Quantum-message-oriented public-key encryption scheme beyond computational hypothesis

被引:0
|
作者
Liang, Min
Yang, Li [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
来源
QUANTUM OPTICS II | 2012年 / 8440卷
基金
中国国家自然科学基金;
关键词
Quantum one-way transformation; quantum message; public-key encryption; information-theoretic security;
D O I
10.1117/12.922500
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We propose two definitions of quantum one-way transformation and quantum trapdoor one-way transformation beyond computational hypothesis, and give four examples. Then, we present a general way to construct a quantum public-key encryption scheme from a quantum one-way transformation and a quantum trapdoor one-way transformation, and give a concrete example which is quantum-message-oriented. The security of this kind of encryption schemes is based on the one-way property of quantum one-way transformation and quantum trapdoor one-way transformation, and this kind of schemes is information-theoretically secure.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] A "medium-field" multivariate public-key encryption scheme
    Wang, LC
    Yang, BY
    Hu, YH
    Lai, FP
    TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 132 - 149
  • [32] A NEW PUBLIC-KEY ENCRYPTION SCHEME BASED ON LUCAS SEQUENCE
    Jiang Zhengtao Hao Yanhua Wang Yumin (National Key Lab of Integrated Service Networks
    Journal of Electronics(China), 2005, (05) : 490 - 497
  • [33] An Efficient Public-Key Dual-Receiver Encryption Scheme
    Gao, Chenglong
    Chen, Kai
    Wang, Qiang
    Chen, Zhixian
    IEEE ACCESS, 2022, 10 : 10799 - 10805
  • [34] A NEW PUBLIC-KEY ENCRYPTION SCHEME BASED ON LUCAS SEQUENCE
    Jiang Zhengtao Hao Yanhua Wang Yumin National Key Lab of Integrated Service Networks Xidian Univ Xian China
    Journal of Electronics, 2005, (05) : 490 - 497
  • [35] Public-key encryption scheme with optimal continuous leakage resilience
    Zhou, Yanwei
    Xu, Ran
    Zhang, Wenzheng
    Xia, Zhe
    Yang, Bo
    Gu, Chunxiang
    Huang, Meijuan
    INFORMATION PROCESSING LETTERS, 2023, 180
  • [36] SYMMETRICAL PUBLIC-KEY ENCRYPTION
    GALIL, Z
    HABER, S
    YUNG, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 128 - 137
  • [37] Human Public-Key Encryption
    Ferradi, Houda
    Geraud, Remi
    Naccache, David
    PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 494 - 505
  • [38] Public-key encryption with chaos
    Kocarev, L
    Sterjev, M
    Fekete, A
    Vattay, G
    CHAOS, 2004, 14 (04) : 1078 - 1082
  • [39] LUC - PUBLIC-KEY ENCRYPTION
    SMITH, P
    DR DOBBS JOURNAL, 1993, 18 (01): : 44 - &
  • [40] Multipurpose Public-Key Encryption
    Zhang, Rui
    He, Kai
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 69 - 84