搜索

x

留言板

姓名
邮箱
手机号码
标题
留言内容
验证码

引用本文:
Citation:

王兴福, 郑艳艳, 顾世浦, 张琦, 钟伟, 杜明明, 李喜云, 沈淑婷, 张安蕾, 周澜, 盛宇波
cstr: 32037.14.aps.74.20250920

Latest research progress of quantum identity authentication

WANG Xingfu, ZHENG Yanyan, GU Shipu, ZHANG Qi, ZHONG Wei, DU Mingming, LI Xiyun, SHEN Shuting, ZHANG Anlei, ZHOU Lan, SHENG Yubo
cstr: 32037.14.aps.74.20250920
Article Text (iFLYTEK Translation)
PDF
HTML
导出引用
在线预览
  • 量子通信具有感知窃听的功能, 这是其区别于经典通信而独有的优势, 能够为信息安全提供新的保障. 在实际应用中, 量子通信具有绝对安全性的前提是所有通信方均是合法通信方, 然而, 这在实际通信环境中难以保证, 为量子保密通信带来安全性隐患. 因此, 在通信之前对通信方进行身份认证具有重要意义. 量子身份认证利用量子力学基本原理在通信方之间实现单向或双向身份认证, 并能确保身份认证码的绝对安全, 在量子通信领域具有重要的研究价值. 本文系统地梳理了量子身份认证协议的研究历程, 根据所需的不同量子资源对基于单光子、纠缠态、连续变量、混合型变量的量子身份认证协议进行介绍, 又根据身份认证过程中使用的量子协议类型, 介绍了基于量子密钥分发、量子安全直接通信、量子隐形传态以及乒乓协议框架的量子身份认证协议, 并分析各类协议在效率、安全性及实用化方面的优缺点. 最后, 详细地介绍了最新的量子身份认证协议——基于GHZ态的多方同步身份认证协议以及具有身份认证功能的极化-空间超编码的三方量子安全直接通信协议, 并对量子身份认证的未来发展方向以及在量子通信领域的应用潜力进行展望. 本综述可为未来量子身份认证的实用化发展提供理论支持.
    The absolute security of quantum communication protocols relies on a critical premise: all participating parties are legitimate users. Ensuring the legitimacy of participant identities is paramount in complex real-world communication environments. Quantum identity authentication (QIA), in which fundamental principles of quantum mechanics are used to achieve unilateral or mutual authentication between communicating parties, constitutes an indispensable core component for building a comprehensive quantum secure communication system. It holds significant research value in the field of quantum communication.This review employs a comparative classification method to systematically outline the research trajectory of QIA protocols. By categorizing protocols based on the required quantum resources and the types of quantum protocols employed, the advantages and disadvantages of various categories are analyzed in terms of efficiency, security, and practicality. Single-photon protocols require low resources, and they are easy to implement, and compatible with existing optical components, but require high-efficiency single-photon detectors and exhibit weak noise resistance. Entangled-state protocols offer high security and strong resistance to eavesdropping, particularly suitable for long-distance or multi-party authentication. However, they greatly depend on the preparation and maintenance of high-precision, stable multi-particle entanglement sources, resulting in high experimental complexity. Continuous-variable (CV) protocols achieve high transmission efficiency in short-distance metropolitan area networks and are compatible with classical optical communication equipment, making experiments relatively straightforward. Yet, they require high-precision modulation technology and are sensitive to channel loss. Hybrid protocols aim to balance resource efficiency and security while reducing reliance on a single quantum source, but their design is complex and may introduce new attack vectors. Quantum key distribution (QKD) framework protocols embed identity authentication in the key distribution process, making them suitable for scenarios requiring long-term secure key distribution, although they often depend on pre-shared keys or trusted third parties. Quantum secure direct communication (QSDC) framework protocols integrate authentication with secure direct information transmission, offering high efficiency for real-time communication, but requiring high channel quality. Measurement-device-independent QSDC (MDI-QSDC) represents a key development direction that can resist attacks on measurement devices. Quantum teleportation (QT) framework protocols achieves cross-node authentication and unconditional security, making it suitable for quantum relay networks despite its high experimental complexity. The entanglement swapping framework protocol can resist conspiracy attacks and is suitable for multi-party joint scenarios, but it consumes a lot of resources and relies on trusted third party. Ping-pong protocol framework supports dynamic key updates and exhibits strong resistance to eavesdropping, making it suitable for temporary authentication on mobile terminals, although it typically only supports unilateral authentication and requires a bidirectional channel.Subsequently, this review details the latest QIA protocols of our research group, including a multi-party synchronous identity authentication protocol based on Greenberger-Horne-Zeilinger (GHZ) states, and a tripartite QSDC protocol with identity authentication capabilities utilizing polarization-spatial super-coding. The GHZ-based multi-party synchronous authentication protocol leverages the strong correlations inherent in GHZ states to achieve simultaneous authentication among multiple parties. Through a carefully designed two-round decoy-state detection mechanism, it effectively resists both external eavesdropping and internal attacks originating from authenticated users, thereby enhancing the efficiency and security of identity management in large-scale quantum networks. The core innovation of the polarization-spatial super-coding tripartite QSDC protocol lies in its deep integration of the authentication process with information transmission by utilizing the spatial degrees of freedom of single photons. This design accomplishes the identity verification of two senders and the transmission of secret information within a single protocol run, ensuring end-to-end security through a three-stage security check. This “authentication-as-communication” paradigm significantly improves the overall efficiency and practicality of the protocol. Its successful implementation also relies on advancements in quantum memory technology.Finally, the review outlines future research directions for quantum identity authentication and explores its potential applications in quantum communication. The QIA research needs to focus on reducing resource dependency, exploring more efficient protocol designs, further enhancing protocol integration and robustness, prioritizing the development of protocols adaptable to real-world environments, and actively investigating integration with novel scenarios. This comprehensive review aims to provide theoretical research foundations and technical support for the practical development of future quantum identity authentication.
      通信作者: 郑艳艳, yyz@yau.edu.cn ; 盛宇波, shengyb@njupt.edu.cn
    • 基金项目: 国家自然科学基金(批准号: 12175106, 92365110)资助的课题.
      Corresponding author: ZHENG Yanyan, yyz@yau.edu.cn ; SHENG Yubo, shengyb@njupt.edu.cn
    • Funds: Project supported by the National Natural Science Foundation of China (Grant Nos. 12175106, 92365110).
    [1]

    [2]

    [3]

    [4]

    [5]

    [6]

    [7]

    [8]

    [9]

    [10]

    [11]

    [12]

    [13]

    [14]

    [15]

    [16]

    [17]

    [18]

    [19]

    [20]

    [21]

    [22]

    [23]

    [24]

    [25]

    [26]

    [27]

    [28]

    [29]

    [30]

    [31]

    [32]

    [33]

    [34]

    [35]

    [36]

    [37]

    [38]

    [39]

    [40]

    [41]

    [42]

    [43]

    [44]

    [45]

    [46]

    [47]

    [48]

    [49]

    [50]

    [51]

    [52]

    [53]

    [54]

    [55]

    [56]

    [57]

    [58]

    [59]

    [60]

    [61]

    [62]

    [63]

    [64]

    [65]

    [66]

    [67]

    [68]

    [69]

    [70]

    [71]

    [72]

    [73]

    [74]

    [75]

    [76]

    [77]

    [78]

    [79]

    [80]

    [81]

    [82]

    [83]

    [84]

    [85]

    [86]

    [87]

    [88]

    [89]

    [90]

    [91]

    [92]

    [93]

    [94]

    [95]

    [96]

    [97]

    [98]

    [99]

    [100]

    [101]

    [102]

    [103]

  • 量子源类型 核心资源 优势 局限性 信道损耗/噪声容忍度
    单光子 极化/相位编
    码单光子
    低资源消耗、易于实现、
    与现有QKD技术兼容度高
    需高效单光子探测器, 抗噪声
    能力较弱, 需防范光子数
    分离(PNS)攻击
    中等. 对信道损耗敏感, 需使用
    诱骗态; 散粒噪声会影响误码率
    纠缠态 贝尔态、
    GHZ态、
    团簇态
    高安全性、抗窃听能力强、
    具备理论上的无条件安全性
    实验复杂度高, 依赖稳定
    纠缠源, 传输距离受纠缠
    分效率限制
    较低. 纠缠分发效率极易受信道损耗和退相干效应影响, 保真度下降快
    连续变量 双模压缩态、
    相干态
    城域网效率高, 兼容经典
    光通信设备, 探测效率高
    需高精度调制, 安全性依赖
    高斯假设, 易受到非高斯攻击
    较高. 可采用经典光通信的放大和
    纠错技术, 但对过量噪声非常敏感
    混合型 纠缠态+
    单光子/
    经典算法
    灵活性强, 平衡效率与
    安全性, 降低对单一量子
    源的依赖, 适用复杂场景
    安全性需双重验证, 协议
    设计复杂度高, 需协调量子
    与经典操作的同步性
    可调节. 取决于所采用的具体量子资源组合, 设计上可针对噪声进行优化
    下载: 导出CSV

    分类信道需求核心优势主要局限适用场景
    QKD框架低损耗高安全性, 密钥与认证同步依赖预共享密钥或可信第三方长期密钥分发的安全通信
    QSDC框架高稳定性高效信息传输与认证一体化对量子信道质量要求高实时安全通信(如军事指挥)
    隐形传态框架中继节点跨节点认证, 无条件安全性实验复杂度高, 需可信中继量子中继网络与城域互联
    纠缠交换框架多方同步多方协作抗合谋攻击量子资源消耗大, 依赖可信第三方多方联合认证(如区块链共识)
    乒乓协议框架双向信道动态密钥更新, 抗窃听能力强仅支持单向认证, 需双向信道移动终端临时认证
    下载: 导出CSV
  • [1]

    [2]

    [3]

    [4]

    [5]

    [6]

    [7]

    [8]

    [9]

    [10]

    [11]

    [12]

    [13]

    [14]

    [15]

    [16]

    [17]

    [18]

    [19]

    [20]

    [21]

    [22]

    [23]

    [24]

    [25]

    [26]

    [27]

    [28]

    [29]

    [30]

    [31]

    [32]

    [33]

    [34]

    [35]

    [36]

    [37]

    [38]

    [39]

    [40]

    [41]

    [42]

    [43]

    [44]

    [45]

    [46]

    [47]

    [48]

    [49]

    [50]

    [51]

    [52]

    [53]

    [54]

    [55]

    [56]

    [57]

    [58]

    [59]

    [60]

    [61]

    [62]

    [63]

    [64]

    [65]

    [66]

    [67]

    [68]

    [69]

    [70]

    [71]

    [72]

    [73]

    [74]

    [75]

    [76]

    [77]

    [78]

    [79]

    [80]

    [81]

    [82]

    [83]

    [84]

    [85]

    [86]

    [87]

    [88]

    [89]

    [90]

    [91]

    [92]

    [93]

    [94]

    [95]

    [96]

    [97]

    [98]

    [99]

    [100]

    [101]

    [102]

    [103]

  • [1] 杨荣国, 张超霞, 李妮, 张静, 郜江瑞. 级联四波混频系统中纠缠增强的量子操控. 必威体育下载 , 2019, 68(9): 094205. doi: 10.7498/aps.68.20181837
    [2] 李雪琴, 赵云芳, 唐艳妮, 杨卫军. 基于金刚石氮-空位色心自旋系综与超导量子电路混合系统的量子节点纠缠. 必威体育下载 , 2018, 67(7): 070302. doi: 10.7498/aps.67.20172634
    [3] 王灿灿. 量子纠缠与宇宙学弗里德曼方程. 必威体育下载 , 2018, 67(17): 179501. doi: 10.7498/aps.67.20180813
    [4] 赵建辉, 王海涛. 应用多尺度纠缠重整化算法研究量子自旋系统的量子相变和基态纠缠. 必威体育下载 , 2012, 61(21): 210502. doi: 10.7498/aps.61.210502
    [5] 岳孝林, 王金东, 魏正军, 郭邦红, 刘颂豪. 一种新的单光源多波长双向量子密钥分发系统. 必威体育下载 , 2012, 61(18): 184215. doi: 10.7498/aps.61.184215
    [6] 刘圣鑫, 李莎莎, 孔祥木. Dzyaloshinskii-Moriya相互作用对量子XY链中热纠缠的影响. 必威体育下载 , 2011, 60(3): 030303. doi: 10.7498/aps.60.030303
    [7] 魏正军, 万伟, 王金东, 廖常俊, 刘颂豪. 一种基于确定性量子密钥分发误码判据的相位调制器半波电压的精确测定方法. 必威体育下载 , 2011, 60(9): 094216. doi: 10.7498/aps.60.094216.1
    [8] 周南润, 曾宾阳, 王立军, 龚黎华. 基于纠缠的选择自动重传量子同步通信协议. 必威体育下载 , 2010, 59(4): 2193-2199. doi: 10.7498/aps.59.2193
    [9] 王金东, 秦晓娟, 魏正军, 刘小宝, 廖常俊, 刘颂豪. 一种高效量子密钥分发系统主动相位补偿方法. 必威体育下载 , 2010, 59(1): 281-286. doi: 10.7498/aps.59.281
    [10] 王郁武, 詹佑邦. 零知识证明的量子身份认证协议. 必威体育下载 , 2009, 58(11): 7668-7671. doi: 10.7498/aps.58.7668
    [11] 权东晓, 裴昌幸, 朱畅华, 刘 丹. 一种新的预报单光子源诱骗态量子密钥分发方案. 必威体育下载 , 2008, 57(9): 5600-5604. doi: 10.7498/aps.57.5600
    [12] 王金东, 路 巍, 赵 峰, 刘小宝, 郭邦红, 张 静, 黄宇娴, 路轶群, 刘颂豪. 稳定的低噪声自由空间量子密钥分配实验研究. 必威体育下载 , 2008, 57(7): 4214-4218. doi: 10.7498/aps.57.4214
    [13] 张 静, 王发强, 赵 峰, 路轶群, 刘颂豪. 时间和相位混合编码的量子密钥分发方案. 必威体育下载 , 2008, 57(8): 4941-4946. doi: 10.7498/aps.57.4941
    [14] 胡华鹏, 张 静, 王金东, 黄宇娴, 路轶群, 刘颂豪, 路 巍. 双协议量子密钥分发系统实验研究. 必威体育下载 , 2008, 57(9): 5605-5611. doi: 10.7498/aps.57.5605
    [15] 郭邦红, 路轶群, 王发强, 赵 峰, 胡 敏, 林一满, 廖常俊, 刘颂豪. 相位调制量子密钥分配系统中低频振动相移的实时跟踪补偿. 必威体育下载 , 2007, 56(7): 3695-3702. doi: 10.7498/aps.56.3695
    [16] 郑力明, 王发强, 刘颂豪. 光纤色散与损耗对光量子密钥分发系统的影响. 必威体育下载 , 2007, 56(4): 2180-2183. doi: 10.7498/aps.56.2180
    [17] 陈 霞, 王发强, 路轶群, 赵 峰, 李明明, 米景隆, 梁瑞生, 刘颂豪. 运行双协议相位调制的量子密钥分发系统. 必威体育下载 , 2007, 56(11): 6434-6440. doi: 10.7498/aps.56.6434
    [18] 胡要花, 方卯发, 廖湘萍, 郑小娟. 二项式光场与级联三能级原子的量子纠缠. 必威体育下载 , 2006, 55(9): 4631-4637. doi: 10.7498/aps.55.4631
    [19] 李明明, 王发强, 路轶群, 赵 峰, 陈 霞, 梁瑞生, 刘颂豪. 高稳定的差分相位编码量子密钥分发系统. 必威体育下载 , 2006, 55(9): 4642-4646. doi: 10.7498/aps.55.4642
    [20] 吴 光, 周春源, 陈修亮, 韩晓红, 曾和平. 长距离长期稳定的量子密钥分发系统. 必威体育下载 , 2005, 54(8): 3622-3626. doi: 10.7498/aps.54.3622
计量
  • 文章访问数:  1682
  • PDF下载量:  65
  • 被引次数: 0
出版历程
  • 收稿日期:  2025-07-12
  • 修回日期:  2025-09-05
  • 上网日期:  2025-09-17
  • 刊出日期:  2025-11-05

返回文章
返回