中国物理B ›› 2005, Vol. 14 ›› Issue (3): 541-545.doi: 10.1088/1009-1963/14/3/020

• CLASSICAL AREAS OF PHENOMENOLOGY • 上一篇    下一篇

A quantum identification scheme based on polarization modulation

何广强, 曾贵华   

  1. The State Key Laboratory on Fibre-Optic Local Area Networks and Advanced Optical Communication Systems, Electronic Engineering Department, Shanghai Jiaotong University, Shanghai 200030, China
  • 收稿日期:2004-06-21 修回日期:2004-07-27 出版日期:2005-03-02 发布日期:2005-03-02
  • 基金资助:
    Project supported by the Natural Science Foundation of China (Grant Nos 60102001 and 90104005).

A quantum identification scheme based on polarization modulation

He Guang-Qiang (何广强), Zeng Gui-Hua (曾贵华)   

  1. The State Key Laboratory on Fibre-Optic Local Area Networks and Advanced Optical Communication Systems, Electronic Engineering Department, Shanghai Jiaotong University, Shanghai 200030, China
  • Received:2004-06-21 Revised:2004-07-27 Online:2005-03-02 Published:2005-03-02
  • Supported by:
    Project supported by the Natural Science Foundation of China (Grant Nos 60102001 and 90104005).

摘要: A quantum identification scheme including registration and identification phases is proposed. The users' passwords are transmitted by qubit string and recorded as a set of quantum operators. The security of the proposed scheme is guaranteed by the no-cloning theorem. Based on photon polarization modulation, an experimental approach is also designed to implement our proposed scheme.

Abstract: A quantum identification scheme including registration and identification phases is proposed. The users' passwords are transmitted by qubit string and recorded as a set of quantum operators. The security of the proposed scheme is guaranteed by the no-cloning theorem. Based on photon polarization modulation, an experimental approach is also designed to implement our proposed scheme.

Key words: quantum identification, quantum cryptography, cryptography

中图分类号:  (Quantum cryptography and communication security)

  • 03.67.Dd
03.67.Lx (Quantum computation architectures and implementations)