Figure 2From: Quantum authentication method based on key-controlled maximally mixed quantum state encryptionSchematic representation of QIA. When Alice requests authentication, Bob generates a challenge qubit and sends it to Alice. Alice then generates a legitimate response qubit and sends it to Bob to complete the identity authentication processBack to article page