Acta Optica Sinica, Volume. 29, Issue 6, 1680(2009)
Quantum Identity Authentication Using Three-Particle W state
[1] [1] C. H. Bennett, G. Brassard. Quantum cryptography: public key distribution and coin tossing [C]. IEEE Int. Conf. on Computers, Systems and Signal Processing, Bangalore, India (IEEE, New York, 1984): 175~179
[3] [3] A. K. Ekert. Quantum cryptography based on bell’s theorem[J]. Phys. Rev. Lett., 1991, 67(6): 661~663
[4] [4] A. Beige, B.G. Englert, Kurtsiefer et al.. Secure communication with a publicly know key[J]. Acta Phys. Pol. A, 2002, 101(3): 357~368
[5] [5] Kim Bostrm, Timo Felbinger. Deterministic secure direct communication[J]. Phys. Rev. Lett., 2002, 89(18): 187902-1~4
[7] [7] Piao Guangchun, Zhang Shou. Controlled quantum dialogue based on W state [J]. Chin. J. Quant. Electron., 2007, 24(3): 311~315
[8] [8] Miloslav Duek, Ondr^ej Haderka, Martin Hendrych et al.. Quantum identification system[J]. Phys. Rev. A, 1999, 60(1):149~156
[9] [9] Takashi Mihara. Quantum identification schemes with entanglements[J]. Phys. Rev. A, 2002, 65: 052326-1~052326-4
[10] [10] Wim van Dam. Comment on “Quantum identification schemes with entanglements” [J]. Phys. Rev. A, 68: 026301-1~026301-4
[12] [12] Guihua Zeng, Weiping Zhang. Identity verification in quantum key distribution [J]. Phys. Rev. A, 2000, 61: 022303-1~022303-5
[13] [13] Hwayean Lee, Jongin Lim, HyungJin Yang. Quantum direct communication with authentication[J]. Phys. Rev. A, 2006, 73: 042305-1~042305-4
[14] [14] D. Ljunggren, M. Bourennane, A. Karlsson. Authority-based user authentication in quantum key distribution[J]. Phys. Rev. A, 2000, 62: 022305-1~022305-6
[15] [15] Shi Baosen, L Jian, Liu Jinming et al.. Quantum key distribution and quantum authentication based on entangled state[J].Phys. Lett. A, 2001, 281: 83~87
[16] [16] Zhanjun Zhang, Jun Liu, Dong Wang et al.. Comment on “Quantum direct communication with authentication”[J]. Phys. Rev. A, 2007, 75: 026301-1~026301-4
[17] [17] W. Dür, G. Vidal, J. I. Cirac. Three qubits can be entangled in two inequivalent ways[J]. Phys. Rev. A, 2000, 62: 062314-1~062314-5
[18] [18] Cao Haijing, Song Heshan. Quantum secure direct communication with W State[J]. Chin. Phys. Lett., 2006, 23(2): 290~292
[19] [19] Liu Jun, Liu Yimin. Revisiting quantum secure direct communication with W state[J]. Chin. Phys. Lett., 2006, 23(10): 2652~2655
[20] [20] Yuan Hao, Liu Yimin, Zhang Wen et al.. Eavesdropping on quantum secure communication with W state in noisy channel[J]. Commun. Theor. Phys. 2008, 49(1): 103~106
[21] [21] C. Bennett, G. Brassard, C. Crepeau et al.. Teleporting an unknown quantum state via dual classical and EPR channels[J]. Phys. Rev. Lett., 1993, 70: 1895~1899
[22] [22] Yue Li, Yu Liu, Quantum secure direct communication based on supervised teleportation[C]. SPIE, 2007, 6827: 682707~682714
Get Citation
Copy Citation Text
Hu Xing, Yu Jijun, Ning Xiaoling, Liu Yu. Quantum Identity Authentication Using Three-Particle W state[J]. Acta Optica Sinica, 2009, 29(6): 1680