{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:37:39Z","timestamp":1760146659298,"version":"build-2065373602"},"reference-count":37,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T00:00:00Z","timestamp":1732752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Natural Science Foundation of China","award":["62172060","2022YFB3304303","2023ZHCG0004","2022JB001","AZ2024-0216"],"award-info":[{"award-number":["62172060","2022YFB3304303","2023ZHCG0004","2022JB001","AZ2024-0216"]}]},{"name":"National Key R&amp;D Program of China","award":["62172060","2022YFB3304303","2023ZHCG0004","2022JB001","AZ2024-0216"],"award-info":[{"award-number":["62172060","2022YFB3304303","2023ZHCG0004","2022JB001","AZ2024-0216"]}]},{"name":"Chengdu Municipal Science and Technology Program","award":["62172060","2022YFB3304303","2023ZHCG0004","2022JB001","AZ2024-0216"],"award-info":[{"award-number":["62172060","2022YFB3304303","2023ZHCG0004","2022JB001","AZ2024-0216"]}]},{"name":"Sichuan Province Economic and Information Technology Department Project","award":["62172060","2022YFB3304303","2023ZHCG0004","2022JB001","AZ2024-0216"],"award-info":[{"award-number":["62172060","2022YFB3304303","2023ZHCG0004","2022JB001","AZ2024-0216"]}]},{"name":"Chengdu Economic and Information Bureau Project","award":["62172060","2022YFB3304303","2023ZHCG0004","2022JB001","AZ2024-0216"],"award-info":[{"award-number":["62172060","2022YFB3304303","2023ZHCG0004","2022JB001","AZ2024-0216"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Quantum communication holds great potential for enhancing the security and efficiency of the Internet of Things (IoT). However, existing schemes often overlook device identity authentication, leaving systems vulnerable to unauthorized access, and rely on third-party controllers, which increase complexity and undermine trust. This paper proposes a novel asymmetric bidirectional quantum communication scheme tailored for IoT, integrating device identity authentication and information transmission without requiring third-party controllers. We provide a detailed description of the scheme\u2019s application scenarios in IoT, conduct a security analysis of the identity authentication module, and experimentally validate the feasibility of the information transmission module. Additionally, we analyze the impact of quantum noise on the proposed scheme and compare it with existing approaches, highlighting its advantages in terms of resource consumption and efficiency.<\/jats:p>","DOI":"10.3390\/sym16121589","type":"journal-article","created":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T03:21:23Z","timestamp":1732764083000},"page":"1589","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Asymmetric Bidirectional Quantum Communication with Device Authentication in IoT"],"prefix":"10.3390","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-3489-612X","authenticated-orcid":false,"given":"Yonghao","family":"Zhu","sequence":"first","affiliation":[{"name":"College of Computer Science and Cyber Security (Model Software College), Chengdu University of Technology, Chengdu 610059, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3892-4546","authenticated-orcid":false,"given":"Dongfen","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science and Cyber Security (Model Software College), Chengdu University of Technology, Chengdu 610059, China"}]},{"given":"Yangyang","family":"Jiang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Cyber Security (Model Software College), Chengdu University of Technology, Chengdu 610059, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-8965-4340","authenticated-orcid":false,"given":"Xiaoyu","family":"Hua","sequence":"additional","affiliation":[{"name":"College of Computer Science and Cyber Security (Model Software College), Chengdu University of Technology, Chengdu 610059, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1424-1532","authenticated-orcid":false,"given":"You","family":"Fu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Cyber Security (Model Software College), Chengdu University of Technology, Chengdu 610059, China"}]},{"given":"Jie","family":"Zhou","sequence":"additional","affiliation":[{"name":"College of Computer Science and Cyber Security (Model Software College), Chengdu University of Technology, Chengdu 610059, China"}]},{"given":"Yuqiao","family":"Tan","sequence":"additional","affiliation":[{"name":"College of Computer Science and Cyber Security (Model Software College), Chengdu University of Technology, Chengdu 610059, China"}]},{"given":"Xiaolong","family":"Yang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Cyber Security (Model Software College), Chengdu University of Technology, Chengdu 610059, China"}]}],"member":"1968","published-online":{"date-parts":[[2024,11,28]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1109\/TCCN.2020.2968324","article-title":"Third Eye: Context-Aware Detection for Hidden Terminal Emulation Attacks in Cognitive Radio-Enabled IoT Networks","volume":"6","author":"Hossain","year":"2020","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.jnca.2017.04.002","article-title":"Internet of Things Security: A Survey","volume":"88","author":"Alaba","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1109\/TST.2016.7488745","article-title":"Cryptanalysis of Public Key Cryptosystems Based on Non-Abelian Factorization Problems","volume":"21","author":"Liu","year":"2016","journal-title":"Tsinghua Sci. Technol."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1137\/S0036144598347011","article-title":"Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer","volume":"41","author":"Shor","year":"1999","journal-title":"Siam Rev."},{"key":"ref_5","unstructured":"Bernstein, D.J., and Lange, T. (2024, June 23). Post-Quantum Cryptography\u2014Dealing with the Fallout of Physics Success. Cryptology ePrint Archive, Paper 2017\/314, 2017. Available online: https:\/\/eprint.iacr.org\/2017\/314."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Grover, L.K. (1996, January 22\u201324). A Fast Quantum Mechanical Algorithm for Database Search. Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing-STOC\u201996, Philadelphia, PA, USA.","DOI":"10.1145\/237814.237866"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MSP.2018.3761723","article-title":"Cybersecurity in an Era with Quantum Computers: Will We Be Ready?","volume":"16","author":"Mosca","year":"2015","journal-title":"IEEE Secur. Priv."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Baldi, M., Santini, P., and Cancellieri, G. (2017, January 20\u201322). Post-Quantum Cryptography Based on Codes: State of the Art and Open Challenges. Proceedings of the 2017 AEIT International Annual Conference, Cagliari, Italy.","DOI":"10.23919\/AEIT.2017.8240549"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"27205","DOI":"10.1109\/ACCESS.2018.2827203","article-title":"A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain","volume":"6","author":"Gao","year":"2018","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"27251","DOI":"10.1109\/ACCESS.2018.2833103","article-title":"A New Post-Quantum Blind Signature From Lattice Assumptions","volume":"6","author":"Zhang","year":"2018","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Qassim, Y., Magana, M.E., and Yavuz, A. (2017, January 26\u201329). Post-Quantum Hybrid Security Mechanism for MIMO Systems. Proceedings of the 2017 International Conference on Computing, Networking and Communications (ICNC), Silicon Valley, CA, USA.","DOI":"10.1109\/ICCNC.2017.7876212"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Clupek, V., Malina, L., and Zeman, V. (2015, January 9\u201311). Secure Digital Archiving in Post-Quantum Era. Proceedings of the 2015 38th International Conference on Telecommunications and Signal Processing (TSP), Prague, Czech Republic.","DOI":"10.1109\/TSP.2015.7296338"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Al-Mohammed, H.A., and Yaacoub, E. (2021, January 14\u201323). On The Use of Quantum Communications for Securing IoT Devices in the 6G Era. Proceedings of the 2021 IEEE International Conference on Communications Workshops (ICC Workshops), Montreal, QC, Canada.","DOI":"10.1109\/ICCWorkshops50388.2021.9473793"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Fu, Y., Li, D., Hua, X., Jiang, Y., Zhu, Y., Zhou, J., Yang, X., and Tan, Y. (2023). A Scheme for Quantum Teleportation and Remote Quantum State Preparation of IoT Multiple Devices. Sensors, 23.","DOI":"10.3390\/s23208475"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1895","DOI":"10.1103\/PhysRevLett.70.1895","article-title":"Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels","volume":"70","author":"Bennett","year":"1993","journal-title":"Phys. Rev. Lett."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"4394","DOI":"10.1103\/PhysRevA.58.4394","article-title":"Quantum teleportation using three-particle entanglement","volume":"58","author":"Karlsson","year":"1998","journal-title":"Phys. Rev. A"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"662","DOI":"10.1134\/S0021364007120168","article-title":"Quantum teleportation of an unknown N-Qubit W-Like state","volume":"85","author":"Man","year":"2007","journal-title":"JETP Lett."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"2331","DOI":"10.1016\/j.optcom.2007.12.002","article-title":"Quantum circuits for controlled teleportation of two-particle entanglement via a W state","volume":"281","author":"Chen","year":"2008","journal-title":"Opt. Commun."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"977","DOI":"10.1007\/s10773-007-9524-x","article-title":"Teleportation of GHZ-States in QED-Cavities without the Explicit Bell-State Measurement","volume":"47","author":"Cardoso","year":"2008","journal-title":"Int. J. Theor. Phys."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"516","DOI":"10.1007\/s10773-008-9827-6","article-title":"Quantum Teleportation via GHZ-like State","volume":"48","author":"Yang","year":"2009","journal-title":"Int. J. Theor. Phys."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"2573","DOI":"10.1007\/s10773-013-1543-1","article-title":"Quantum Teleportation of the Two-Qubit Entangled State by Use of Four-Qubit Entangled State","volume":"52","author":"Shao","year":"2013","journal-title":"Int. J. Theor. Phys."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"898","DOI":"10.1088\/1009-1963\/14\/5\/007","article-title":"Quantum logic networks for controlled teleportation of a single particle via W state","volume":"14","year":"2005","journal-title":"Chin. Phys."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1080\/15599612.2012.683516","article-title":"Scheme for Implementing Controlled Quantum Teleportation in QDS-Cavity System","volume":"6","author":"Hu","year":"2012","journal-title":"Int. J. Optomechatron."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"3435","DOI":"10.1007\/s10773-021-04825-w","article-title":"Asymmetric Cyclic Controlled Quantum Teleportation by Using Nine-Qubit Entangled State","volume":"60","author":"Zhou","year":"2021","journal-title":"Int. J. Theor. Phys."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/s11128-021-03088-y","article-title":"Efficient circular controlled quantum teleportation and broadcast schemes in the presence of quantum noises","volume":"20","author":"Zarmehi","year":"2021","journal-title":"Quantum Inf. Process."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1950356","DOI":"10.1142\/S0217984919503561","article-title":"Hierarchical controlled quantum teleportation","volume":"33","author":"Zha","year":"2019","journal-title":"Mod. Phys. Lett."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1911","DOI":"10.1007\/s10773-021-04810-3","article-title":"Hierarchical Quantum Teleportation of Arbitrary Single-Qubit State by Using Four-Qubit Cluster State","volume":"60","author":"Li","year":"2021","journal-title":"Int. J. Theor. Phys."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1740","DOI":"10.1007\/s10773-012-1208-5","article-title":"Bidirectional Quantum Controlled Teleportation via Five-Qubit Cluster State","volume":"52","author":"Zha","year":"2013","journal-title":"Int. J. Theor. Phys."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1333","DOI":"10.1007\/s10773-015-2774-0","article-title":"Bidirectional Quantum Teleportation by Using Five-qubit Cluster State","volume":"55","author":"Sang","year":"2016","journal-title":"Int. J. Theor. Phys."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"2101","DOI":"10.1007\/s10773-017-3353-3","article-title":"Bidirectional Teleportation of a Two-Qubit State by Using Eight-Qubit Entangled State as a Quantum Channel","volume":"56","author":"Houshmand","year":"2017","journal-title":"Int. J. Theor. Phys."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1007\/s10773-022-05229-0","article-title":"Bidirectional Controlled Quantum Teleportation of Arbitrary Two-qubit States Using Ten-qubit Entangled Channel in Noisy Environment","volume":"61","author":"Wang","year":"2022","journal-title":"Int. J. Theor. Phys."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/s10773-022-05072-3","article-title":"Bidirectional Quantum Transmission with Different Levels of Control","volume":"61","author":"Cao","year":"2022","journal-title":"Int. J. Theor. Phys."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1007\/s11128-021-03389-2","article-title":"Bidirectional quantum teleportation using a five-qubit cluster state as a quantum channel","volume":"21","author":"Wang","year":"2022","journal-title":"Quantum Inf. Process."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/s10773-022-05256-x","article-title":"Research on Key Technologies of Controlled Bidirectional Quantum Teleportation","volume":"62","author":"Yang","year":"2023","journal-title":"Int. J. Theor. Phys."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1007\/s11082-023-04863-0","article-title":"Asymmetric bi-directional teleportation scheme in the presence of a Mentor and a controller","volume":"55","author":"Mandal","year":"2023","journal-title":"Opt. Quantum Electron."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"936","DOI":"10.1109\/LCOMM.2020.3036587","article-title":"Bidirectional Quantum Teleportation by Using Two GHZ-States as the Quantum Channel","volume":"25","author":"Verma","year":"2021","journal-title":"IEEE Commun. Lett."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"44269","DOI":"10.1109\/ACCESS.2019.2901960","article-title":"Bidirectional Quantum Teleportation by Using Six-Qubit Cluster State","volume":"7","author":"Zhou","year":"2019","journal-title":"IEEE Access"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/16\/12\/1589\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T16:41:22Z","timestamp":1760114482000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/16\/12\/1589"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,28]]},"references-count":37,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["sym16121589"],"URL":"https:\/\/doi.org\/10.3390\/sym16121589","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2024,11,28]]}}}