Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Measurement-device-independent mutual quantum entity authentication

Full metadata record
DC Field Value Language
dc.contributor.authorChoi, Ji-Woong-
dc.contributor.authorKang, Min-Sung-
dc.contributor.authorPark, Chang Hoon-
dc.contributor.authorYang, Hyung-Jin-
dc.contributor.authorHan, Sang-Wook-
dc.date.accessioned2021-11-22T11:40:44Z-
dc.date.available2021-11-22T11:40:44Z-
dc.date.created2021-08-30-
dc.date.issued2021-04-
dc.identifier.issn1570-0755-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/128350-
dc.description.abstractQuantum entity authentication (QEA) based on security guaranteed by the laws of physics is the first and most important step for secure communication under the threat of a quantum adversary. QEA theoretically provides unconditional security; however, there is a threat of quantum hacking owing to imperfection of measurement devices in the actual implementation. The proposed measurement-device-independent (MDI) mutual quantum entity authentication (MQEA) scheme guarantees its security under any quantum attacks on measuring devices that have been reported. Using the MDI architecture in our scheme, the third party can only know the correlation of the transmitted qubits through the Bell state measurement, and it cannot obtain the secret key information. In order to confirm the security of the proposed scheme, we present a security analysis of secret key information that is pre-shared among legitimate users, and we analyze Eve's impersonation attack. Furthermore, we compare the MDI MQEA with other existing QEA schemes-
dc.languageEnglish-
dc.language.isoen-
dc.publisherSPRINGER-
dc.titleMeasurement-device-independent mutual quantum entity authentication-
dc.typeArticle-
dc.contributor.affiliatedAuthorYang, Hyung-Jin-
dc.identifier.doi10.1007/s11128-021-03093-1-
dc.identifier.scopusid2-s2.0-85104767155-
dc.identifier.wosid000642410000001-
dc.identifier.bibliographicCitationQUANTUM INFORMATION PROCESSING, v.20, no.4-
dc.relation.isPartOfQUANTUM INFORMATION PROCESSING-
dc.citation.titleQUANTUM INFORMATION PROCESSING-
dc.citation.volume20-
dc.citation.number4-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaPhysics-
dc.relation.journalWebOfScienceCategoryQuantum Science & Technology-
dc.relation.journalWebOfScienceCategoryPhysics, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryPhysics, Mathematical-
dc.subject.keywordPlusKEY DISTRIBUTION-
dc.subject.keywordPlusHACKING-
dc.subject.keywordPlusSYSTEM-
dc.subject.keywordAuthorQuantum entity authentication-
dc.subject.keywordAuthorQuantum hacking-
dc.subject.keywordAuthorMeasurement-device-independent-
dc.subject.keywordAuthorImpersonation attack-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Science and Technology > Semiconductor Physics in Division of Display and Semiconductor Physics > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE