{"title":"Quantum Identity Authentication Using Non-Orthogonal State Encoding","authors":"A. Babu, N. Shanthi","doi":"10.1109/ACCESS51619.2021.9563302","DOIUrl":null,"url":null,"abstract":"We propose a quantum identity authentication protocol, for quantum key distribution devices that use nonorthogonal state encoding in conjunction with Heisenberg uncertainty principle. The keys for authentication are used only once. The used keys are replaced with new ones. The number of keys sacrificed for the proposed authentication protocol is small and the protocol is found to be resistant to Man in The Middle attack when the number of keys used for authentication is increased. Also, this protocol is compatible with the present quantum key distribution technology.","PeriodicalId":409648,"journal":{"name":"2021 2nd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACCESS51619.2021.9563302","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
We propose a quantum identity authentication protocol, for quantum key distribution devices that use nonorthogonal state encoding in conjunction with Heisenberg uncertainty principle. The keys for authentication are used only once. The used keys are replaced with new ones. The number of keys sacrificed for the proposed authentication protocol is small and the protocol is found to be resistant to Man in The Middle attack when the number of keys used for authentication is increased. Also, this protocol is compatible with the present quantum key distribution technology.