Shi et al. (Phys. Lett. A 281:83-87, 2001) proposed a scheme which allows simultaneous realization of quantum key distribution and quantum authentication. However, this study points out a weakness in Shi et al.'s scheme, in which a malicious user can impersonate a legitimate participant without being detected. Furthermore, an improved scheme is proposed to avoid this weakness.
All Science Journal Classification (ASJC) codes
- Physics and Astronomy (miscellaneous)