Analysis of Counterfactual Quantum Certificate Authorization
A counterfactual quantum certificate authorization protocol was proposed recently (Shenoy et al., Phys. Rev. A 89 , 052307 ( 20 )), in which a trusted third party, Alice, authenticates an entity Bob (e.g., a bank) that a client Charlie wishes to securely transact with. However, this protocol require...
Gespeichert in:
Veröffentlicht in: | International journal of theoretical physics 2016-12, Vol.55 (12), p.5331-5335 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 5335 |
---|---|
container_issue | 12 |
container_start_page | 5331 |
container_title | International journal of theoretical physics |
container_volume | 55 |
creator | Wang, Tian-Yin Li, Yan-Ping Zhang, Rui-Ling |
description | A counterfactual quantum certificate authorization protocol was proposed recently (Shenoy et al., Phys. Rev. A
89
, 052307 (
20
)), in which a trusted third party, Alice, authenticates an entity Bob (e.g., a bank) that a client Charlie wishes to securely transact with. However, this protocol requires a classical authenticated channel between Bob and Charlie to prevent possible attacks from the third party Alice, which is in conflict with the task of certificate authorization in the sense that Bob and Charlie can establish an unconditionally-secure key by a quantum key distribution protocol if there is a classical authenticated channel between them and hence securely transact with each other even without the assistance of the third party Alice. |
doi_str_mv | 10.1007/s10773-016-3152-2 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1880839274</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1880839274</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-c3764a64344fc7ddb2b1c5b539c60155fa55f1fc4e828b845a465e0154f6a8203</originalsourceid><addsrcrecordid>eNp1kE9LAzEQxYMoWKsfwNuC5-gkm38LXsqiVSiIoOeQTRPd0m5qkj3UT2_KevDiYWYO897j8UPomsAtAZB3iYCUNQYicE04xfQEzQiXFDdc8lM0A6CApWTqHF2ktAGABpiaofvFYLaH1Kcq-KoN45Bd9Mbm0Wyr19EMedxVrYu597012VWLMX-G2H-b3IfhEp15s03u6vfO0fvjw1v7hFcvy-d2scK2JiKXLQUzgtWMeSvX6452xPKO140VQDj3pgzxljlFVacYN0xwVz7MC6Mo1HN0M-XuY_gaXcp6E8ZYiidNlAJVN1SyoiKTysaQUnRe72O_M_GgCegjJD1B0gWSPkLStHjo5ElFO3y4-Cf5X9MPF71pEw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1880839274</pqid></control><display><type>article</type><title>Analysis of Counterfactual Quantum Certificate Authorization</title><source>SpringerNature Journals</source><creator>Wang, Tian-Yin ; Li, Yan-Ping ; Zhang, Rui-Ling</creator><creatorcontrib>Wang, Tian-Yin ; Li, Yan-Ping ; Zhang, Rui-Ling</creatorcontrib><description>A counterfactual quantum certificate authorization protocol was proposed recently (Shenoy et al., Phys. Rev. A
89
, 052307 (
20
)), in which a trusted third party, Alice, authenticates an entity Bob (e.g., a bank) that a client Charlie wishes to securely transact with. However, this protocol requires a classical authenticated channel between Bob and Charlie to prevent possible attacks from the third party Alice, which is in conflict with the task of certificate authorization in the sense that Bob and Charlie can establish an unconditionally-secure key by a quantum key distribution protocol if there is a classical authenticated channel between them and hence securely transact with each other even without the assistance of the third party Alice.</description><identifier>ISSN: 0020-7748</identifier><identifier>EISSN: 1572-9575</identifier><identifier>DOI: 10.1007/s10773-016-3152-2</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Authentication ; Elementary Particles ; Mathematical and Computational Physics ; Physics ; Physics and Astronomy ; Protocol (computers) ; Quantum cryptography ; Quantum Field Theory ; Quantum Physics ; Theoretical ; Third party ; Trusted third parties</subject><ispartof>International journal of theoretical physics, 2016-12, Vol.55 (12), p.5331-5335</ispartof><rights>Springer Science+Business Media New York 2016</rights><rights>Copyright Springer Science & Business Media 2016</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-c3764a64344fc7ddb2b1c5b539c60155fa55f1fc4e828b845a465e0154f6a8203</citedby><cites>FETCH-LOGICAL-c316t-c3764a64344fc7ddb2b1c5b539c60155fa55f1fc4e828b845a465e0154f6a8203</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s10773-016-3152-2$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s10773-016-3152-2$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Wang, Tian-Yin</creatorcontrib><creatorcontrib>Li, Yan-Ping</creatorcontrib><creatorcontrib>Zhang, Rui-Ling</creatorcontrib><title>Analysis of Counterfactual Quantum Certificate Authorization</title><title>International journal of theoretical physics</title><addtitle>Int J Theor Phys</addtitle><description>A counterfactual quantum certificate authorization protocol was proposed recently (Shenoy et al., Phys. Rev. A
89
, 052307 (
20
)), in which a trusted third party, Alice, authenticates an entity Bob (e.g., a bank) that a client Charlie wishes to securely transact with. However, this protocol requires a classical authenticated channel between Bob and Charlie to prevent possible attacks from the third party Alice, which is in conflict with the task of certificate authorization in the sense that Bob and Charlie can establish an unconditionally-secure key by a quantum key distribution protocol if there is a classical authenticated channel between them and hence securely transact with each other even without the assistance of the third party Alice.</description><subject>Authentication</subject><subject>Elementary Particles</subject><subject>Mathematical and Computational Physics</subject><subject>Physics</subject><subject>Physics and Astronomy</subject><subject>Protocol (computers)</subject><subject>Quantum cryptography</subject><subject>Quantum Field Theory</subject><subject>Quantum Physics</subject><subject>Theoretical</subject><subject>Third party</subject><subject>Trusted third parties</subject><issn>0020-7748</issn><issn>1572-9575</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNp1kE9LAzEQxYMoWKsfwNuC5-gkm38LXsqiVSiIoOeQTRPd0m5qkj3UT2_KevDiYWYO897j8UPomsAtAZB3iYCUNQYicE04xfQEzQiXFDdc8lM0A6CApWTqHF2ktAGABpiaofvFYLaH1Kcq-KoN45Bd9Mbm0Wyr19EMedxVrYu597012VWLMX-G2H-b3IfhEp15s03u6vfO0fvjw1v7hFcvy-d2scK2JiKXLQUzgtWMeSvX6452xPKO140VQDj3pgzxljlFVacYN0xwVz7MC6Mo1HN0M-XuY_gaXcp6E8ZYiidNlAJVN1SyoiKTysaQUnRe72O_M_GgCegjJD1B0gWSPkLStHjo5ElFO3y4-Cf5X9MPF71pEw</recordid><startdate>20161201</startdate><enddate>20161201</enddate><creator>Wang, Tian-Yin</creator><creator>Li, Yan-Ping</creator><creator>Zhang, Rui-Ling</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20161201</creationdate><title>Analysis of Counterfactual Quantum Certificate Authorization</title><author>Wang, Tian-Yin ; Li, Yan-Ping ; Zhang, Rui-Ling</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-c3764a64344fc7ddb2b1c5b539c60155fa55f1fc4e828b845a465e0154f6a8203</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Authentication</topic><topic>Elementary Particles</topic><topic>Mathematical and Computational Physics</topic><topic>Physics</topic><topic>Physics and Astronomy</topic><topic>Protocol (computers)</topic><topic>Quantum cryptography</topic><topic>Quantum Field Theory</topic><topic>Quantum Physics</topic><topic>Theoretical</topic><topic>Third party</topic><topic>Trusted third parties</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wang, Tian-Yin</creatorcontrib><creatorcontrib>Li, Yan-Ping</creatorcontrib><creatorcontrib>Zhang, Rui-Ling</creatorcontrib><collection>CrossRef</collection><jtitle>International journal of theoretical physics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Wang, Tian-Yin</au><au>Li, Yan-Ping</au><au>Zhang, Rui-Ling</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Analysis of Counterfactual Quantum Certificate Authorization</atitle><jtitle>International journal of theoretical physics</jtitle><stitle>Int J Theor Phys</stitle><date>2016-12-01</date><risdate>2016</risdate><volume>55</volume><issue>12</issue><spage>5331</spage><epage>5335</epage><pages>5331-5335</pages><issn>0020-7748</issn><eissn>1572-9575</eissn><abstract>A counterfactual quantum certificate authorization protocol was proposed recently (Shenoy et al., Phys. Rev. A
89
, 052307 (
20
)), in which a trusted third party, Alice, authenticates an entity Bob (e.g., a bank) that a client Charlie wishes to securely transact with. However, this protocol requires a classical authenticated channel between Bob and Charlie to prevent possible attacks from the third party Alice, which is in conflict with the task of certificate authorization in the sense that Bob and Charlie can establish an unconditionally-secure key by a quantum key distribution protocol if there is a classical authenticated channel between them and hence securely transact with each other even without the assistance of the third party Alice.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s10773-016-3152-2</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0020-7748 |
ispartof | International journal of theoretical physics, 2016-12, Vol.55 (12), p.5331-5335 |
issn | 0020-7748 1572-9575 |
language | eng |
recordid | cdi_proquest_journals_1880839274 |
source | SpringerNature Journals |
subjects | Authentication Elementary Particles Mathematical and Computational Physics Physics Physics and Astronomy Protocol (computers) Quantum cryptography Quantum Field Theory Quantum Physics Theoretical Third party Trusted third parties |
title | Analysis of Counterfactual Quantum Certificate Authorization |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T18%3A35%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Analysis%20of%20Counterfactual%20Quantum%20Certificate%20Authorization&rft.jtitle=International%20journal%20of%20theoretical%20physics&rft.au=Wang,%20Tian-Yin&rft.date=2016-12-01&rft.volume=55&rft.issue=12&rft.spage=5331&rft.epage=5335&rft.pages=5331-5335&rft.issn=0020-7748&rft.eissn=1572-9575&rft_id=info:doi/10.1007/s10773-016-3152-2&rft_dat=%3Cproquest_cross%3E1880839274%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1880839274&rft_id=info:pmid/&rfr_iscdi=true |