{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T17:51:01Z","timestamp":1767203461308,"version":"build-2238731810"},"reference-count":33,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T00:00:00Z","timestamp":1722211200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Natural Science Foundation of China under Grant","award":["62271234"],"award-info":[{"award-number":["62271234"]}]},{"name":"National Natural Science Foundation of China under Grant","award":["2022-KYYWF-1042"],"award-info":[{"award-number":["2022-KYYWF-1042"]}]},{"name":"National Natural Science Foundation of China under Grant","award":["PBD2022-16"],"award-info":[{"award-number":["PBD2022-16"]}]},{"name":"National Natural Science Foundation of China under Grant","award":["LJGXCG2022-054"],"award-info":[{"award-number":["LJGXCG2022-054"]}]},{"name":"National Natural Science Foundation of China under Grant","award":["LJGXCG2023-028"],"award-info":[{"award-number":["LJGXCG2023-028"]}]},{"name":"Heilongjiang Universities","award":["62271234"],"award-info":[{"award-number":["62271234"]}]},{"name":"Heilongjiang Universities","award":["2022-KYYWF-1042"],"award-info":[{"award-number":["2022-KYYWF-1042"]}]},{"name":"Heilongjiang Universities","award":["PBD2022-16"],"award-info":[{"award-number":["PBD2022-16"]}]},{"name":"Heilongjiang Universities","award":["LJGXCG2022-054"],"award-info":[{"award-number":["LJGXCG2022-054"]}]},{"name":"Heilongjiang Universities","award":["LJGXCG2023-028"],"award-info":[{"award-number":["LJGXCG2023-028"]}]},{"name":"State Key Laboratory of Public Big Data","award":["62271234"],"award-info":[{"award-number":["62271234"]}]},{"name":"State Key Laboratory of Public Big Data","award":["2022-KYYWF-1042"],"award-info":[{"award-number":["2022-KYYWF-1042"]}]},{"name":"State Key Laboratory of Public Big Data","award":["PBD2022-16"],"award-info":[{"award-number":["PBD2022-16"]}]},{"name":"State Key Laboratory of Public Big Data","award":["LJGXCG2022-054"],"award-info":[{"award-number":["LJGXCG2022-054"]}]},{"name":"State Key Laboratory of Public Big Data","award":["LJGXCG2023-028"],"award-info":[{"award-number":["LJGXCG2023-028"]}]},{"name":"Double First-Class Project for Collaborative Innovation Achievements in Disciplines Construction in Heilongjiang Province","award":["62271234"],"award-info":[{"award-number":["62271234"]}]},{"name":"Double First-Class Project for Collaborative Innovation Achievements in Disciplines Construction in Heilongjiang Province","award":["2022-KYYWF-1042"],"award-info":[{"award-number":["2022-KYYWF-1042"]}]},{"name":"Double First-Class Project for Collaborative Innovation Achievements in Disciplines Construction in Heilongjiang Province","award":["PBD2022-16"],"award-info":[{"award-number":["PBD2022-16"]}]},{"name":"Double First-Class Project for Collaborative Innovation Achievements in Disciplines Construction in Heilongjiang Province","award":["LJGXCG2022-054"],"award-info":[{"award-number":["LJGXCG2022-054"]}]},{"name":"Double First-Class Project for Collaborative Innovation Achievements in Disciplines Construction in Heilongjiang Province","award":["LJGXCG2023-028"],"award-info":[{"award-number":["LJGXCG2023-028"]}]},{"name":"Advanced Programs of Heilongjiang Province for the overseas scholars","award":["62271234"],"award-info":[{"award-number":["62271234"]}]},{"name":"Advanced Programs of Heilongjiang Province for the overseas scholars","award":["2022-KYYWF-1042"],"award-info":[{"award-number":["2022-KYYWF-1042"]}]},{"name":"Advanced Programs of Heilongjiang Province for the overseas scholars","award":["PBD2022-16"],"award-info":[{"award-number":["PBD2022-16"]}]},{"name":"Advanced Programs of Heilongjiang Province for the overseas scholars","award":["LJGXCG2022-054"],"award-info":[{"award-number":["LJGXCG2022-054"]}]},{"name":"Advanced Programs of Heilongjiang Province for the overseas scholars","award":["LJGXCG2023-028"],"award-info":[{"award-number":["LJGXCG2023-028"]}]}],"content-domain":{"domain":["www.mdpi.com"],"crossmark-restriction":true},"short-container-title":["Entropy"],"abstract":"<jats:p>To address the potential threat to the power grid industry posed by quantum computers and ensure the security of bidirectional communication in smart grids, it is imperative to develop quantum-safe authentication protocols. This paper proposes a semi-quantum bidirectional authentication protocol between a control center (CC) and a neighboring gateway (NG). This method uses single photons to facilitate communication between the CC and the NG. Security analysis demonstrates that the protocol can effectively resist common attack methods, including double CNOT attacks, impersonation attacks, interception-measurement-retransmission attacks, and entanglement-measurement attacks. Comparisons with other protocols reveal that this protocol has significant advantages, making it more appealing and practical for real-world applications. Finally, by simulating the protocol on the IBM quantum simulator, this protocol not only validates the theoretical framework but also confirms the practical feasibility of the protocol.<\/jats:p>","DOI":"10.3390\/e26080644","type":"journal-article","created":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T16:37:17Z","timestamp":1722271037000},"page":"644","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A New Semi-Quantum Two-Way Authentication Protocol between Control Centers and Neighborhood Gateways in Smart Grids"],"prefix":"10.3390","volume":"26","author":[{"given":"Qiandong","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Mathematical Science, Heilongjiang University, Harbin 150080, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9715-6076","authenticated-orcid":false,"given":"Kejia","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Mathematical Science, Heilongjiang University, Harbin 150080, China"},{"name":"State Key Laboratory of Public Big Data, Guizhou University, Guiyang 550000, China"}]},{"given":"Kunchi","family":"Hou","sequence":"additional","affiliation":[{"name":"School of Mathematical Science, Heilongjiang University, Harbin 150080, China"}]},{"given":"Long","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Mathematical Science, Heilongjiang University, Harbin 150080, China"}]}],"member":"1968","published-online":{"date-parts":[[2024,7,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Alotaibi, I., Abido, M.A., Khalid, M., and Savkin, A.V. (2020). A comprehensive review of recent advances in smart grids: A sustainable future with renewable energy resources. Energies, 13.","DOI":"10.3390\/en13236269"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"197136","DOI":"10.1155\/2014\/197136","article-title":"Global Renewable Energy-Based Electricity Generation and Smart Grid System for Energy Security","volume":"2014","author":"Islam","year":"2014","journal-title":"Sci. World J."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1058","DOI":"10.1109\/JPROC.2015.2503119","article-title":"Smart grids: A cyber\u2013physical systems perspective","volume":"104","author":"Yu","year":"2016","journal-title":"Proc. IEEE."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.ijcip.2019.01.001","article-title":"Cyber security challenges for IoT-based smart grid networks","volume":"25","author":"Kimani","year":"2019","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"468","DOI":"10.1016\/j.jesit.2018.01.001","article-title":"Smart grids security challenges: Classification by sources of threats","volume":"5","author":"Otuoze","year":"2018","journal-title":"J. Electr. Syst. Inf. Technol."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Obaidat, M.A., Obeidat, S., Holst, J., and Al Hayajneh, A. (2020). A comprehensive and systematic survey on the internet of things: Security and privacy challenges, security frameworks, enabling technologies, threats, vulnerabilities and countermeasures. Computers, 9.","DOI":"10.3390\/computers9020044"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"6522","DOI":"10.1109\/TII.2019.2931436","article-title":"Physical layer security for the smart grid: Vulnerabilities, threats, and countermeasures","volume":"15","author":"Islam","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/S1353-4858(20)30105-7","article-title":"The security implications of quantum cryptography and quantum computing","volume":"9","author":"Cavaliere","year":"2020","journal-title":"Netw. Secur."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Mitra, S., Jana, B., Bhattacharya, S., Pal, P., and Poray, J. (2017, January 2\u20133). Quantum cryptography: Overview, security issues and future challenges. Proceedings of the 2017 4th International Conference on Opto-Electronics and Applied Optics (Optronix), Kolkata, India.","DOI":"10.1109\/OPTRONIX.2017.8350006"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"116891","DOI":"10.1016\/j.image.2022.116891","article-title":"Hybrid quantum\u2013classical generative adversarial networks for image generation via learning discrete distribution","volume":"110","author":"Zhou","year":"2023","journal-title":"Signal Process. Image Commun."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"12731","DOI":"10.1038\/s41598-022-16090-w","article-title":"Authentication of smart grid communications using quantum key distribution","volume":"12","author":"Alshowkan","year":"2022","journal-title":"Sci. Rep."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"36285","DOI":"10.1109\/ACCESS.2019.2893056","article-title":"Lightweight quantum encryption for secure transmission of power data in smart grid","volume":"7","author":"Li","year":"2019","journal-title":"IEEE Access"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1008","DOI":"10.58414\/SCIENTIFICTEMPER.2023.14.3.69","article-title":"Quantum Key Distribution-based Techniques in IoT","volume":"14","author":"Singhrova","year":"2023","journal-title":"Sci. Temper"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1344","DOI":"10.1016\/j.comnet.2012.12.017","article-title":"Cyber security in the smart grid: Survey and challenges","volume":"57","author":"Wang","year":"2013","journal-title":"Comput. Netw."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1109\/TSG.2011.2160661","article-title":"A lightweight message authentication scheme for smart grid communications","volume":"2","author":"Fouda","year":"2011","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_16","first-page":"133","article-title":"Quantum oblivious mutual identification","volume":"21","author":"Salvail","year":"1995","journal-title":"Entropy"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"250311","DOI":"10.1007\/s11433-023-2337-2","article-title":"A quantum federated learning framework for classical clients","volume":"67","author":"Song","year":"2024","journal-title":"Sci. China-Phys. Mech. Astron."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s11128-018-2124-2","article-title":"Quantum identity authentication without entanglement","volume":"18","author":"Zawadzki","year":"2019","journal-title":"Quantum Inf. Process."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Termos, H. (2024). Quantum Authentication Evolution: Novel Approaches for Securing Quantum Key Distribution. Entropy., 26.","DOI":"10.3390\/e26060447"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2183","DOI":"10.1007\/s11128-015-0994-0","article-title":"A novel quantum deniable authentication protocol without entanglement","volume":"14","author":"Shi","year":"2015","journal-title":"Quantum Inf. Process."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Boyer, M., Kenigsberg, D., and Mor, T. (2007, January 2\u20136). Quantum key distribution with classical Bob. Proceedings of the 2007 First International Conference on Quantum, Nano, and Micro Technologies (ICQNM\u201907), Guadeloupe, French Caribbean.","DOI":"10.1109\/ICQNM.2007.18"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Krawec, W.O. (2015, January 14\u201319). Security proof of a semi-quantum key distribution protocol. Proceedings of the 2015 IEEE International Symposium on Information Theory (ISIT), Hong Kong, China.","DOI":"10.1109\/ISIT.2015.7282542"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s11128-020-2595-9","article-title":"Semi-quantum cryptography","volume":"19","author":"Iqbal","year":"2020","journal-title":"Quantum Inf. Process."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/s11128-019-2308-4","article-title":"Semi-quantum identification","volume":"18","author":"Zhou","year":"2019","journal-title":"Quantum Inf. Process."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1007\/s10773-019-04319-w","article-title":"A novel quantum identity authentication based on Bell states","volume":"59","author":"Zhang","year":"2020","journal-title":"Int. J. Theor. Phys."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Wang, H.W., Tsai, C.W., Lin, J., and Yang, C.W. (2022). Authenticated semi-quantum key distribution protocol based on W states. Sensors, 22.","DOI":"10.3390\/s22134998"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/s11128-022-03767-4","article-title":"Controlled secure direct quantum communication inspired scheme for quantum identity authentication","volume":"22","author":"Dutta","year":"2022","journal-title":"Quantum Inf. Process."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Yang, C.W., Wang, H.W., Lin, J., and Tsai, C.W. (2023). Semi-Quantum Identification without Information Leakage. Mathematics, 11.","DOI":"10.3390\/math11020452"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TQE.2020.3018133","article-title":"High-dimensional semiquantum cryptography","volume":"1","author":"Iqbal","year":"2020","journal-title":"IEEE Trans. Quantum Eng."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Wu, J., Ma, Q., Deng, X., and Qin, Z. (2023, January 3\u20135). Lightweight authentication for smart metering infrastructure in smart grid. Proceedings of the International Conference on Cyber Security, Artificial Intelligence, and Digital Economy (CSAIDE 2023), Nanjing, China.","DOI":"10.1117\/12.2681762"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"806","DOI":"10.1016\/j.scs.2017.12.041","article-title":"A systematic review of data protection and privacy preservation schemes for smart grid communications","volume":"38","author":"Ferrag","year":"2018","journal-title":"Sustain. Cities Soc."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"11883","DOI":"10.3390\/en81011883","article-title":"State of the art authentication, access control, and secure integration in smart grid","volume":"8","author":"Saxena","year":"2015","journal-title":"Energies"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"5635","DOI":"10.1103\/PhysRevLett.85.5635","article-title":"Quantum key distribution in the Holevo limit","volume":"85","author":"Cabello","year":"2000","journal-title":"Phys. Rev. Lett."}],"updated-by":[{"DOI":"10.3390\/e26100873","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T00:00:00Z","timestamp":1722211200000}}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/26\/8\/644\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T14:37:07Z","timestamp":1754231827000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/26\/8\/644"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,29]]},"references-count":33,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2024,8]]}},"alternative-id":["e26080644"],"URL":"https:\/\/doi.org\/10.3390\/e26080644","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,29]]}}}