Quantum Identity-Authentication Scheme Based on Randomly Selected Third-Party

  • Xiaobo Zheng
  • Fuquan Zhang
  • Zhiwen ZhaoEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 891)


In our article we give a scheme to complete identity-authentication by quantum fingerprinting. Our scheme can overcome the vulnerability of one certification authority and tolerate a controlled error. The cost of our scheme is \( {\text{k}}\log_{2} (n) \) for n bit classical identity information while the complexity of quantum circuit in our scheme is also \( {\text{k}}\log_{2} (n) \).


Quantum identity-authentication Quantum fingerprinting 


  1. 1.
    Bryant, W.: Designing an authentication system: a dialogue in four scenes. Project Athena document, February 1988Google Scholar
  2. 2.
    I’Anson, C., Mitchell, C.: Security defects in CCITT recommendation X.509 the directory authentication framework. Computer communications Review, April 1990CrossRefGoogle Scholar
  3. 3.
    Bennett, C.H., Brassard G.: An update on quantum crytography. Advances in Cryptology. In: Proceeding of Crypto 1984, Barbara, pp 475–480. Springer, Heidelberg (1985)Google Scholar
  4. 4.
    Mosca, M., Stebila, D., Ustaoglu, B.: Quantum Key Distribution in the Classical Authenticated Key Exchange Framework, Jun 2012. arXiv:1206.6150v1,27
  5. 5.
    Zeng, G.: Quantum Private Communication, 173 p. Higher Education Press, Beijing (2010)CrossRefGoogle Scholar
  6. 6.
    Buhrman, H., Cleve, R., Watrous, J., de Wolf, R.: Quantum fingerprinting. Phys. Rev. Lett. 87(16), 167902 (2001)CrossRefGoogle Scholar
  7. 7.
    Gottesman, D., Chuang, I.: Quantum digital signatures. Technical Report, Cornell University Library, November 2001. arXiv:quant-ph/0105032
  8. 8.
    Ablayev, F.: Alexander Vasiliev, Quantum Hashing, Oct 2013. arXiv:1310.4922v1,18
  9. 9.
    Koca, C., Akan, O.B.: Quantum Memory Management Systems. ACM (2015). ISBN 9781-4503-3674-1/15/09Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.College of Information and TechnologyBeijing Normal UniversityBeijingChina
  2. 2.Information and Network Management CenterBeijing Information Science and Technology UniversityBeijingChina
  3. 3.School of Computer Science and Technology, Beijing Institute of TechnologyBeijingChina
  4. 4.Fujian Provincial Key Laboratory of Information Processing and Intelligent Control(Minjiang University)FuzhouChina
  5. 5.Beijing Normal UniversityZhuhaiChina

Personalised recommendations