How to verify identity in the continuous variable quantum system?

Continuous variable quantum cryptography has developed rapidly in recent decades, but how to verify identity in the continuous variable quantum system is still an urgent issue. To solve this problem, we propose a continuous variable quantum identification (CV-QI) protocol based on the correlation of...

Full description

Bibliographic Details
Main Authors: Li, L.-Z (Author), Wan, H. (Author), Zhao, X.-Q (Author)
Format: Article
Language:English
Published: Springer 2023
Subjects:
Online Access:View Fulltext in Publisher
View in Scopus
LEADER 02066nam a2200313Ia 4500
001 10.1007-s11128-023-03960-z
008 230529s2023 CNT 000 0 und d
020 |a 15700755 (ISSN) 
245 1 0 |a How to verify identity in the continuous variable quantum system? 
260 0 |b Springer  |c 2023 
856 |z View Fulltext in Publisher  |u https://doi.org/10.1007/s11128-023-03960-z 
856 |z View in Scopus  |u https://www.scopus.com/inward/record.uri?eid=2-s2.0-85159591928&doi=10.1007%2fs11128-023-03960-z&partnerID=40&md5=25b2633e601f97a19bcc7ab38fdb21cf 
520 3 |a Continuous variable quantum cryptography has developed rapidly in recent decades, but how to verify identity in the continuous variable quantum system is still an urgent issue. To solve this problem, we propose a continuous variable quantum identification (CV-QI) protocol based on the correlation of the two-mode squeezed vacuum state and the continuous variable teleportation. The bidirectional identity verification between two participants of the communication can be achieved by the proposed CV-QI protocol. To guarantee the security, we make full use of the decoy state sequences during the whole process of the proposed CV-QI protocol. Besides, we provide the security analyses of the proposed CV-QI protocol, and analyses indicate that the security of the proposed CV-QI protocol is guaranteed. © 2023, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature. 
650 0 4 |a Continuous variable quantum cryptography 
650 0 4 |a Continuous variables 
650 0 4 |a Decoy state 
650 0 4 |a Identification protocol 
650 0 4 |a Quantum cryptography 
650 0 4 |a Quantum identifications 
650 0 4 |a Quantum optics 
650 0 4 |a Security 
650 0 4 |a Teleportation 
650 0 4 |a The two-mode squeezed vacuum state 
650 0 4 |a Two-mode squeezed vacuum state 
650 0 4 |a Verify identity 
700 1 0 |a Li, L.-Z.  |e author 
700 1 0 |a Wan, H.  |e author 
700 1 0 |a Zhao, X.-Q.  |e author 
773 |t Quantum Information Processing