How to Verify Identity in the Continuous Variable Quantum System?
- URL: http://arxiv.org/abs/2202.10850v2
- Date: Wed, 16 Mar 2022 12:08:02 GMT
- Title: How to Verify Identity in the Continuous Variable Quantum System?
- Authors: Xing-Qiang Zhao, Hai Wan, Lv-Zhou Li
- Abstract summary: We propose a continuous variable quantum identification (CV-QI) protocol based on the correlation of two-mode squeezed vacuum state and the continuous variable teleportation.
The bidirectional identity verification between two participants of the communication can be achieved by the proposed CV-QI protocol.
- Score: 14.871034136378366
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Continuous variable quantum cryptography has developed rapidly in recent
decades, but how to verify identity in the continuous variable quantum system
is still an urgent issue to be solved. To solve this problem, we propose a
continuous variable quantum identification (CV-QI) protocol based on the
correlation of two-mode squeezed vacuum state and the continuous variable
teleportation. The bidirectional identity verification between two participants
of the communication can be achieved by the proposed CV-QI protocol. In order
to guarantee the security, we make full use of the decoy state sequences during
the whole process of the proposed CV-QI protocol. Besides, we provide the
security analyses of the proposed CV-QI protocol, and analyses indicate that
the security of the proposed CV-QI protocol is guaranteed.
Related papers
- Continuous-variable quantum digital signatures that can withstand coherent attacks [5.777874043843867]
Quantum digital signatures (QDSs) guarantee authenticity, integrity, and nonrepudiation of classical messages based on quantum laws.
We introduce a CV QDS protocol designed to withstand general coherent attacks through the use of a cutting-edge fidelity test function.
Results demonstrate a significant reduction of eight orders of magnitude in signature length for a megabit message signing task.
arXiv Detail & Related papers (2024-07-04T03:39:59Z) - Continuous-variable Quantum Position Verification secure against entangled attackers [0.6011824091708076]
We show that a quantum position verification protocol using coherent states could be securely implemented if and only if attackers do not pre-share any entanglement.
We show that the protocol remains secure for certain attenuation and excess noise.
arXiv Detail & Related papers (2024-04-22T15:09:36Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the
Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.
We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - Security of a Continuous-Variable based Quantum Position Verification
Protocol [0.0]
We present and analyze a protocol that utilizes coherent states and its properties.
We prove security of the protocol against any unentangled attackers via entropic uncertainty relations.
We show that attackers who pre-share one continuous-variable EPR pair can break the protocol.
arXiv Detail & Related papers (2023-08-08T09:56:38Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Single-photon-memory measurement-device-independent quantum secure
direct communication [63.75763893884079]
Quantum secure direct communication (QSDC) uses the quantum channel to transmit information reliably and securely.
In order to eliminate the security loopholes resulting from practical detectors, the measurement-device-independent (MDI) QSDC protocol has been proposed.
We propose a single-photon-memory MDI QSDC protocol (SPMQC) for dispensing with high-performance quantum memory.
arXiv Detail & Related papers (2022-12-12T02:23:57Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - A short review on quantum identity authentication protocols: How would
Bob know that he is talking with Alice? [0.0]
Successful implementation of a scheme of quantum key distribution (QKD) requires identity authentication as a prerequisite.
Several schemes for identity authentication, using quantum resources have been proposed.
The security of such protocols is also critically analyzed.
arXiv Detail & Related papers (2021-12-08T11:22:29Z) - Discrete-variable quantum key distribution with homodyne detection [14.121646217925441]
We propose a protocol that combines the simplicity of quantum state preparation in DV-QKD together with the cost-effective and high-bandwidth of homodyne detectors used in CV-QKD.
Our simulation suggests that the protocol is suitable for secure and high-speed practical key distribution over distances.
arXiv Detail & Related papers (2021-09-01T17:12:28Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.