Figure 6From: Quantum authentication method based on key-controlled maximally mixed quantum state encryptionSchematic representation of QMA. Alice generates a QMAC corresponding to the message and sends them to Bob. Bob verifies the QMAC using the message to complete the message authentication processBack to article page