Analysis of Counterfactual Quantum Certificate Authorization

A counterfactual quantum certificate authorization protocol was proposed recently (Shenoy et al., Phys. Rev. A 89 , 052307 ( 20 )), in which a trusted third party, Alice, authenticates an entity Bob (e.g., a bank) that a client Charlie wishes to securely transact with. However, this protocol require...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of theoretical physics 2016-12, Vol.55 (12), p.5331-5335
Hauptverfasser: Wang, Tian-Yin, Li, Yan-Ping, Zhang, Rui-Ling
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 5335
container_issue 12
container_start_page 5331
container_title International journal of theoretical physics
container_volume 55
creator Wang, Tian-Yin
Li, Yan-Ping
Zhang, Rui-Ling
description A counterfactual quantum certificate authorization protocol was proposed recently (Shenoy et al., Phys. Rev. A 89 , 052307 ( 20 )), in which a trusted third party, Alice, authenticates an entity Bob (e.g., a bank) that a client Charlie wishes to securely transact with. However, this protocol requires a classical authenticated channel between Bob and Charlie to prevent possible attacks from the third party Alice, which is in conflict with the task of certificate authorization in the sense that Bob and Charlie can establish an unconditionally-secure key by a quantum key distribution protocol if there is a classical authenticated channel between them and hence securely transact with each other even without the assistance of the third party Alice.
doi_str_mv 10.1007/s10773-016-3152-2
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1880839274</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1880839274</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-c3764a64344fc7ddb2b1c5b539c60155fa55f1fc4e828b845a465e0154f6a8203</originalsourceid><addsrcrecordid>eNp1kE9LAzEQxYMoWKsfwNuC5-gkm38LXsqiVSiIoOeQTRPd0m5qkj3UT2_KevDiYWYO897j8UPomsAtAZB3iYCUNQYicE04xfQEzQiXFDdc8lM0A6CApWTqHF2ktAGABpiaofvFYLaH1Kcq-KoN45Bd9Mbm0Wyr19EMedxVrYu597012VWLMX-G2H-b3IfhEp15s03u6vfO0fvjw1v7hFcvy-d2scK2JiKXLQUzgtWMeSvX6452xPKO140VQDj3pgzxljlFVacYN0xwVz7MC6Mo1HN0M-XuY_gaXcp6E8ZYiidNlAJVN1SyoiKTysaQUnRe72O_M_GgCegjJD1B0gWSPkLStHjo5ElFO3y4-Cf5X9MPF71pEw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1880839274</pqid></control><display><type>article</type><title>Analysis of Counterfactual Quantum Certificate Authorization</title><source>SpringerNature Journals</source><creator>Wang, Tian-Yin ; Li, Yan-Ping ; Zhang, Rui-Ling</creator><creatorcontrib>Wang, Tian-Yin ; Li, Yan-Ping ; Zhang, Rui-Ling</creatorcontrib><description>A counterfactual quantum certificate authorization protocol was proposed recently (Shenoy et al., Phys. Rev. A 89 , 052307 ( 20 )), in which a trusted third party, Alice, authenticates an entity Bob (e.g., a bank) that a client Charlie wishes to securely transact with. However, this protocol requires a classical authenticated channel between Bob and Charlie to prevent possible attacks from the third party Alice, which is in conflict with the task of certificate authorization in the sense that Bob and Charlie can establish an unconditionally-secure key by a quantum key distribution protocol if there is a classical authenticated channel between them and hence securely transact with each other even without the assistance of the third party Alice.</description><identifier>ISSN: 0020-7748</identifier><identifier>EISSN: 1572-9575</identifier><identifier>DOI: 10.1007/s10773-016-3152-2</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Authentication ; Elementary Particles ; Mathematical and Computational Physics ; Physics ; Physics and Astronomy ; Protocol (computers) ; Quantum cryptography ; Quantum Field Theory ; Quantum Physics ; Theoretical ; Third party ; Trusted third parties</subject><ispartof>International journal of theoretical physics, 2016-12, Vol.55 (12), p.5331-5335</ispartof><rights>Springer Science+Business Media New York 2016</rights><rights>Copyright Springer Science &amp; Business Media 2016</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-c3764a64344fc7ddb2b1c5b539c60155fa55f1fc4e828b845a465e0154f6a8203</citedby><cites>FETCH-LOGICAL-c316t-c3764a64344fc7ddb2b1c5b539c60155fa55f1fc4e828b845a465e0154f6a8203</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s10773-016-3152-2$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s10773-016-3152-2$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Wang, Tian-Yin</creatorcontrib><creatorcontrib>Li, Yan-Ping</creatorcontrib><creatorcontrib>Zhang, Rui-Ling</creatorcontrib><title>Analysis of Counterfactual Quantum Certificate Authorization</title><title>International journal of theoretical physics</title><addtitle>Int J Theor Phys</addtitle><description>A counterfactual quantum certificate authorization protocol was proposed recently (Shenoy et al., Phys. Rev. A 89 , 052307 ( 20 )), in which a trusted third party, Alice, authenticates an entity Bob (e.g., a bank) that a client Charlie wishes to securely transact with. However, this protocol requires a classical authenticated channel between Bob and Charlie to prevent possible attacks from the third party Alice, which is in conflict with the task of certificate authorization in the sense that Bob and Charlie can establish an unconditionally-secure key by a quantum key distribution protocol if there is a classical authenticated channel between them and hence securely transact with each other even without the assistance of the third party Alice.</description><subject>Authentication</subject><subject>Elementary Particles</subject><subject>Mathematical and Computational Physics</subject><subject>Physics</subject><subject>Physics and Astronomy</subject><subject>Protocol (computers)</subject><subject>Quantum cryptography</subject><subject>Quantum Field Theory</subject><subject>Quantum Physics</subject><subject>Theoretical</subject><subject>Third party</subject><subject>Trusted third parties</subject><issn>0020-7748</issn><issn>1572-9575</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNp1kE9LAzEQxYMoWKsfwNuC5-gkm38LXsqiVSiIoOeQTRPd0m5qkj3UT2_KevDiYWYO897j8UPomsAtAZB3iYCUNQYicE04xfQEzQiXFDdc8lM0A6CApWTqHF2ktAGABpiaofvFYLaH1Kcq-KoN45Bd9Mbm0Wyr19EMedxVrYu597012VWLMX-G2H-b3IfhEp15s03u6vfO0fvjw1v7hFcvy-d2scK2JiKXLQUzgtWMeSvX6452xPKO140VQDj3pgzxljlFVacYN0xwVz7MC6Mo1HN0M-XuY_gaXcp6E8ZYiidNlAJVN1SyoiKTysaQUnRe72O_M_GgCegjJD1B0gWSPkLStHjo5ElFO3y4-Cf5X9MPF71pEw</recordid><startdate>20161201</startdate><enddate>20161201</enddate><creator>Wang, Tian-Yin</creator><creator>Li, Yan-Ping</creator><creator>Zhang, Rui-Ling</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20161201</creationdate><title>Analysis of Counterfactual Quantum Certificate Authorization</title><author>Wang, Tian-Yin ; Li, Yan-Ping ; Zhang, Rui-Ling</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-c3764a64344fc7ddb2b1c5b539c60155fa55f1fc4e828b845a465e0154f6a8203</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Authentication</topic><topic>Elementary Particles</topic><topic>Mathematical and Computational Physics</topic><topic>Physics</topic><topic>Physics and Astronomy</topic><topic>Protocol (computers)</topic><topic>Quantum cryptography</topic><topic>Quantum Field Theory</topic><topic>Quantum Physics</topic><topic>Theoretical</topic><topic>Third party</topic><topic>Trusted third parties</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wang, Tian-Yin</creatorcontrib><creatorcontrib>Li, Yan-Ping</creatorcontrib><creatorcontrib>Zhang, Rui-Ling</creatorcontrib><collection>CrossRef</collection><jtitle>International journal of theoretical physics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Wang, Tian-Yin</au><au>Li, Yan-Ping</au><au>Zhang, Rui-Ling</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Analysis of Counterfactual Quantum Certificate Authorization</atitle><jtitle>International journal of theoretical physics</jtitle><stitle>Int J Theor Phys</stitle><date>2016-12-01</date><risdate>2016</risdate><volume>55</volume><issue>12</issue><spage>5331</spage><epage>5335</epage><pages>5331-5335</pages><issn>0020-7748</issn><eissn>1572-9575</eissn><abstract>A counterfactual quantum certificate authorization protocol was proposed recently (Shenoy et al., Phys. Rev. A 89 , 052307 ( 20 )), in which a trusted third party, Alice, authenticates an entity Bob (e.g., a bank) that a client Charlie wishes to securely transact with. However, this protocol requires a classical authenticated channel between Bob and Charlie to prevent possible attacks from the third party Alice, which is in conflict with the task of certificate authorization in the sense that Bob and Charlie can establish an unconditionally-secure key by a quantum key distribution protocol if there is a classical authenticated channel between them and hence securely transact with each other even without the assistance of the third party Alice.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s10773-016-3152-2</doi><tpages>5</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0020-7748
ispartof International journal of theoretical physics, 2016-12, Vol.55 (12), p.5331-5335
issn 0020-7748
1572-9575
language eng
recordid cdi_proquest_journals_1880839274
source SpringerNature Journals
subjects Authentication
Elementary Particles
Mathematical and Computational Physics
Physics
Physics and Astronomy
Protocol (computers)
Quantum cryptography
Quantum Field Theory
Quantum Physics
Theoretical
Third party
Trusted third parties
title Analysis of Counterfactual Quantum Certificate Authorization
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T18%3A35%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Analysis%20of%20Counterfactual%20Quantum%20Certificate%20Authorization&rft.jtitle=International%20journal%20of%20theoretical%20physics&rft.au=Wang,%20Tian-Yin&rft.date=2016-12-01&rft.volume=55&rft.issue=12&rft.spage=5331&rft.epage=5335&rft.pages=5331-5335&rft.issn=0020-7748&rft.eissn=1572-9575&rft_id=info:doi/10.1007/s10773-016-3152-2&rft_dat=%3Cproquest_cross%3E1880839274%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1880839274&rft_id=info:pmid/&rfr_iscdi=true