Chinese Journal of Quantum Electronics, Volume. 29, Issue 2, 178(2012)
A quantum identity authentication based on chaos
[5] [5] Wu Xiaogang, Hu Hanping, Zhang Baoliang. Parameter estimation only from the symbolic sequences generated by chaos system [J]. Chaos, Solitons and Fractals, 2004, 22(2): 359-366.
[6] [6] Zeng Guihua, Zhang Weiping. Identity verification in quantum cryptography [J]. Phys. Rev. A, 2000, 61(2): 022303/1-5.
[8] [8] Zhou Nanrun, Zeng Guihua, Zeng Wenjie, et al. Cross-center quantum identity authentication scheme based on teleportation and entanglement swapping [J]. Optics Communications, 2005, 254(4-6): 380-388.
[12] [12] Cao Zhengwen, Dai Zhaoyang, Xu Ping, et al. A study on quantum key expansion method based on chaos [C]. The 2nd International Conference on Information Science and Engineering (ICISE2010), 2010, 4320-4323 (in Chinese).
[13] [13] Bennett C H, Brassard G. Quantum cryptography: public key distribution and coin tossing [C]. Proc. of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 1984, 175-179.
Get Citation
Copy Citation Text
KANG Wei-hong, CAO Zheng-wen, LUO Rui, JIANG En-chun, ZHAO Long. A quantum identity authentication based on chaos[J]. Chinese Journal of Quantum Electronics, 2012, 29(2): 178
Category:
Received: Feb. 14, 2011
Accepted: --
Published Online: Mar. 30, 2012
The Author Email: Wei-hong KANG (kwh85916@163.com)