Next Article in Journal
Optical Engine Design for a Compact, High-Luminance DLP Projector Using Four-Channel LEDs and a Total Internal Reflection Prism
Next Article in Special Issue
A New Quantum Sealed-Bid Auction Protocol with a Set of Local Indistinguishable Orthogonal Product States
Previous Article in Journal
Advanced Study of Optical Imaging Systems for Virtual Reality Head-Mounted Displays
 
 
Article
Peer-Review Record

Quantum Secure Multi-Party Summation with Identity Authentication Based on Commutative Encryption

Photonics 2023, 10(5), 558; https://doi.org/10.3390/photonics10050558
by Ning Wang 1,2, Xinying Tian 1, Xiaodong Zhang 1 and Song Lin 1,*
Reviewer 1: Anonymous
Reviewer 2: Anonymous
Photonics 2023, 10(5), 558; https://doi.org/10.3390/photonics10050558
Submission received: 11 March 2023 / Revised: 1 May 2023 / Accepted: 5 May 2023 / Published: 10 May 2023
(This article belongs to the Special Issue Quantum Communications: Technologies and Applications)

Round 1

Reviewer 1 Report

Designing a scheme with identity authentication using quantum properties is a worthwhile endeavor. The authors present a QSMS protocol with identity authentication based on exchange encryption. The manuscript is well structured and clearly written. And the analysis is sufficient and convincing. In addition, the protocol is simulated using the IBM Q Experience cloud platform. In my opinion, the manuscript is suitable for publication after some minor revisions.

1.         The generation of identity information "ID_j" and whether it needs to be kept confidential should be explained.

2.         The authentication process should provide more detailed.

3.         Page 3: In Eq. (2), "|>" should be "|1>".

4.         Page 5: The description of the hash function in Step 1 needs careful examination. For example, in line 156, the hash function is denoted as f, while in line 164, the expression of h_j uses H to represent the hash function. It is unclear whether H is public or not. The symbol y in line 159 is used without prior definition.

5.         Page 6: "he" in line 169 should be "TP". The expression of "d^{k}_{j}" in line 196 is inaccurate.

6.         Page 10: "Step 8" should be "step 8".

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 2 Report

The authors have proposed a quantum secure multi-party summation protocol with identity authentication based on commutative encryption. In the protocol, each participant encodes a secret integer via unitary operations. A one-way hash function technique with a key is utilized to perform identity authentication operations for each participant, which is quite interesting. Moreover, the analysis of the protocol shows that the proposed protocol is resistant not only to common attacks but also to impersonation attacks. However, there are some errors in the paper. Thus, I cannot recommend its publication right now, but it deserves acceptance if the authors can well address these issues shown below afterward.

     1.    The equation $h_j=H_{\bar{K}_j}(ID_j||r_j||r_0)$ is wrong and should be $h_j=f_{\bar{K}_j}(ID_j||r_j||r_0)$ (line 164, in page 5), the equation $s^l=\oplus_{j=1}^Nd_j^l$ is wrong and should be $s^l=m^l\oplus d_0^l\oplus_{j=1}^Nv_j^l$ (line 249, in page 8).

 

 

2.     There are some grammatical errors in the manuscript, such as “ a function hash function” should be “a hash function” (line 161, in page 5), “Wavelength Quantum Filters and Photon Number Splitters” should be “wavelength quantum filters and photon number splitters” (line 339, in page 11), “PNS” should be “photon number splitters”(line 342, in page 11).

 

Comments for author File: Comments.pdf

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 3 Report

Please see the full review attached.

Comments for author File: Comments.pdf

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Round 2

Reviewer 3 Report

The authors have revised according to the suggestions. In my view, the manuscript is ready for publication.

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Back to TopTop