.: Quantum cryptography: from theory to practice. Phys. Can. 63, 191 (2007) Lo, H.-K., Lütkenhaus, N.: Quantum cryptography: from theory to practice. Phys. Can. 63, 191 (2007)
38.
Zurück zum Zitat Ma, X., Qi, B., Zhao, Y., Lo, H.-K.: Practical decoy state for quantum key distribution. Phys. Rev. A 72, 012326 (2005)ADSCrossRef Ma, X., Qi, B., Zhao, Y., Lo, H.-K.: Practical decoy state for quantum key distribution. Phys. Rev. A 72, 012326 (2005)ADSCrossRef
39.
Zurück zum Zitat Gobby, C., Yuan, Z.L., Shields, A.J.: Quantum key distribution over 122 km of standard telecom fiber. Appl. Phys. Lett. 84, 3762 (2004)ADSCrossRef Gobby, C., Yuan, Z.L., Shields, A.J.: Quantum key distribution over 122 km of standard telecom fiber. Appl. Phys. Lett. 84, 3762 (2004)ADSCrossRef
40.
Zurück zum Zitat Brassard, G., Salvail, L.: Secret-key reconciliation by public discussion. Advances in Cryptology EUROCRYPT’93. Springer, Berlin (1993) Brassard, G., Salvail, L.: Secret-key reconciliation by public discussion. Advances in Cryptology EUROCRYPT’93. Springer, Berlin (1993)
41.
Zurück zum Zitat Buttler, W.T., Lamoreaux, S.K., et al.: Fast, efficient error reconciliation for quantum cryptography. Phys. Rev. A 67, 52303 (2003)ADSCrossRef Buttler, W.T., Lamoreaux, S.K., et al.: Fast, efficient error reconciliation for quantum cryptography. Phys. Rev. A 67, 52303 (2003)ADSCrossRef
42.
Zurück zum Zitat Jouguet, P., Kunz-Jacques, S.: High performance error correction for quantum key distribution using polar codes. Quantum Inf. Comput. 14, 329–338 (2013)MathSciNet Jouguet, P., Kunz-Jacques, S.: High performance error correction for quantum key distribution using polar codes. Quantum Inf. Comput. 14, 329–338 (2013)MathSciNet
43.
Zurück zum Zitat Johnson, J.S.: An Analysis of Error Reconciliation Protocols for use in Quantum Key Distribution, Ph.D. thesis, Air Force Institute of Technology (2012) Johnson, J.S.: An Analysis of Error Reconciliation Protocols for use in Quantum Key Distribution, Ph.D. thesis, Air Force Institute of Technology (2012)
45.
46.
Zurück zum Zitat Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)ADSCrossRef Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)ADSCrossRef
47.
Zurück zum Zitat Koashi, M.: Unconditional security proof of quantum key distribution and the uncertainty principle. J. Phys. Conf. Ser. 36, 98 (2006)CrossRef Koashi, M.: Unconditional security proof of quantum key distribution and the uncertainty principle. J. Phys. Conf. Ser. 36, 98 (2006)CrossRef
48.
Zurück zum Zitat Villoresi, P., Jennewein, T., Tamburini, F., Aspelmeyer, M., Bonato, C., Ursin, R., Pernechele, C., Luceri, V., Bianco, G., Zeilinger, A., Barbieri, C.: Experimental verification of the feasibility of a quantum channel between space and Earth. New J. Phys. 10, 033038 (2008) Villoresi, P., Jennewein, T., Tamburini, F., Aspelmeyer, M., Bonato, C., Ursin, R., Pernechele, C., Luceri, V., Bianco, G., Zeilinger, A., Barbieri, C.: Experimental verification of the feasibility of a quantum channel between space and Earth. New J. Phys. 10, 033038 (2008)
49.
Zurück zum Zitat Yin, J., Cao, Y., Liu, S.B., Pan, G.S., Wang, J.H., Yang, T., Zhang, Z.P., Yang, F.M., Chen, Y.A., Peng, C.Z., Pan, J.W.: Experimental quasi-single-photon transmission from satellite to earth. Opt. Express 21, 20032 (2013) Yin, J., Cao, Y., Liu, S.B., Pan, G.S., Wang, J.H., Yang, T., Zhang, Z.P., Yang, F.M., Chen, Y.A., Peng, C.Z., Pan, J.W.: Experimental quasi-single-photon transmission from satellite to earth. Opt. Express 21, 20032 (2013)
50.
Zurück zum Zitat Dequal, D., Vallone, G., Bacco, D., Gaiarin, S., Luceri, V., Bianco, G., Villoresi, P.: Experimental single-photon exchange along a space link of 7000 km. Phys. Rev. A 93, 010301 (2016) Dequal, D., Vallone, G., Bacco, D., Gaiarin, S., Luceri, V., Bianco, G., Villoresi, P.: Experimental single-photon exchange along a space link of 7000 km. Phys. Rev. A 93, 010301 (2016)
51.
Zurück zum Zitat Goldreich, O.: Foundations of Cryptography I: Basic Tools. Cambridge University Press, Cambridge. ISBN 978-0-511-54689-1 (2001) Goldreich, O.: Foundations of Cryptography I: Basic Tools. Cambridge University Press, Cambridge. ISBN 978-0-511-54689-1 (2001)
Metadaten
Titel
Quantum identity authentication with single photon
verfasst von
Chang ho Hong
Jino Heo
Jin Gak Jang
Daesung Kwon
Publikationsdatum
01.10.2017
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 10/2017
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-017-1681-0

Weitere Artikel der Ausgabe 10/2017

Quantum Information Processing 10/2017 Zur Ausgabe

Neuer Inhalt