An Attack on Zawadzki’s Quantum Authentication Scheme
Identification schemes are interactive cryptographic protocols typically involving two parties, a prover, who wants to provide evidence of their identity and a verifier, who checks the provided evidence and decides whether or not it comes from the intended prover. Given the growing interest in quant...
Main Authors: | Carlos E. González-Guillén, María Isabel González Vasco, Floyd Johnson, Ángel L. Pérez del Pozo |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-03-01
|
Series: | Entropy |
Subjects: | |
Online Access: | https://www.mdpi.com/1099-4300/23/4/389 |
Similar Items
-
Quantum Private Query Protocol Based on Two Non-Orthogonal States
by: Yan Chang, et al.
Published: (2016-05-01) -
Quantum Identity Authentication in the Counterfactual Quantum Key Distribution Protocol
by: Bin Liu, et al.
Published: (2019-05-01) -
Efficient Simulation for Quantum Message Authentication
by: Wainewright, Evelyn
Published: (2016) -
Improving Classical Authentication over a Quantum Channel
by: Yasser Omar, et al.
Published: (2012-12-01) -
Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources
by: Georgios M. Nikolopoulos, et al.
Published: (2020-11-01)