Skip to main content

A Novel QIA Protocol Based on Bell States Position by Random Selection

  • Conference paper
  • First Online:
Proceedings of Data Analytics and Management

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 572))

Abstract

Identifying trusted user plays an important role before initiating secure communication; therefore, a quantum authentication schemes is proposed based on Bell pair. Two trusted party initial shared a common secret key (known as pre-shared key) which only known to them. Various existing protocol uses quantum resources with memory for Authentication process but the storage time of qubits in 3 ns. In proposed protocol, authentication process had done without strong the Bell states by trusted parties. Sending party selects 4 classical bits to form Bell pair in any one of the positions {(1, 2)(3, 4)} or {(1, 3)(2, 4)} based on the consecutive bits in pre-shared key. The receiving party uses the consecutive bits in pre-shared key to decode the information about authentication key using Bell state measurement. Adversary has no knowledge about pre-shared key and guessing incorrect position makes entangle swapping of Bell states. Adversary incorrect position leads to its identification by trusted parties by verifying the authentication key in classical channel. The security of proposed protocol is analyzed under intercept measure and resend attack (IR). In addition, proposed protocol can prevent the adversary to fetch the information about the pre-shared key. Various existing protocol is compared with the proposed one with quantum resources and memory requirement. The proposed protocol is implemented in IBM Quantum Lab, and circuit simulation is shown visually in IBM quantum composer.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Shor PW (1997) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J Comput 26(5):1484–1509

    Google Scholar 

  2. Zawadzki P (2019) Quantum identity authentication without entanglement. Quantum Inf Process 18(1):7

    Google Scholar 

  3. Zhu H, Wang L, Zhang Y (2020) An efficient quantum identity authentication key agreement protocol without entanglement. Quantum Inf Process 19(10):381

    Article  MathSciNet  MATH  Google Scholar 

  4. Li X, Barnum H (2004) Quantum authentication using entangled states. Int J Found Comput Sci 15(04):609–617

    Article  MathSciNet  MATH  Google Scholar 

  5. Zhang Z, Zeng G, Zhou N, Xiong J (2006) Quantum identity authentication based on ping-pong technique for photons. Phys Lett A 356(3):199–205

    Google Scholar 

  6. Creau C, Salvail L (1995) Quantum oblivious mutual identification. Advances in cryptology. In: Proceedings of Eurocrypt’ vol 95. Springer, Berlin, pp 133–146

    Google Scholar 

  7. Dusek M, Haderka O, Hendrych M, Myška R (1999) Quantum identification system. Phys Rev A 6(01):1–9

    Google Scholar 

  8. Nayana D, Goutam P, Ritajit M (2021) Quantum secure direct communication with mutual authentication using a single basis. Int J Theor Phys 60:4044–4065

    Google Scholar 

  9. Hong CH, Heo J, Jang JG (2017) Quantum identity authentication with single photon. Quantum Inf Process 16(10):236

    Article  MathSciNet  MATH  Google Scholar 

  10. Bennett CH, Brassard G (2014) Quantum cryptography: public key distribution and coin tossing. Theoret Comput Sci 560(1):7–11

    Article  MathSciNet  MATH  Google Scholar 

  11. Shan R-T, Chen X, Yuan K-G (2021) Multi-party blind quantum computation protocol with mutual authentication in network. Sci China Inf Sci 64(6):162302

    Article  MathSciNet  Google Scholar 

  12. Shor PW, Preskill J (2000) Simple proof of security of the BB84 quantum key distribution protocol. Phys Rev Lett 85:441–444

    Google Scholar 

  13. IBM Quantum, https://quantum-computing.ibm.com/. Last accessed 2022/03/15

  14. Xiaoyu L, Liju C (2007) Quantum authentication protocol using bell state. In: Proceedings of the first international symposium on data, privacy, and E-commerce, pp 128–132

    Google Scholar 

  15. Kang MS, Hong CH, Heo J (2015) Controlled mutual quantum entity authentication using entanglement swapping. Acta Phys Sin 24(9):90306–90306

    Google Scholar 

  16. Kang MS, Heo J, Hong CH (2018) Controlled mutual quantum entity authentication with an untrusted third party. Quantum Inf Process 17(10):159

    Article  MathSciNet  MATH  Google Scholar 

  17. Zhang S, Zhang-Kai C, Run-Hua S, Feng-Yu L (2020) A novel quantum identity authentication based on Bell states. Int J Theor Phys 59:236–249

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ramkumar Jayaraman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Devendar Rao, B., Jayaraman, R. (2023). A Novel QIA Protocol Based on Bell States Position by Random Selection. In: Khanna, A., Polkowski, Z., Castillo, O. (eds) Proceedings of Data Analytics and Management . Lecture Notes in Networks and Systems, vol 572. Springer, Singapore. https://doi.org/10.1007/978-981-19-7615-5_10

Download citation

Publish with us

Policies and ethics