From: Quantum identity authentication based on the extension of quantum rotation
Protocol | Realization method1 | Length of identification code | Quantum bit efficiency (%)2 | Note3 |
---|---|---|---|---|
[38] | Bell states | n | 15 | two-way certification |
[39] | Bell states | 2n | 33.3 | key-update |
[40] | Bell states | 6n | 33.3 | two-way certification |
[41] | Bell states | 2n | ≤88.9 | two-way certification |
[42] | Cluster state | n | 16.7 | two-way certification |
[43] | Cluster state | 4n | 33.3 | – |
[44] | QKD with Mubs | n | 33.3 | – |
[45] | QKD with Mubs | n | 50 | – |
[46] | QKD with Mubs | n | 50 | key-update |
[47] | QKD with Mubs | 9n | ≥45 | key-update |
[48] | QKD with Bell state | 2n | 50 | two-way certification |
[49] | Error avoidance code | n | 25 | – |
[21] | Shared secret | n | 33.3 | key-update |
[50] | QPKC | n | 50 | – |
[29] | Quantum walks | n | −− | two-way certification |
Our | Quantum rotation | n | ≥50 | – |