Quantum-message-oriented public-key encryption scheme beyond computational hypothesis

被引:0
|
作者
Liang, Min
Yang, Li [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
来源
QUANTUM OPTICS II | 2012年 / 8440卷
基金
中国国家自然科学基金;
关键词
Quantum one-way transformation; quantum message; public-key encryption; information-theoretic security;
D O I
10.1117/12.922500
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We propose two definitions of quantum one-way transformation and quantum trapdoor one-way transformation beyond computational hypothesis, and give four examples. Then, we present a general way to construct a quantum public-key encryption scheme from a quantum one-way transformation and a quantum trapdoor one-way transformation, and give a concrete example which is quantum-message-oriented. The security of this kind of encryption schemes is based on the one-way property of quantum one-way transformation and quantum trapdoor one-way transformation, and this kind of schemes is information-theoretically secure.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] Improvement in public-key encryption and key exchange scheme based on Chebyshev polynomials
    School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing 100044, China
    不详
    不详
    Tiedao Xuebao, 2006, 5 (95-98):
  • [42] Quantum public-key encryption schemes based on conjugate coding
    Yang, Li
    Yang, Biyao
    Xiang, Chong
    QUANTUM INFORMATION PROCESSING, 2020, 19 (11)
  • [43] Quantum public-key encryption schemes based on conjugate coding
    Li Yang
    Biyao Yang
    Chong Xiang
    Quantum Information Processing, 2020, 19
  • [44] Forward-secure Public-Key Encryption Scheme with Tamper Evidence
    Jiang Han
    Xu QiuLiang
    Hou MengBo
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 656 - 659
  • [45] Multivariate Public-Key Encryption Scheme Based on Error Correcting Codes
    Wang Houzhen
    Shen Changxiang
    Xu Zhengquan
    Zhang Huanguo
    CHINA COMMUNICATIONS, 2011, 8 (04) : 23 - 31
  • [46] A more efficient public-key authenticated encryption scheme with keyword search
    Huang, Qiong
    Huang, Peisen
    Li, Hongbo
    Huang, Jianye
    Lin, Hongyuan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 137
  • [47] On some variations of Kurosawa-Desmedt public-key encryption scheme
    Phong, Le Trieu
    Ogata, Wakaha
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (01) : 226 - 230
  • [48] Formal Verification of Saber's Public-Key Encryption Scheme in EasyCrypt
    Hulsing, Andreas
    Meijers, Matthias
    Strub, Pierre-Yves
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT I, 2022, 13507 : 622 - 653
  • [49] A LATTICE-BASED PUBLIC-KEY ENCRYPTION SCHEME FOR RFID APPLICATIONS
    Lin Hui
    Dong Yahui
    Liu Dongshen
    Liu Zilong
    Hou Dawei
    Tong Hengqin
    2014 12TH IEEE INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT), 2014,
  • [50] Trapdoor security in a searchable public-key encryption scheme with a designated tester
    Rhee, Hyun Sook
    Park, Jong Hwan
    Susilo, Willy
    Lee, Dong Hoon
    JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (05) : 763 - 771