Abstract
Shi et al. (Phys. Lett. A 281:83–87, 2001) proposed a scheme which allows simultaneous realization of quantum key distribution and quantum authentication. However, this study points out a weakness in Shi et al.’s scheme, in which a malicious user can impersonate a legitimate participant without being detected. Furthermore, an improved scheme is proposed to avoid this weakness.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing (invited paper). In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, Dec., pp. 175–179 (1984)
Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121–3124 (1992)
Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65, 0323021 (2002)
Li, C., Song, H.S., Zhou, L., Wu, C.F.: A random quantum key distribution achieved by using Bell states. J. Opt. B, Quantum Semiclass. Opt. 5(2), 155–157 (2003)
Song, D.: Secure key distribution by swapping quantum entanglement. Phys. Rev. A 69(3), 034301 (2004)
Namiki, R., Hirono, T.: Efficient-phase-encoding protocols for continuous-variable quantum key distribution using coherent states and postselection. Phys. Rev. A 74, 032302 (2006)
Hwang, T., Lee, K.C.: EPR quantum key distribution protocols with potential 100% qubit efficiency. IET Proc. Inf. Secur. 1, 43–45 (2007)
Hwang, H., Lee, K.C., Li, C.M.: Provably secure three-party authenticated quantum key distribution protocols. IEEE Trans. Dependable Secure Comput. 4, 71–80 (2007)
Gan, G.: Quantum key distribution scheme with high efficiency. Commun. Theor. Phys. 51(5), 820–822 (2009)
Dušek, M., Haderka, Q., Hendrych, M., Myška, R.: Quantum identification system. Phys. Rev. A 60(1), 149–155 (1998)
Ljunggren, D., Bourennane, M., Karlsson, A.: Authority-based user authentication in quantum key distribution. Phys. Rev. A 62, 022305 (2000)
Zeng, G.H., Zhang, W.P.: Identity verification in quantum key distribution. Phys. Rev. A 61, 022303 (2000)
Shi, B.S., Li, J., Liu, J.M., Fan, X.F., Guo, G.C.: Quantum key distribution and quantum authentication based on entangled state. Phys. Lett. A 281, 83–87 (2001)
Curty, M., Santos, D.J.: Quantum authentication of classical messages. Phys. Rev. A 64, 062309 (2001)
Mihara, T.: Quantum identification schemes with entanglements. Phys. Rev. A 65, 052326 (2002)
Li, X.O.: Quantum authentication using entangled states. Int. J. Found. Comput. Sci. 15(4), 609–617 (2004)
Zhou, N.R., Zeng, G.H., Zeng, W.J., Zhu, F.H.: Cross-center quantum identification scheme based on teleportation and entanglement swapping. Opt. Commun. 254, 380–388 (2005)
Zhang, Z.H., Zeng, G.H., Zhou, N.R., Xiong, J.: Quantum identity authentication based on ping-pong technique for photons. Phys. Lett. A 356, 199–205 (2006)
Yang, Y.G., Wen, Q.Y., Zhu, F.C.: An efficient quantum secure direct communication scheme with authentication. Chin. Phys. B 16(7), 1838–1842 (2007)
Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Secure authentication of classical messages with single photons. Chin. Phys. B 18(8), 3189–3192 (2009)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wei, TS., Tsai, CW. & Hwang, T. Comment on “Quantum Key Distribution and Quantum Authentication Based on Entangled State”. Int J Theor Phys 50, 2703–2707 (2011). https://doi.org/10.1007/s10773-011-0768-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-011-0768-0