Abstract
Identifying trusted user plays an important role before initiating secure communication; therefore, a quantum authentication schemes is proposed based on Bell pair. Two trusted party initial shared a common secret key (known as pre-shared key) which only known to them. Various existing protocol uses quantum resources with memory for Authentication process but the storage time of qubits in 3 ns. In proposed protocol, authentication process had done without strong the Bell states by trusted parties. Sending party selects 4 classical bits to form Bell pair in any one of the positions {(1, 2)(3, 4)} or {(1, 3)(2, 4)} based on the consecutive bits in pre-shared key. The receiving party uses the consecutive bits in pre-shared key to decode the information about authentication key using Bell state measurement. Adversary has no knowledge about pre-shared key and guessing incorrect position makes entangle swapping of Bell states. Adversary incorrect position leads to its identification by trusted parties by verifying the authentication key in classical channel. The security of proposed protocol is analyzed under intercept measure and resend attack (IR). In addition, proposed protocol can prevent the adversary to fetch the information about the pre-shared key. Various existing protocol is compared with the proposed one with quantum resources and memory requirement. The proposed protocol is implemented in IBM Quantum Lab, and circuit simulation is shown visually in IBM quantum composer.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Shor PW (1997) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J Comput 26(5):1484–1509
Zawadzki P (2019) Quantum identity authentication without entanglement. Quantum Inf Process 18(1):7
Zhu H, Wang L, Zhang Y (2020) An efficient quantum identity authentication key agreement protocol without entanglement. Quantum Inf Process 19(10):381
Li X, Barnum H (2004) Quantum authentication using entangled states. Int J Found Comput Sci 15(04):609–617
Zhang Z, Zeng G, Zhou N, Xiong J (2006) Quantum identity authentication based on ping-pong technique for photons. Phys Lett A 356(3):199–205
Creau C, Salvail L (1995) Quantum oblivious mutual identification. Advances in cryptology. In: Proceedings of Eurocrypt’ vol 95. Springer, Berlin, pp 133–146
Dusek M, Haderka O, Hendrych M, Myška R (1999) Quantum identification system. Phys Rev A 6(01):1–9
Nayana D, Goutam P, Ritajit M (2021) Quantum secure direct communication with mutual authentication using a single basis. Int J Theor Phys 60:4044–4065
Hong CH, Heo J, Jang JG (2017) Quantum identity authentication with single photon. Quantum Inf Process 16(10):236
Bennett CH, Brassard G (2014) Quantum cryptography: public key distribution and coin tossing. Theoret Comput Sci 560(1):7–11
Shan R-T, Chen X, Yuan K-G (2021) Multi-party blind quantum computation protocol with mutual authentication in network. Sci China Inf Sci 64(6):162302
Shor PW, Preskill J (2000) Simple proof of security of the BB84 quantum key distribution protocol. Phys Rev Lett 85:441–444
IBM Quantum, https://quantum-computing.ibm.com/. Last accessed 2022/03/15
Xiaoyu L, Liju C (2007) Quantum authentication protocol using bell state. In: Proceedings of the first international symposium on data, privacy, and E-commerce, pp 128–132
Kang MS, Hong CH, Heo J (2015) Controlled mutual quantum entity authentication using entanglement swapping. Acta Phys Sin 24(9):90306–90306
Kang MS, Heo J, Hong CH (2018) Controlled mutual quantum entity authentication with an untrusted third party. Quantum Inf Process 17(10):159
Zhang S, Zhang-Kai C, Run-Hua S, Feng-Yu L (2020) A novel quantum identity authentication based on Bell states. Int J Theor Phys 59:236–249
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Devendar Rao, B., Jayaraman, R. (2023). A Novel QIA Protocol Based on Bell States Position by Random Selection. In: Khanna, A., Polkowski, Z., Castillo, O. (eds) Proceedings of Data Analytics and Management . Lecture Notes in Networks and Systems, vol 572. Springer, Singapore. https://doi.org/10.1007/978-981-19-7615-5_10
Download citation
DOI: https://doi.org/10.1007/978-981-19-7615-5_10
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-7614-8
Online ISBN: 978-981-19-7615-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)