Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2005, Vol. 28 ›› Issue (1): 92-95.doi: 10.13190/jbupt.200501.92.dujzh

• Reports • Previous Articles     Next Articles

Identity Verification in Quantum Key Distribution for Resisting Attack of Multi-Time Interceptions

DU Jian-zhong, ZHU Fu-chen   

  1. 1. School of Science, Beijing University of Posts and Telecommunications, Beijing 100876, China;
    2. State Key Laboratory of Integrated Services Network, Xidian University, Xi'an 710071, China;
    3. State Key Laboratory of Modern Communications, Chengdu 610041, China
  • Online:2005-02-28 Published:2005-02-28

Abstract:

The attack of multi-time interceptions must be considered in the protocols of quantum identity verification, though it makes no sense in its classical counterpart. By this means, an active attacker could precisely obtain the state of the particle carrying the identity verification information, when he measured enough copies of the particle. So the two protocols released lately by Daniel Ljunggren et al and Zeng Guihua et al respectively could be broken. Based on the pseudorandom bit generator with time parameters and the verification keys, the identity verification protocol in quantum key distribution proposed can avoid the attack because the attacker has to intercept exponential times in the length of time parameters to obtain just one copy of a particle.

Key words: quantum cryptography, identity verification, interception attack

CLC Number: