{"id":"https://openalex.org/W2115281814","doi":"https://doi.org/10.1142/s0129054104002649","title":"QUANTUM AUTHENTICATION USING ENTANGLED STATES","display_name":"QUANTUM AUTHENTICATION USING ENTANGLED STATES","publication_year":2004,"publication_date":"2004-08-01","ids":{"openalex":"https://openalex.org/W2115281814","doi":"https://doi.org/10.1142/s0129054104002649","mag":"2115281814"},"language":"en","primary_location":{"id":"doi:10.1142/s0129054104002649","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0129054104002649","pdf_url":null,"source":{"id":"https://openalex.org/S68047077","display_name":"International Journal of Foundations of Computer Science","issn_l":"0129-0541","issn":["0129-0541","1793-6373"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Foundations of Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100449169","display_name":"Xiaoyu Li","orcid":"https://orcid.org/0000-0003-0286-6660"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"XIAOYU LI","raw_affiliation_strings":["Graduate School of Chinese Academy Sciences,  Beijing 100039, the People's Republic of China","Key Laboratory of Intelligent Information Processing, Institute of Computing Technology, Chinese Academy of Sciences, P. O. Box 2704 Beijing, 100080, the People's Republic of China"],"affiliations":[{"raw_affiliation_string":"Graduate School of Chinese Academy Sciences,  Beijing 100039, the People's Republic of China","institution_ids":[]},{"raw_affiliation_string":"Key Laboratory of Intelligent Information Processing, Institute of Computing Technology, Chinese Academy of Sciences, P. O. Box 2704 Beijing, 100080, the People's Republic of China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089197447","display_name":"Howard Barnum","orcid":"https://orcid.org/0000-0003-2336-6147"},"institutions":[{"id":"https://openalex.org/I1343871089","display_name":"Los Alamos National Laboratory","ror":"https://ror.org/01e41cf67","country_code":"US","type":"facility","lineage":["https://openalex.org/I1330989302","https://openalex.org/I1343871089","https://openalex.org/I198811213","https://openalex.org/I4210120050"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"HOWARD BARNUM","raw_affiliation_strings":["Los Alamos National Laboratory,  MS B256, Los Alamos, NM 87545, USA","Los Alamos National Laboratory, MS B256, Los Alamos, NM 87545, USA"],"affiliations":[{"raw_affiliation_string":"Los Alamos National Laboratory,  MS B256, Los Alamos, NM 87545, USA","institution_ids":["https://openalex.org/I1343871089"]},{"raw_affiliation_string":"Los Alamos National Laboratory, MS B256, Los Alamos, NM 87545, USA","institution_ids":["https://openalex.org/I1343871089"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100449169"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210090176"],"apc_list":null,"apc_paid":null,"fwci":4.0473,"has_fulltext":false,"cited_by_count":53,"citation_normalized_percentile":{"value":0.93914493,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"15","issue":"04","first_page":"609","last_page":"617"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10622","display_name":"Quantum Mechanics and Applications","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3107","display_name":"Atomic and Molecular Physics, and Optics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.8700649738311768},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6384102702140808},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.6079432368278503},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5957500338554382},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5289076566696167},{"id":"https://openalex.org/keywords/epr-paradox","display_name":"EPR paradox","score":0.5078518986701965},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5035354495048523},{"id":"https://openalex.org/keywords/identification-scheme","display_name":"Identification scheme","score":0.43869924545288086},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.42192861437797546},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.42046409845352173},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33744335174560547},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.33614033460617065},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.31535804271698},{"id":"https://openalex.org/keywords/quantum-entanglement","display_name":"Quantum entanglement","score":0.3076244592666626},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.2853124439716339},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.26899921894073486},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.267816424369812},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1442587673664093},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.05702000856399536}],"concepts":[{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.8700649738311768},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6384102702140808},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6079432368278503},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5957500338554382},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5289076566696167},{"id":"https://openalex.org/C171811987","wikidata":"https://www.wikidata.org/wiki/Q214975","display_name":"EPR paradox","level":4,"score":0.5078518986701965},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5035354495048523},{"id":"https://openalex.org/C2778922385","wikidata":"https://www.wikidata.org/wiki/Q3475620","display_name":"Identification scheme","level":3,"score":0.43869924545288086},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.42192861437797546},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.42046409845352173},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33744335174560547},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33614033460617065},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.31535804271698},{"id":"https://openalex.org/C121040770","wikidata":"https://www.wikidata.org/wiki/Q215675","display_name":"Quantum entanglement","level":3,"score":0.3076244592666626},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.2853124439716339},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.26899921894073486},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.267816424369812},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1442587673664093},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.05702000856399536},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0129054104002649","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0129054104002649","pdf_url":null,"source":{"id":"https://openalex.org/S68047077","display_name":"International Journal of Foundations of Computer Science","issn_l":"0129-0541","issn":["0129-0541","1793-6373"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Foundations of Computer Science","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1503645968","https://openalex.org/W1549888746","https://openalex.org/W1964082606","https://openalex.org/W1970006170","https://openalex.org/W1971279958","https://openalex.org/W1976479452","https://openalex.org/W1997124098","https://openalex.org/W2003184342","https://openalex.org/W2006226307","https://openalex.org/W2010540858","https://openalex.org/W2012040904","https://openalex.org/W2012213015","https://openalex.org/W2038054480","https://openalex.org/W2040790342","https://openalex.org/W2051051926","https://openalex.org/W2062854284","https://openalex.org/W2069231040","https://openalex.org/W2078987146","https://openalex.org/W2083019346","https://openalex.org/W2108968134","https://openalex.org/W2159648561","https://openalex.org/W2160860151","https://openalex.org/W2963898955","https://openalex.org/W2964288410","https://openalex.org/W3100536493","https://openalex.org/W3121783526"],"related_works":["https://openalex.org/W2939190685","https://openalex.org/W2970530566","https://openalex.org/W102193726","https://openalex.org/W4294008380","https://openalex.org/W2967478618","https://openalex.org/W2074527078","https://openalex.org/W1969784057","https://openalex.org/W2612829423","https://openalex.org/W1922128166","https://openalex.org/W1968284707"],"abstract_inverted_index":{"A":[0],"quantum":[1],"authentication":[2,32],"scheme":[3,42],"is":[4,33,43,60],"presented":[5],"in":[6,54],"this":[7],"paper.":[8],"Two":[9],"parties":[10],"share":[11],"Einstein-Podolsky-Rosen(EPR)":[12],"pairs":[13,23],"previously":[14],"as":[15],"the":[16,27,31,55,57,63],"identification":[17,28,58],"token.":[18,29],"They":[19],"create":[20],"auxiliary":[21],"EPR":[22],"to":[24,45],"interact":[25],"with":[26],"Then":[30],"accomplished":[34],"by":[35],"a":[36],"complete":[37],"Bell":[38],"state":[39],"measurement.":[40],"This":[41],"proved":[44],"be":[46,68],"secure.":[47],"If":[48],"no":[49],"errors":[50],"and":[51],"eavesdroppers":[52],"exist":[53],"transmission,":[56],"token":[59],"unchanged":[61],"after":[62],"authentication.":[64],"So":[65],"it":[66],"can":[67],"reused.":[69]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2012,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
