Skip to main content

Table 1 Comparison between the proposed and existing QIA schemes

From: Quantum authentication method based on key-controlled maximally mixed quantum state encryption

 

CMQIA [16]

QIA [21]

DSQC QIA [17]

Our scheme

Method

Password

Challenge-response

Password

Challenge-response

Quantum source

2N GHZ-like states

2N single qubits

2N Bell states

N single qubits

Quantum operation

N Pauli operation

4N single rotation operation

N CNOT operation,

2N Pauli operation

N single rotation operation

Measurement

2N single qubit measurement,

2N Bell state measurement

N swap test

N single qubit measurement,

2N Bell state measurement

N single qubit measurement

Number of quantum transmission

4N times

4N times

2N times

2N times

Decoy state

O

O

O

X