Abstract
Shi et al. (Phys. Lett. A 281:83-87, 2001) proposed a scheme which allows simultaneous realization of quantum key distribution and quantum authentication. However, this study points out a weakness in Shi et al.'s scheme, in which a malicious user can impersonate a legitimate participant without being detected. Furthermore, an improved scheme is proposed to avoid this weakness.
Original language | English |
---|---|
Pages (from-to) | 2703-2707 |
Number of pages | 5 |
Journal | International Journal of Theoretical Physics |
Volume | 50 |
Issue number | 9 |
DOIs | |
Publication status | Published - 2011 Sep 1 |
All Science Journal Classification (ASJC) codes
- Mathematics(all)
- Physics and Astronomy (miscellaneous)