1. Controlled quantum dialogue with authentication protocol on a basis of GHZ-like state
- Author
-
Wen-zhen Liang, Xiao-yi Zheng, and Chang Kuang
- Subjects
business.industry ,Computer science ,Statistical and Nonlinear Physics ,Eavesdropping ,Quantum key distribution ,Encryption ,01 natural sciences ,010305 fluids & plasmas ,Theoretical Computer Science ,Electronic, Optical and Magnetic Materials ,Alice and Bob ,Modeling and Simulation ,Authentication protocol ,0103 physical sciences ,Signal Processing ,State (computer science) ,Electrical and Electronic Engineering ,010306 general physics ,business ,Communications protocol ,Computer network ,Quantum computer - Abstract
A controlled quantum dialogue with authentication protocol on a basis of GHZ-like state was proposed in this paper. To start with, three participants of the communication protocol generated a corresponding identity ID through quantum key distribution and it was kept secret. Controller Trent prepared the three-particle Greenberger–Home–Zeilinger-like (GHZ-like) state and shared with other two communication users Alice and Bob. Communication participants use the entangled particles in their respective hands which satisfy the nature of the classical XOR relationship for encryption, controlling and decryption of quantum messages and to verify the identities of communication users. Meanwhile, security of communication was assured by introducing decoy photons. According to analysis results, the proposed protocol can effectively not only prevent any form of eavesdropping behavior from external and internal eavesdroppers including the controller Trent, but also detect such activities. Finally, this protocol is proved to have high communication efficiency.
- Published
- 2020