Cross-center quantum identification scheme based on teleportation and entanglement swapping

2005 ◽  
Vol 254 (4-6) ◽  
pp. 380-388 ◽  
Author(s):  
Nanrun Zhou ◽  
Guihua Zeng ◽  
Wenjie Zeng ◽  
Fuchen Zhu
2010 ◽  
Vol 39 (9) ◽  
pp. 1616-1620 ◽  
Author(s):  
李渊华 LI Yuan-hua ◽  
刘俊昌 LIU Jun-chang ◽  
聂义友 NIE Yi-you

2009 ◽  
Vol 29 (7) ◽  
pp. 1779-1781
Author(s):  
Lian-hao LIU ◽  
Bu-yun QU

2015 ◽  
Vol 3 (2) ◽  
Author(s):  
Reza Alimoradi

The goal of an identification procedure is access control. Methods that permit an identification are called identification protocols. In this paper, first we introduced quaternion numbers. In addition we proposed a new identification scheme based on quaternions. Finally, the security of our scheme is analyzed.


Sign in / Sign up

Export Citation Format

Share Document