A short review on quantum identity authentication protocols: How would Bob know that he is talking with Alice?

12/08/2021
by   Arindam Dutta, et al.
0

Secure communication has achieved a new dimension with the advent of the schemes of quantum key distribution (QKD) as in contrast to classical cryptography, quantum cryptography can provide unconditional security. However, a successful implementation of a scheme of QKD requires identity authentication as a prerequisite. A security loophole in the identity authentication scheme may lead to the vulnerability of the entire secure communication scheme. Consequently, identity authentication is extremely important and in the last three decades several schemes for identity authentication, using quantum resources have been proposed. The chronological development of these protocols, which are now referred to as quantum identity authentication (QIA) protocols, are briefly reviewed here with specific attention to the causal connection involved in their development. The existing protocols are classified on the basis of the required quantum resources and their relative merits and demerits are analyzed. Further, in the process of the classification of the protocols for QIA, it's observed that the existing protocols can also be classified in a few groups based on the inherent computational tasks used to design the protocols. Realization of these symmetries has led to the possibility of designing a set of new protocols for quantum identity authentication, which are based on the existing schemes of the secure computational and communication tasks. The security of such protocols is also critically analyzed.

READ FULL TEXT
research
04/06/2023

Device-Independent Quantum Secure Direct Communication with User Authentication

Quantum Secure Direct Communication (QSDC) is an important branch of qua...
research
12/05/2018

Quantum Authentication Protocols for GSM

Security deficiencies and bugs in the Authentication of SIM cards in Glo...
research
03/26/2020

Concerning Quantum Identification Without Entanglement

Identification schemes are interactive protocols typically involving two...
research
11/13/2020

Information-theoretically secure data origin authentication with quantum and classical resources

In conventional cryptography, information-theoretically secure message a...
research
11/03/2022

From Auditable Quantum Authentication to Best-of-Both-Worlds Multiparty Quantum Computation with Public Verifiable Identifiable Abort

We construct the first secure multiparty quantum computation with public...
research
08/21/2023

SCC5G: A PQC-based Architecture for Highly Secure Critical Communication over Cellular Network in Zero-Trust Environment

5G made a significant jump in cellular network security by offering enha...
research
08/09/2019

Composable and Finite Computational Security of Quantum Message Transmission

Recent research in quantum cryptography has led to the development of sc...

Please sign up or login with your details

Forgot password? Click here to reset