Skip to main content

Table 3 Comparison of protocol performance

From: Quantum identity authentication based on the extension of quantum rotation

Protocol

Realization method1

Length of identification code

Quantum bit efficiency (%)2

Note3

[38]

Bell states

n

15

two-way certification

[39]

Bell states

2n

33.3

key-update

[40]

Bell states

6n

33.3

two-way certification

[41]

Bell states

2n

≤88.9

two-way certification

[42]

Cluster state

n

16.7

two-way certification

[43]

Cluster state

4n

33.3

–

[44]

QKD with Mubs

n

33.3

–

[45]

QKD with Mubs

n

50

–

[46]

QKD with Mubs

n

50

key-update

[47]

QKD with Mubs

9n

≥45

key-update

[48]

QKD with Bell state

2n

50

two-way certification

[49]

Error avoidance code

n

25

–

[21]

Shared secret

n

33.3

key-update

[50]

QPKC

n

50

–

[29]

Quantum walks

n

−−

two-way certification

Our

Quantum rotation

n

≥50

–

  1. 1 Realization method refers to the most significant quantum resources used by the protocol, and some auxiliary resources are not marked. 2 Quantum bit efficiency stands for the approximate value calculated from the Equation (26) in the ideal state. The quantum bit efficiency of some protocols is variable, and the range is given in this table. Among them, [29] cannot evaluate the quantum bit efficiency due to the use of quantum walks. 3Note denotes additional purposes that can be achieved by QIA protocol. Some protocols enable multi-party authentication. In some protocols, only part of the authentication code changes after each authentication or equivalently achieves key-update, which is also marked as achieving key-update.