Comment on "Quantum Key Distribution and Quantum Authentication Based on Entangled State"

Toung Shang Wei, Chia Wei Tsai, Tzone-Lih Hwang

研究成果: Article

12 引文 (Scopus)

摘要

Shi et al. (Phys. Lett. A 281:83-87, 2001) proposed a scheme which allows simultaneous realization of quantum key distribution and quantum authentication. However, this study points out a weakness in Shi et al.'s scheme, in which a malicious user can impersonate a legitimate participant without being detected. Furthermore, an improved scheme is proposed to avoid this weakness.

原文English
頁(從 - 到)2703-2707
頁數5
期刊International Journal of Theoretical Physics
50
發行號9
DOIs
出版狀態Published - 2011 九月 1

指紋

Quantum Key Distribution
Entangled State
Authentication

All Science Journal Classification (ASJC) codes

  • Mathematics(all)
  • Physics and Astronomy (miscellaneous)

引用此文

@article{0af42139082742f5bae8d8129c0c5924,
title = "Comment on {"}Quantum Key Distribution and Quantum Authentication Based on Entangled State{"}",
abstract = "Shi et al. (Phys. Lett. A 281:83-87, 2001) proposed a scheme which allows simultaneous realization of quantum key distribution and quantum authentication. However, this study points out a weakness in Shi et al.'s scheme, in which a malicious user can impersonate a legitimate participant without being detected. Furthermore, an improved scheme is proposed to avoid this weakness.",
author = "Wei, {Toung Shang} and Tsai, {Chia Wei} and Tzone-Lih Hwang",
year = "2011",
month = "9",
day = "1",
doi = "10.1007/s10773-011-0768-0",
language = "English",
volume = "50",
pages = "2703--2707",
journal = "International Journal of Theoretical Physics",
issn = "0020-7748",
publisher = "Springer New York",
number = "9",

}

Comment on "Quantum Key Distribution and Quantum Authentication Based on Entangled State". / Wei, Toung Shang; Tsai, Chia Wei; Hwang, Tzone-Lih.

於: International Journal of Theoretical Physics, 卷 50, 編號 9, 01.09.2011, p. 2703-2707.

研究成果: Article

TY - JOUR

T1 - Comment on "Quantum Key Distribution and Quantum Authentication Based on Entangled State"

AU - Wei, Toung Shang

AU - Tsai, Chia Wei

AU - Hwang, Tzone-Lih

PY - 2011/9/1

Y1 - 2011/9/1

N2 - Shi et al. (Phys. Lett. A 281:83-87, 2001) proposed a scheme which allows simultaneous realization of quantum key distribution and quantum authentication. However, this study points out a weakness in Shi et al.'s scheme, in which a malicious user can impersonate a legitimate participant without being detected. Furthermore, an improved scheme is proposed to avoid this weakness.

AB - Shi et al. (Phys. Lett. A 281:83-87, 2001) proposed a scheme which allows simultaneous realization of quantum key distribution and quantum authentication. However, this study points out a weakness in Shi et al.'s scheme, in which a malicious user can impersonate a legitimate participant without being detected. Furthermore, an improved scheme is proposed to avoid this weakness.

UR - http://www.scopus.com/inward/record.url?scp=79960226218&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79960226218&partnerID=8YFLogxK

U2 - 10.1007/s10773-011-0768-0

DO - 10.1007/s10773-011-0768-0

M3 - Article

AN - SCOPUS:79960226218

VL - 50

SP - 2703

EP - 2707

JO - International Journal of Theoretical Physics

JF - International Journal of Theoretical Physics

SN - 0020-7748

IS - 9

ER -