Skip to main content

2018 | OriginalPaper | Buchkapitel

Quantum Authentication Scheme Based on Fingerprint-Encoded Graph States

verfasst von : Fei Li, Ying Guo, Jiankun Hu

Erschienen in: Mobile Networks and Management

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We demonstrate an improved quantum authentication scheme which involves fingerprint recognition and quantum authentication. This scheme is designed to solve the practical problem in knowledge-based quantum authentication systems. It can satisfy the requirement of secure remote communication by using fingerprint-encoded graph states. The encoded graph states, which determine the preferred legitimate participants in the deterministic network, enable the facility of the implementable fingerprint-based authentication. The fingerprint template used for authentication in this scheme is of revocability and diversity. Security analysis shows that the proposed scheme can effectively defend various attacks including forgery attack, intercept-resend attack and man-in-the-middle attack. What’s more, this novel scheme takes advantages of the merits in terms of both fingerprint recognition and quantum authentication, rendering it more secure, convenient and practical for users than its original counterpart, knowledge-based quantum authentication.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Niu, P., Chen, Y., Li, C.: Quantum authentication scheme based on entanglement swapping. Int. J. Theor. Phys. 55, 1–11 (2016)MathSciNetCrossRef Niu, P., Chen, Y., Li, C.: Quantum authentication scheme based on entanglement swapping. Int. J. Theor. Phys. 55, 1–11 (2016)MathSciNetCrossRef
2.
Zurück zum Zitat Jin, Z., Teoh, A.B.J., Ong, T., Tee, C.: A revocable fingerprint template for security and privacy preserving. KISS Trans. Internet Inf. Syst. 4, 1327–1342 (2010) Jin, Z., Teoh, A.B.J., Ong, T., Tee, C.: A revocable fingerprint template for security and privacy preserving. KISS Trans. Internet Inf. Syst. 4, 1327–1342 (2010)
3.
Zurück zum Zitat Liu, B., Gao, F., Huang, W., Wen, Q.Y.: QKD-based quantum private query without a failure probability. Sci. China Phys. Mech. Astron. 58, 100301 (2015)CrossRef Liu, B., Gao, F., Huang, W., Wen, Q.Y.: QKD-based quantum private query without a failure probability. Sci. China Phys. Mech. Astron. 58, 100301 (2015)CrossRef
4.
Zurück zum Zitat Gaudiano, M., Osenda, O.: Entanglement in a spin ring with anisotropic interactions. Int. J. Quant. Inf. 13, 1550057 (2015)MathSciNetCrossRef Gaudiano, M., Osenda, O.: Entanglement in a spin ring with anisotropic interactions. Int. J. Quant. Inf. 13, 1550057 (2015)MathSciNetCrossRef
5.
Zurück zum Zitat Dušek, M., Haderka, O., Hendrych, M., Myška, R.: Quantum identification system. Phys. Rev. A 60, 149–156 (1998)CrossRef Dušek, M., Haderka, O., Hendrych, M., Myška, R.: Quantum identification system. Phys. Rev. A 60, 149–156 (1998)CrossRef
6.
Zurück zum Zitat Ljunggren, D., Bourennane, M., Karlsson, A.: Authority-based user authentication and quantum key distribution. Phys. Rev. A 62, 299–302 (2000)CrossRef Ljunggren, D., Bourennane, M., Karlsson, A.: Authority-based user authentication and quantum key distribution. Phys. Rev. A 62, 299–302 (2000)CrossRef
7.
Zurück zum Zitat Zhang, Z.S., Zeng, G.H., Zhou, N.R., Xiong, J.: Quantum identity authentication based on Ping-pong technique for photons. Phys. Lett. A 356, 199–205 (2006)CrossRef Zhang, Z.S., Zeng, G.H., Zhou, N.R., Xiong, J.: Quantum identity authentication based on Ping-pong technique for photons. Phys. Lett. A 356, 199–205 (2006)CrossRef
8.
Zurück zum Zitat Yuan, H., Liu, Y., Pan, G., Zhang, G., Zhou, J., Zhang, Z.: Quantum identity authentication based on Ping-pong technique without entanglements. Quant. Inf. Process. 13, 2535–2549 (2014)MathSciNetCrossRef Yuan, H., Liu, Y., Pan, G., Zhang, G., Zhou, J., Zhang, Z.: Quantum identity authentication based on Ping-pong technique without entanglements. Quant. Inf. Process. 13, 2535–2549 (2014)MathSciNetCrossRef
9.
Zurück zum Zitat Chang, Y., Zhang, S., Yan, L., Li, J.: Deterministic secure quantum communication and authentication protocol based on three-particle W state and quantum one-time pad. Sci. Bull. 59, 2835–2840 (2014)CrossRef Chang, Y., Zhang, S., Yan, L., Li, J.: Deterministic secure quantum communication and authentication protocol based on three-particle W state and quantum one-time pad. Sci. Bull. 59, 2835–2840 (2014)CrossRef
10.
Zurück zum Zitat Naseri, M.: Revisiting quantum authentication scheme based on entanglement swapping. Int. J. Theoret. Phys. 55, 2428–2435 (2016)MathSciNetCrossRef Naseri, M.: Revisiting quantum authentication scheme based on entanglement swapping. Int. J. Theoret. Phys. 55, 2428–2435 (2016)MathSciNetCrossRef
12.
Zurück zum Zitat Wang, Y., Hu, J.: Global ridge orientation modeling for partial fingerprint identification. IEEE Trans. Pattern Anal. Mach. Intell. 33, 72 (2011)CrossRef Wang, Y., Hu, J.: Global ridge orientation modeling for partial fingerprint identification. IEEE Trans. Pattern Anal. Mach. Intell. 33, 72 (2011)CrossRef
13.
Zurück zum Zitat Jin, Z., Teoh, A.B.J., Ong, T.S., Tee, C.: Generating revocable fingerprint template using minutiae pair representation. In: 2nd International Conference on Education Technology and Computer, pp. 22–24. IEEE Press, New York (2010) Jin, Z., Teoh, A.B.J., Ong, T.S., Tee, C.: Generating revocable fingerprint template using minutiae pair representation. In: 2nd International Conference on Education Technology and Computer, pp. 22–24. IEEE Press, New York (2010)
14.
Zurück zum Zitat Yang, W., Hu, J., Wang, S.: A Delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement. IEEE Trans. Inf. Forensics Secur. 9, 1179–1192 (2014)CrossRef Yang, W., Hu, J., Wang, S.: A Delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement. IEEE Trans. Inf. Forensics Secur. 9, 1179–1192 (2014)CrossRef
15.
Zurück zum Zitat Wong, W.J., Teoh, A.B., Kho, Y.H., Wong, M.L.D.: Kernel PCA enabled bit-string representation for minutiae-based cancellable fingerprint template. Pattern Recogn. 51, 197–208 (2016)CrossRef Wong, W.J., Teoh, A.B., Kho, Y.H., Wong, M.L.D.: Kernel PCA enabled bit-string representation for minutiae-based cancellable fingerprint template. Pattern Recogn. 51, 197–208 (2016)CrossRef
16.
Zurück zum Zitat Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 29, 561–572 (2007)CrossRef Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 29, 561–572 (2007)CrossRef
17.
Zurück zum Zitat Lee, C.H., Choi, C.Y., Toh, K.A.: Alignment-free cancelable fingerprint templates based on local minutiae information. IEEE Trans. Syst. Man Cybern. 37, 980–992 (2007)CrossRef Lee, C.H., Choi, C.Y., Toh, K.A.: Alignment-free cancelable fingerprint templates based on local minutiae information. IEEE Trans. Syst. Man Cybern. 37, 980–992 (2007)CrossRef
18.
Zurück zum Zitat Thomas, A.O., Ratha, N.K., Connell, J.H., Bolle, R.M.: Comparative analysis of registration based and registration free methods for cancelable fingerprint biometrics. In: 19th International Conference on Pattern Recognition, pp. 8–11. IEEE Press, New York (2008) Thomas, A.O., Ratha, N.K., Connell, J.H., Bolle, R.M.: Comparative analysis of registration based and registration free methods for cancelable fingerprint biometrics. In: 19th International Conference on Pattern Recognition, pp. 8–11. IEEE Press, New York (2008)
19.
20.
Zurück zum Zitat Lu, C.Y., Zhou, X.Q., Gühne, O., Gao, W.B., Zhang, J., Yuan, Z.S., Goebe, A., Yang, T., Pan, J.: Experimental entanglement of six photons in graph states. Nat. Phys. 3, 91–95 (2007)CrossRef Lu, C.Y., Zhou, X.Q., Gühne, O., Gao, W.B., Zhang, J., Yuan, Z.S., Goebe, A., Yang, T., Pan, J.: Experimental entanglement of six photons in graph states. Nat. Phys. 3, 91–95 (2007)CrossRef
21.
Zurück zum Zitat Walther, P., Resch, K.J., Rudolph, T., Schenck, E., Weinfurter, H., Vedral, V., Aspelmeyer, M., Zeilinger, A.: Experimental one-way quantum computing. Nature 434, 169 (2005)CrossRef Walther, P., Resch, K.J., Rudolph, T., Schenck, E., Weinfurter, H., Vedral, V., Aspelmeyer, M., Zeilinger, A.: Experimental one-way quantum computing. Nature 434, 169 (2005)CrossRef
22.
Zurück zum Zitat Nest, M.V.D., Dehaene, J., Moor, B.D.: An efficient algorithm to recognize local Clifford equivalence of graph states. Phys. Rev. A 70, 423–433 (2004) Nest, M.V.D., Dehaene, J., Moor, B.D.: An efficient algorithm to recognize local Clifford equivalence of graph states. Phys. Rev. A 70, 423–433 (2004)
23.
Zurück zum Zitat Hein, M., Eisert, J., Briegel, H.J.: Multi-party entanglement in graph states. Phys. Rev. A 69, 666–670 (2003) Hein, M., Eisert, J., Briegel, H.J.: Multi-party entanglement in graph states. Phys. Rev. A 69, 666–670 (2003)
24.
Zurück zum Zitat Keet, A., Fortescue, B., Markham, D., Sanders, B.C.: Quantum secret sharing with qudit graph states. Phys. Rev. A 82, 4229–4231 (2010)CrossRef Keet, A., Fortescue, B., Markham, D., Sanders, B.C.: Quantum secret sharing with qudit graph states. Phys. Rev. A 82, 4229–4231 (2010)CrossRef
Metadaten
Titel
Quantum Authentication Scheme Based on Fingerprint-Encoded Graph States
verfasst von
Fei Li
Ying Guo
Jiankun Hu
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-90775-8_14