Ternary quantum public-key cryptography based on qubit rotation

被引:0
|
作者
Yuqi Wang
Geng Chen
Liya Jian
Yi Zhou
Shiming Liu
机构
[1] Minnan Normal University,School of Computer
[2] Fujian Province University,Key Laboratory of Data Science and Intelligence Application
关键词
Quantum public-key cryptography; Qubit rotation; Ternary quantum;
D O I
暂无
中图分类号
学科分类号
摘要
Quantum public-key cryptography (QPKC) can perform the management and distribution of keys in a large-scale quantum communication network, thus being the foundation for many cryptographic applications. The QPKC system, which uses qubit rotation as a quantum one-way function, is one of the most practical public key systems and has found many valuable extensions. In this paper, we analyze and provide supplementary properties of binary qubit rotation. On the basis of Nikolopoulos’work (Phys Rev A 77(3):032348, 2008), we have extended the qubit rotation to three dimensions and propose a ternary QPKC protocol. The protocol can resist forward search attack and achieve higher security than binary QPKC protocol. Theoretically, the protocol can be extended to a higher dimension.
引用
收藏
相关论文
共 50 条
  • [1] Ternary quantum public-key cryptography based on qubit rotation
    Wang, Yuqi
    Chen, Geng
    Jian, Liya
    Zhou, Yi
    Liu, Shiming
    QUANTUM INFORMATION PROCESSING, 2022, 21 (06)
  • [2] Applications of single-qubit rotations in quantum public-key cryptography
    Nikolopoulos, Georgios M.
    PHYSICAL REVIEW A, 2008, 77 (03):
  • [3] Transferable Quantum Cheque Scheme Based on Quantum Public-Key Cryptography
    Chen, Hui-Min
    Jia, Heng-Yue
    Wu, Xia
    Wang, Xiu-Li
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2022, 61 (08)
  • [4] Transferable Quantum Cheque Scheme Based on Quantum Public-Key Cryptography
    Hui-Min Chen
    Heng-Yue Jia
    Xia Wu
    Xiu-Li Wang
    International Journal of Theoretical Physics, 61
  • [5] Public-key cryptography based on bounded quantum reference frames
    Ioannou, Lawrence M.
    Mosca, Michele
    THEORETICAL COMPUTER SCIENCE, 2014, 560 : 33 - 45
  • [6] PUBLIC-KEY CRYPTOGRAPHY
    ODLYZKO, AM
    AT&T TECHNICAL JOURNAL, 1994, 73 (05): : 17 - 23
  • [7] RFID privacy based on public-key cryptography
    Vaudenay, Serge
    Information Security and Cryptology - ICISC 2006, Proceedings, 2006, 4296 : 1 - 6
  • [8] THE ADOLESCENCE OF PUBLIC-KEY CRYPTOGRAPHY
    DIFFIE, W
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 2 - 2
  • [9] MATHEMATICS OF PUBLIC-KEY CRYPTOGRAPHY
    HELLMAN, ME
    SCIENTIFIC AMERICAN, 1979, 241 (02) : 146 - &
  • [10] Public-key cryptography and availability
    Stabell-Kulo, T
    Lupetti, S
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2005, 3688 : 222 - 232