Authority-based user authentication in quantum key distribution
2000 (English)In: Physical Review A. Atomic, Molecular, and Optical Physics, ISSN 1050-2947, E-ISSN 1094-1622, Vol. 62, no 2, 022305- p.Article in journal (Refereed) Published
We propose secure protocols for user authenticated quantum key distribution on jammable public channels between two parties, Alice and Bob. Via an arbitrator, Trent, these protocols provide data integrity and mutual identification of the messenger and recipient. The first three are based on single-photon generation and detection. The first and second require (initially) an unjammable channel between the arbitrator and each party. The third requires one broadcast from the arbitrator, disclosing what type of deterministic modification of the states sent through the quantum channel was done by him. The fourth and fifth protocols are based on two-particle entanglement with a preselection of nonorthogonal superpositions of Bell states. These two protocols also require one broadcast from the arbitrator disclosing the type of entangled state in each sending.
Place, publisher, year, edition, pages
2000. Vol. 62, no 2, 022305- p.
Communication channels (information theory), Cryptography, Data privacy, Network protocols, Photons, Security of data
Engineering and Technology
IdentifiersURN: urn:nbn:se:kth:diva-9067DOI: 10.1103/PhysRevA.62.022305ISI: 000088683400030OAI: oai:DiVA.org:kth-9067DiVA: diva2:14621
QC 201008312006-02-102006-02-102010-08-31Bibliographically approved