[1] Das M L, Saxena A, Gulati V P. A dynamic ID-based remote user authentication scheme[J]. IEEE Transactions on Consumer Electronics, 2004, 50(2): 629-631.[2] David M R, Mihir B, David N, et al. HOTP an HMAC-based one-time password algorithm[S/OL]. RFC 4226, 2005.[2012-01-03]. https://rsync.tools.ietf.org/html/rfc4226.[3] Shi B S, Li J, Liu J M, et al. Quantum key distribution and quantum authentication based on entangled state[J]. Physics Letters A, 2001, 281: 83-87.[4] Mihara T. Quantum identification schemes with entanglements[J]. Physical Review A, 2002, 65(5): 052326/1-4.[5] Wang J, Zhang Q, Tang C J. Multiparty simultaneous quantum identity authentication based on entanglement swapping[J]. Chinese Physics Letters, 2006, 23: 2360-2363.[6] Biham E, Huttner B, Mor T. Quantum cryptographic network based on quantum memories[J]. Physical Review A, 1996, 54(4): 2651-2658.[7] Gao F, Qin S J, Guo F Z, et al. Cryptanalysis of quantum secure direct communication and authentication scheme via bell states[J]. Chinese Physics Letters, 2011, 28(2):020303/1-4.[8] Yang Y G, Wen Q Y. Economical multiparty simultaneous quantum identity authentication based on Greenberger-Horne-Zeilinger states[J]. Chinese Physics B, 2009, 18(08): 3233-3237.[9] Dusek M, Haderka O, Hendrych M, et al. Quantum identification system[J]. Physical Review A, 1999, 60(1): 149-156.[10] Zeng G H, Zhang W P. Identity verification in quantum key distribution[J]. Physical Review A, 2000, 61: 022305/1-5.[11] Shi B S, Li J, Liu J M, et al. Quantum direct communication with authentication[J]. Physical Review A, 2006, 73: 042305/1-5.[12] Ljunggren D, Bourennane M, Karlsson A. Authority-based user authentication in quantum key distribution[J]. Physical Review A, 2000, 62: 022305/1-7.[13] He G Q, Zeng G H. A quantum identification scheme based on polarization modulation[J]. Chinese Physics B, 2005, 14(03): 541-545.[14] Zhang Z S, Zeng G H, Zhou N R, et al. Quantum identity authentication based on ping-pong technique for photons[J]. Physics Letters A, 2006, 356:199-205.[15] Lee H, Lim J, Yang H. Quantum direct communication with authentication[J]. Physical Review A, 2006, 73: 042305/1-5.[16] Curty M, Santos D J, Perez E, et al. Qubit authentication[J]. Physical Review A, 2002, 66: 022301/1-7.[17] Wang T Y, Wen Q Y, Zhu F C. Secure authentication of classical messages with single photons[J]. Chinese Physics B, 2009, 18(08): 3189-3192.[18] Pan J Y, Yang L. Quantum identification based on one-time pad[J]. Journal of Graduate University of Chinese Academy of Sciences, 2012, 29(2): 277-281(in Chinese). 潘江游, 杨理. 基于一次一密的量子身份识别方案[J]. 中国科学院研究生院学报, 2012, 29(2): 277-281.[19] Fujiwara A. Quantum channel identification problem[J]. Physical Review A, 2001, 63: 042304/1-4.[20] Zeng G H. Quantum authentication without lost of quantum channel[C]//ChinCrypt'2004. Wuxi:Science Press, 2004: 141-146.[21] Bennett C H, Brassard G. Quantum cryptography: public-key distribution and coin tossing[C]//Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing. New York:IEEE,1984: 175-179.[22] Long G L, Liu X S. Theoretically efficient high capacity quantum key distribution scheme[J]. Physical Review A, 2002, 65(3): 032302/1-3.[23] Williamson M, Vlatkovedral. Eavesdropping on practical quantum cryptography[J]. Journal of Modern Optics, 2003, 50(13): 1989-2011.[24] Yang L, Wu L A, Liu S H. On the Breidbart eavesdropping problem of the extended BB84 QKD protocol [J]. Acta Physica Sinica, 2002, 51(5): 0961-0965 (in Chinese). 杨理, 吴令安, 刘颂豪. QKD扩展BB84协议的Breidbart基窃听问题[J]. 物理学报, 2002, 51(5): 0961-0965. |