Secure communication has achieved a new dimension with the advent of the schemes of quantum key distribution (QKD) as in contrast to classical cryptography, quantum cryptography can provide unconditional security. However, a successful implementation of a scheme of QKD requires identity authentication as a prerequisite. A security loophole in the identity authentication scheme may lead to the vulnerability of the entire secure communication scheme. Consequently, identity authentication is extremely important and in the last three decades several schemes for identity authentication, using quantum resources have been proposed. The chronological development of these protocols, which are now referred to as quantum identity authentication (QIA) protocols, are briefly reviewed here with specific attention to the causal connection involved in their development. The existing protocols are classified on the basis of the required quantum resources and their relative merits and demerits are analyzed. Further, in the process of the classification of the protocols for QIA, it's observed that the existing protocols can also be classified in a few groups based on the inherent computational tasks used to design the protocols. Realization of these symmetries has led to the possibility of designing a set of new protocols for quantum identity authentication, which are based on the existing schemes of the secure computational and communication tasks. The security of such protocols is also critically analyzed.
翻译:随着量子钥匙分配办法(QKD)的出现,与古典的加密法相比,量子加密法可以提供无条件的安全;然而,一项QKD办法的成功实施需要身份认证作为先决条件;身份认证办法的安全漏洞可能导致整个安全通信办法的脆弱性;因此,身份认证极为重要,在过去三十年中,提出了利用量子资源进行身份认证的若干办法;这些议定书(现称为量子身份认证(QIA)规程)的按时间顺序拟订,在此简要审查这些议定书的拟订,其中特别注意其发展过程中所涉及的因果关系;现有规程的分类以所需的量子资源为基础,并分析其相对优点和性能;此外,在对QIA规程进行分类的过程中,发现现有规程也可根据设计协议的内在计算任务分为几个组;实现这些配对已导致有可能设计一套量子身份认证的新规程,这些规程也以现有的安全协议为基础。