Sok: An evaluation of quantum authentication through systematic literature review
R Majumdar, S Das - Proceedings of the Workshop on Usable …, 2021 - papers.ssrn.com
Quantum computers are considered a blessing to the dynamic technological world that
promises to solve complex problems much faster than their known classical counterparts …
promises to solve complex problems much faster than their known classical counterparts …
Quantum cryptography for the future internet and the security analysis
Cyberspace has become the most popular carrier of information exchange in every corner of
our life, which is beneficial for our life in almost all aspects. With the continuous development …
our life, which is beneficial for our life in almost all aspects. With the continuous development …
Robust general N user authentication scheme in a centralized quantum communication network via generalized GHZ states
Quantum communication provides an enormous advantage over its classical counterpart:
security of communications based on the very principles of quantum mechanics …
security of communications based on the very principles of quantum mechanics …
Quantum identity authentication without entanglement
P Zawadzki - Quantum Information Processing, 2019 - Springer
An interesting protocol for quantum identity authentication on a basis of the classic shared
secret has been presented recently (Hong et al. in Quantum Inf Process 16 (10): 236, 2017) …
secret has been presented recently (Hong et al. in Quantum Inf Process 16 (10): 236, 2017) …
Single-photon-memory two-step quantum secure direct communication relying on Einstein-Podolsky-Rosen pairs
Quantum secure direct communication (QSDC) is an important branch of quantum
communication that is capable of directly transmitting secret messages over a quantum …
communication that is capable of directly transmitting secret messages over a quantum …
Quantum identity authentication based on ping-pong technique for photons
To prevent active attack, an one-way quantum identity authentication scheme is proposed by
employing mechanism of ping-pong protocol and property of quantum controlled-NOT gate …
employing mechanism of ping-pong protocol and property of quantum controlled-NOT gate …
Full quantum one‐way function for quantum cryptography
T Shang, Y Tang, R Chen, J Liu - Quantum Engineering, 2020 - Wiley Online Library
One‐way functions are fundamental tools for cryptography. Until now, quantum one‐way
functions have several input‐output categories such as “classical‐to‐classical,”“classical‐to …
functions have several input‐output categories such as “classical‐to‐classical,”“classical‐to …
Quantum readout of physical unclonable functions
B Škorić - International Journal of Quantum Information, 2012 - World Scientific
Physical unclonable functions (PUFs) are physical structures that are hard to clone and have
a unique challenge-response behavior. The term PUF was coined by Pappu et al. in 2001 …
a unique challenge-response behavior. The term PUF was coined by Pappu et al. in 2001 …
Quantum key distribution without alternative measurements and rotations
F Gao, FZ Guo, QY Wen, FC Zhu - Physics Letters A, 2006 - Elsevier
A quantum key distribution protocol based on entanglement swapping is proposed. Through
choosing particles by twos from the sequence and performing Bell measurements, two …
choosing particles by twos from the sequence and performing Bell measurements, two …
Semi-quantum mutual identity authentication using Bell states
Identity authentication is an important method to realize information protection in
communication. This paper proposes a semi-quantum mutual identity authentication …
communication. This paper proposes a semi-quantum mutual identity authentication …