In this paper, a quantum identity authentication protocol is presented based on the counterfactual quantum key distribution system. Utilizing the proposed protocol, two participants can verify each other's identity through the counterfactual quantum communication system. The security of the protocol is proved against individual attacks. Furthermore, according to the characteristics of the counterfactual quantum key distribution system, we propose an authenticated counterfactual quantum key distribution protocol based on a novel strategy of mixing the two types of quantum cryptographic protocols randomly. The authenticated quantum key distribution can also be used to update the extent of the authentication keys.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC7515006 | PMC |
http://dx.doi.org/10.3390/e21050518 | DOI Listing |
PLoS Comput Biol
June 2024
Department of Mathematics and Systems Analysis, Aalto University, Espoo, Finland.
Restrictions of cross-border mobility are typically used to prevent an emerging disease from entering a country in order to slow down its spread. However, such interventions can come with a significant societal cost and should thus be based on careful analysis and quantitative understanding on their effects. To this end, we model the influence of cross-border mobility on the spread of COVID-19 during 2020 in the neighbouring Nordic countries of Denmark, Finland, Norway and Sweden.
View Article and Find Full Text PDFACS Nano
June 2024
The Molecular Foundry, Lawrence Berkeley National Laboratory, Berkeley, California 94720, United States.
Ligands play a critical role in the optical properties and chemical stability of colloidal nanocrystals (NCs), but identifying ligands that can enhance NC properties is daunting, given the high dimensionality of chemical space. Here, we use machine learning (ML) and robotic screening to accelerate the discovery of ligands that enhance the photoluminescence quantum yield (PLQY) of CsPbBr perovskite NCs. We developed a ML model designed to predict the relative PL enhancement of perovskite NCs when coordinated with a ligand selected from a pool of 29,904 candidate molecules.
View Article and Find Full Text PDFEntropy (Basel)
September 2023
Department of Psychological Sciences, Purdue University, West Lafayette, IN 47907, USA.
Counterfactual definiteness (CFD) means that if some property is measured in some context, then the outcome of the measurement would have been the same had this property been measured in a different context. A context includes all other measurements made together with the one in question, and the spatiotemporal relations among them. The proviso for CFD is non-disturbance: any physical influence of the contexts on the property being measured is excluded by the laws of nature, so that no one measuring this property has a way of ascertaining its context.
View Article and Find Full Text PDFHeliyon
February 2023
China Information Technology Security Evaluation Center, Beijing 100085, China.
Compared with the traditional BB84 protocol, the counterfactual quantum key distribution (QKD) does not rely on any signal travelling in the quantum channel, and therefore can present a security advantage where Eve cannot fully access signal. However, the practical system may be damaged in a scenario where the devices are untrusted. In this paper, we analyze the security of counterfactual QKD in untrusted detectors scenario.
View Article and Find Full Text PDFSensors (Basel)
October 2022
Department of Electronics and Information Convergence Engineering, Kyung Hee University, Yongin 17104, Korea.
Hiding the identity of involved participants in the network, known as anonymity, is a crucial issue in some cryptographic applications such as electronic voting systems, auctions, digital signatures, and Byzantine agreements. This paper proposes a new anonymous quantum teleportation protocol based on counterfactual communication where no information-carrying particles pass through the channel. It is achieved by the distribution of a counterfactual entanglement among the participants in the network followed by the establishment of an anonymous entanglement between the sender and the receiver.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!