Cryptographic quantum hashing

被引:31
|
作者
Ablayev, F. M. [1 ]
Vasiliev, A. V.
机构
[1] Kazan Fed Univ, Kazan, Russia
关键词
quantum cryptography; quantum one-way function; quantum hashing; quantum digital signature; quantum fingerprinting;
D O I
10.1088/1612-2011/11/2/025202
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We present a version of quantum hash functions based on non-binary discrete functions. The proposed quantum procedure is 'classical-quantum', that is, it takes a classical bit string as an input and produces a quantum state. The resulting function has the property of a one-way function (pre-image resistance); in addition it has properties analogous to classical cryptographic hash second pre-image resistance and collision resistance. We also show that the proposed function can be naturally used in a quantum digital signature protocol.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] On the concept of cryptographic quantum hashing
    Ablayev, F.
    Ablayev, M.
    LASER PHYSICS LETTERS, 2015, 12 (12)
  • [2] Cryptographic Properties of the Quantum Hashing Based on Expander Graphs
    Zinnatullin, I.
    LOBACHEVSKII JOURNAL OF MATHEMATICS, 2023, 44 (02) : 776 - 787
  • [3] Cryptographic Properties of the Quantum Hashing Based on Expander Graphs
    I. Zinnatullin
    Lobachevskii Journal of Mathematics, 2023, 44 : 776 - 787
  • [4] A combined chaotic cryptographic and hashing scheme
    Wong, KW
    PHYSICS LETTERS A, 2003, 307 (5-6) : 292 - 298
  • [5] Cryptographic hashing using chaotic hydrodynamics
    Gilpin, William
    PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2018, 115 (19) : 4869 - 4874
  • [6] SPONGENT: The Design Space of Lightweight Cryptographic Hashing
    Bogdanov, Andrey
    Knezevic, Miroslav
    Leander, Gregor
    Toz, Deniz
    Varici, Kerem
    Verbauwhede, Ingrid
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (10) : 2041 - 2053
  • [7] Cryptographic Module Based Approach for Password Hashing Schemes
    Chang, Donghoon
    Jati, Arpan
    Mishra, Sweta
    Sanadhya, Somitra Kumar
    TECHNOLOGY AND PRACTICE OF PASSWORDS, PASSWORDS'14, 2015, 9393 : 39 - 57
  • [8] Splittable pseudorandom number generators using cryptographic hashing
    1600, Association for Computing Machinery (48):
  • [9] Cryptographic Hashing in P4 Data Planes
    Scholz, Dominik
    Oeldemann, Andreas
    Geyer, Fabien
    Gallenmueller, Sebastian
    Stubbe, Henning
    Wild, Thomas
    Herkersdorf, Andreas
    Carle, Georg
    2019 ACM/IEEE SYMPOSIUM ON ARCHITECTURES FOR NETWORKING AND COMMUNICATIONS SYSTEMS (ANCS), 2019,
  • [10] Splittable Pseudorandom Number Generators using Cryptographic Hashing
    Claessen, Koen
    Palka, Michal H.
    ACM SIGPLAN NOTICES, 2013, 48 (12) : 47 - 58