Mobile Networks and Management. 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedings

Research Article

Quantum Authentication Scheme Based on Fingerprint-Encoded Graph States

  • @INPROCEEDINGS{10.1007/978-3-319-90775-8_14,
        author={Fei Li and Ying Guo and Jiankun Hu},
        title={Quantum Authentication Scheme Based on Fingerprint-Encoded Graph States},
        proceedings={Mobile Networks and Management. 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedings},
        proceedings_a={MONAMI},
        year={2018},
        month={5},
        keywords={Fingerprint Graph state Authentication Security Quantum cryptography},
        doi={10.1007/978-3-319-90775-8_14}
    }
    
  • Fei Li
    Ying Guo
    Jiankun Hu
    Year: 2018
    Quantum Authentication Scheme Based on Fingerprint-Encoded Graph States
    MONAMI
    Springer
    DOI: 10.1007/978-3-319-90775-8_14
Fei Li1, Ying Guo1,*, Jiankun Hu2
  • 1: Central South University
  • 2: University of New South Wales at Australian Defence Force Academy
*Contact email: yingguo@csu.edu.cn

Abstract

We demonstrate an improved quantum authentication scheme which involves fingerprint recognition and quantum authentication. This scheme is designed to solve the practical problem in knowledge-based quantum authentication systems. It can satisfy the requirement of secure remote communication by using fingerprint-encoded graph states. The encoded graph states, which determine the preferred legitimate participants in the deterministic network, enable the facility of the implementable fingerprint-based authentication. The fingerprint template used for authentication in this scheme is of revocability and diversity. Security analysis shows that the proposed scheme can effectively defend various attacks including forgery attack, intercept-resend attack and man-in-the-middle attack. What’s more, this novel scheme takes advantages of the merits in terms of both fingerprint recognition and quantum authentication, rendering it more secure, convenient and practical for users than its original counterpart, knowledge-based quantum authentication.