{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T00:45:53Z","timestamp":1769561153119,"version":"3.49.0"},"reference-count":53,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T00:00:00Z","timestamp":1558569600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702061, 61702469, 61771439, 61572089, 61802037"],"award-info":[{"award-number":["61702061, 61702469, 61771439, 61572089, 61802037"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"China Postdoctoral Science Foundation Funded Project","award":["2017M612912"],"award-info":[{"award-number":["2017M612912"]}]},{"name":"Chongqing Postdoctoral Science Foundation funded project","award":["Xm2017041"],"award-info":[{"award-number":["Xm2017041"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["106112016CDJXY180001, 2018CDJSK04XK09"],"award-info":[{"award-number":["106112016CDJXY180001, 2018CDJSK04XK09"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Cryptography Development Fund","award":["MMJJ20170120"],"award-info":[{"award-number":["MMJJ20170120"]}]},{"DOI":"10.13039\/100012556","name":"Sichuan Youth Science and Technology Foundation","doi-asserted-by":"publisher","award":["2017JQ0045"],"award-info":[{"award-number":["2017JQ0045"]}],"id":[{"id":"10.13039\/100012556","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation Project of CQ","award":["cstc2017rgzn-zdyfX0042"],"award-info":[{"award-number":["cstc2017rgzn-zdyfX0042"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>In this paper, a quantum identity authentication protocol is presented based on the counterfactual quantum key distribution system. Utilizing the proposed protocol, two participants can verify each other\u2019s identity through the counterfactual quantum communication system. The security of the protocol is proved against individual attacks. Furthermore, according to the characteristics of the counterfactual quantum key distribution system, we propose an authenticated counterfactual quantum key distribution protocol based on a novel strategy of mixing the two types of quantum cryptographic protocols randomly. The authenticated quantum key distribution can also be used to update the extent of the authentication keys.<\/jats:p>","DOI":"10.3390\/e21050518","type":"journal-article","created":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T02:22:00Z","timestamp":1558664520000},"page":"518","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Quantum Identity Authentication in the Counterfactual Quantum Key Distribution Protocol"],"prefix":"10.3390","volume":"21","author":[{"given":"Bin","family":"Liu","sequence":"first","affiliation":[{"name":"Postdoctoral Station of Computer Science and Technology, College of Computer Science, Chongqing University, Chongqing 400044, China"}]},{"given":"Zhifeng","family":"Gao","sequence":"additional","affiliation":[{"name":"Postdoctoral Station of Computer Science and Technology, College of Computer Science, Chongqing University, Chongqing 400044, China"}]},{"given":"Di","family":"Xiao","sequence":"additional","affiliation":[{"name":"Postdoctoral Station of Computer Science and Technology, College of Computer Science, Chongqing University, Chongqing 400044, China"}]},{"given":"Wei","family":"Huang","sequence":"additional","affiliation":[{"name":"Science and Technology on Communication Security Laboratory, Institute of Southwestern Communication, Chengdu 610041, China"}]},{"given":"Zhiqing","family":"Zhang","sequence":"additional","affiliation":[{"name":"Chongqing University\u2013Uninversity of Cincinnati Joint Co-op, Chongqing University, Chongqing 400044, China"}]},{"given":"Bingjie","family":"Xu","sequence":"additional","affiliation":[{"name":"Science and Technology on Communication Security Laboratory, Institute of Southwestern Communication, Chengdu 610041, China"}]}],"member":"1968","published-online":{"date-parts":[[2019,5,23]]},"reference":[{"key":"ref_1","unstructured":"Shor, P.W. (1994, January 20\u201322). Algorithms for quantum computation: Discrete logarithms and factoring. Proceedings of the 35th Annual IEEE Symposium on Foundations of Computer Science, Santa Fe, NM, USA."},{"key":"ref_2","unstructured":"Bennett, C.H., and Brassard, G. (1984, January 9\u201312). Quantum cryptography: Public key distribution and coin tossing. Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","article-title":"Unconditional security of quantum key distribution over arbitrarily long distances","volume":"283","author":"Lo","year":"1999","journal-title":"Science"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","article-title":"Simple proof of security of the BB84 quantum key distribution protocol","volume":"85","author":"Shor","year":"2000","journal-title":"Phys. Rev. Lett."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","article-title":"The security of practical quantum key distribution","volume":"81","author":"Scarani","year":"2009","journal-title":"Rev. Mod. Phys."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"032302","DOI":"10.1103\/PhysRevA.65.032302","article-title":"Theoretically efficient high-capacity quantum key distribution scheme","volume":"65","author":"Long","year":"2002","journal-title":"Phys. Rev. A"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"042315","DOI":"10.1103\/PhysRevA.68.042315","article-title":"Controlled order rearrangement encryption for quantum key distribution","volume":"68","author":"Deng","year":"2003","journal-title":"Phys. Rev. A"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","article-title":"Deterministic secure direct communication using entanglement","volume":"89","author":"Bostrom","year":"2002","journal-title":"Phys. Rev. Lett."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"064304","DOI":"10.1103\/PhysRevA.78.064304","article-title":"Quantum secure direct communication with x-type entangled states","volume":"78","author":"Lin","year":"2008","journal-title":"Phys. Rev. A"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.optcom.2009.09.047","article-title":"Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state","volume":"283","author":"Gao","year":"2010","journal-title":"Opt. Commun."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"100308","DOI":"10.1088\/1674-1056\/21\/10\/100308","article-title":"Fault tolerant quantum secure direct communication with quantum encryption against collective noise","volume":"21","author":"Huang","year":"2012","journal-title":"Chin. Phys. B"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1103\/PhysRevLett.83.648","article-title":"How to share a quantum secret","volume":"83","author":"Cleve","year":"1999","journal-title":"Phys. Rev. Lett."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","article-title":"Quantum secret sharing","volume":"59","author":"Hillery","year":"1999","journal-title":"Phys. Rev. A"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1007\/s11433-008-0034-5","article-title":"Multiparty simultaneous quantum identity authentication with secret sharing","volume":"51","author":"Yang","year":"2008","journal-title":"Sci. China-Phys. Mech. Astron."},{"key":"ref_15","first-page":"765","article-title":"Security of quantum secret sharing with two-particle entanglement against individual attacks","volume":"9","author":"Qin","year":"2009","journal-title":"Quant. Inf. Comput."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"4455","DOI":"10.1016\/j.optcom.2009.07.053","article-title":"Multiparty quantum secret sharing with collective eavesdropping-check","volume":"282","author":"Lin","year":"2009","journal-title":"Opt. Commun."},{"key":"ref_17","first-page":"434","article-title":"Security of a kind of quantum secret sharing with single photons","volume":"11","author":"Wang","year":"2011","journal-title":"Quant. Inf. Comput."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"230502","DOI":"10.1103\/PhysRevLett.100.230502","article-title":"Quantum private queries","volume":"100","author":"Giovannetti","year":"2008","journal-title":"Phys. Rev. Lett."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"022301","DOI":"10.1103\/PhysRevA.83.022301","article-title":"Practical private database queries based on a quantum-key-distribution protocol","volume":"83","author":"Jakobi","year":"2011","journal-title":"Phys. Rev. A"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"70301","DOI":"10.1007\/s11433-018-9324-6","article-title":"Quantum private query: A new kind of practical quantum cryptographic protocol","volume":"62","author":"Gao","year":"2019","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"6600111","DOI":"10.1109\/JSTQE.2014.2358192","article-title":"Postprocessing of the oblivious key in quantum private query","volume":"21","author":"Gao","year":"2015","journal-title":"IEEE J. Sel. Top. Quant."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"100301","DOI":"10.1007\/s11433-015-5714-3","article-title":"QKD-based quantum private query without a failure probability","volume":"58","author":"Liu","year":"2015","journal-title":"Sci. China-Phys. Mech. Astron."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/TC.2017.2721404","article-title":"A generic construction of quantum-oblivious-transfer-based private query with ideal database security and zero failure","volume":"67","author":"Wei","year":"2018","journal-title":"IEEE T Comput."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"120311","DOI":"10.1007\/s11433-016-0322-3","article-title":"Improved multiparty quantum key agreement in travelling mode","volume":"59","author":"Huang","year":"2016","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"032325","DOI":"10.1103\/PhysRevA.89.032325","article-title":"Quantum anonymous ranking","volume":"89","author":"Huang","year":"2014","journal-title":"Phys. Rev. A"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"025013","DOI":"10.1088\/2058-9565\/ab0fd9","article-title":"High speed continuous variable source-independent quantum random number generation","volume":"4","author":"Xu","year":"2019","journal-title":"Quantum Sci. Technol."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"230501","DOI":"10.1103\/PhysRevLett.103.230501","article-title":"Counterfactual Quantum Cryptography","volume":"103","author":"Noh","year":"2009","journal-title":"Phys. Rev. Lett."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"4725","DOI":"10.1103\/PhysRevLett.83.4725","article-title":"High-efficiency quantum interrogation measurements via the quantum Zeno effect","volume":"83","author":"Kwiat","year":"1999","journal-title":"Phys. Rev. Lett."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"949","DOI":"10.1038\/nature04523","article-title":"Counterfactual quantum computation through quantum interrogation","volume":"439","author":"Hosten","year":"2006","journal-title":"Nature"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"052318","DOI":"10.1103\/PhysRevA.82.052318","article-title":"Counterfactual quantum key distribution with high efficiency","volume":"82","author":"Sun","year":"2010","journal-title":"Phys. Rev. A"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"042335","DOI":"10.1103\/PhysRevA.82.042335","article-title":"Security of counterfactual quantum cryptography","volume":"82","author":"Yin","year":"2010","journal-title":"Phys. Rev. A"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"755","DOI":"10.1134\/S1054660X11070267","article-title":"Experimental demonstration of counterfactual quantum key distribution","volume":"21","author":"Ren","year":"2011","journal-title":"Laser Phys."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1002\/lapl.201110120","article-title":"Experimental realization of counterfactual quantum cryptography","volume":"9","author":"Brida","year":"2012","journal-title":"Laser Phys. Lett."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"030501","DOI":"10.1103\/PhysRevLett.109.030501","article-title":"Experimental Demonstration of Counterfactual Quantum Communication","volume":"109","author":"Liu","year":"2012","journal-title":"Phys. Rev. Lett."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"022313","DOI":"10.1103\/PhysRevA.86.022313","article-title":"Counterfactual quantum cryptography based on weak coherent states","volume":"86","author":"Yin","year":"2012","journal-title":"Phys. Rev. A"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"060303","DOI":"10.1088\/1674-1056\/21\/6\/060303","article-title":"Security proof of counterfactual quantum cryptography against general intercept-resend attacks and its vulnerability","volume":"21","author":"Zhang","year":"2012","journal-title":"Chin. Phys. B"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"30012","DOI":"10.1209\/0295-5075\/98\/30012","article-title":"Counterfactual attack on counterfactual quantum key distribution","volume":"98","author":"Zhang","year":"2012","journal-title":"Europhys. Lett."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"2325","DOI":"10.1007\/s11128-014-0786-y","article-title":"Analysis of counterfactual quantum key distribution using error-correcting theory","volume":"13","author":"Li","year":"2014","journal-title":"Quantum Inf. Process."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"022318","DOI":"10.1103\/PhysRevA.90.022318","article-title":"Eavesdropping on counterfactual quantum key distribution with finite resources","volume":"90","author":"Liu","year":"2014","journal-title":"Phys. Rev. A"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"1550134","DOI":"10.1142\/S0217979215501349","article-title":"Counterfactual quantum cryptography network with untrusted relay","volume":"29","author":"Chen","year":"2015","journal-title":"Int. J. Mod. Phys. B"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"1589","DOI":"10.1016\/j.physleta.2015.09.027","article-title":"Trojan horse attacks on counterfactual quantum key distribution","volume":"380","author":"Yang","year":"2016","journal-title":"Phys. Lett. A"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"170502","DOI":"10.1103\/PhysRevLett.110.170502","article-title":"Protocol for Direct Counterfactual Quantum Communication","volume":"110","author":"Salih","year":"2013","journal-title":"Phys. Rev. Lett."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"4920","DOI":"10.1073\/pnas.1614560114","article-title":"Direct counterfactual communication via quantum Zeno effect","volume":"114","author":"Cao","year":"2017","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"020304","DOI":"10.1088\/1674-1056\/26\/2\/020304","article-title":"Probabilistic direct counterfactual quantum communication","volume":"26","author":"Zhang","year":"2017","journal-title":"Chin. Phys. B"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"022334","DOI":"10.1103\/PhysRevA.88.022334","article-title":"Private database queries based on counterfactual quantum key distribution","volume":"88","author":"Zhang","year":"2013","journal-title":"Phys. Rev. A"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1088\/0253-6102\/59\/1\/06","article-title":"Counterfactual Quantum Deterministic Key Distributionl","volume":"59","author":"Zhang","year":"2013","journal-title":"Commun. Theor. Phys."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"012333","DOI":"10.1103\/PhysRevA.90.012333","article-title":"Tripartite counterfactual quantum cryptography","volume":"90","author":"Salih","year":"2014","journal-title":"Phys. Rev. A"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"052307","DOI":"10.1103\/PhysRevA.89.052307","article-title":"Counterfactual quantum certificate authorization","volume":"89","author":"Shenoy","year":"2014","journal-title":"Phys. Rev. A"},{"key":"ref_49","first-page":"8516","article-title":"Counterfactual quantum-information transfer without transmitting any physical particles","volume":"5","author":"Guo","year":"2015","journal-title":"Sci. Rep."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"052315","DOI":"10.1103\/PhysRevA.92.052315","article-title":"Direct counterfactual transmission of a quantum state","volume":"92","author":"Li","year":"2015","journal-title":"Phys. Rev. A"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"062303","DOI":"10.1103\/PhysRevA.94.062303","article-title":"Quantum counterfactual communication without a weak trace","volume":"94","author":"Barnes","year":"2016","journal-title":"Phys. Rev. A"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"5331","DOI":"10.1007\/s10773-016-3152-2","article-title":"Analysis of Counterfactual Quantum Certificate Authorization","volume":"55","author":"Wang","year":"2016","journal-title":"Int. J. Theor. Phys."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"052335","DOI":"10.1103\/PhysRevA.96.052335","article-title":"Counterfactual quantum cloning without transmitting any physical particles","volume":"96","author":"Guo","year":"2017","journal-title":"Phys. Rev. A"}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/21\/5\/518\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:54:29Z","timestamp":1760187269000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/21\/5\/518"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,23]]},"references-count":53,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2019,5]]}},"alternative-id":["e21050518"],"URL":"https:\/\/doi.org\/10.3390\/e21050518","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,23]]}}}