Skip to main content

Table 2 Comparison between the proposed and existing QMA schemes

From: Quantum authentication method based on key-controlled maximally mixed quantum state encryption

 

QMA [22]

QR QMA [23]

QMA [25]

Our scheme

Quantum source

2N single qubits,

N Bell states

N single qubits

2N single qubits

N single qubits

Quantum operation

2N single unitary operation

2N controlled operation,

N/2 swap operation

4N single rotation operation,

2N single Pauli operation

N single rotation operation

Measurement

N single qubit measurement

N single qubit measurement

N swap test

N single qubit measurement

Number of quantum transmission

N times

N times

3N times

N times

Decoy state

O

X

X

  1. : Not used, but required to verify the security of quantum channels