An Attack on Zawadzki’s Quantum Authentication Scheme

Identification schemes are interactive cryptographic protocols typically involving two parties, a prover, who wants to provide evidence of their identity and a verifier, who checks the provided evidence and decides whether or not it comes from the intended prover. Given the growing interest in quant...

Full description

Bibliographic Details
Main Authors: Carlos E. González-Guillén, María Isabel González Vasco, Floyd Johnson, Ángel L. Pérez del Pozo
Format: Article
Language:English
Published: MDPI AG 2021-03-01
Series:Entropy
Subjects:
Online Access:https://www.mdpi.com/1099-4300/23/4/389