Ternary quantum public-key cryptography based on qubit rotation

被引:0
|
作者
Yuqi Wang
Geng Chen
Liya Jian
Yi Zhou
Shiming Liu
机构
[1] Minnan Normal University,School of Computer
[2] Fujian Province University,Key Laboratory of Data Science and Intelligence Application
关键词
Quantum public-key cryptography; Qubit rotation; Ternary quantum;
D O I
暂无
中图分类号
学科分类号
摘要
Quantum public-key cryptography (QPKC) can perform the management and distribution of keys in a large-scale quantum communication network, thus being the foundation for many cryptographic applications. The QPKC system, which uses qubit rotation as a quantum one-way function, is one of the most practical public key systems and has found many valuable extensions. In this paper, we analyze and provide supplementary properties of binary qubit rotation. On the basis of Nikolopoulos’work (Phys Rev A 77(3):032348, 2008), we have extended the qubit rotation to three dimensions and propose a ternary QPKC protocol. The protocol can resist forward search attack and achieve higher security than binary QPKC protocol. Theoretically, the protocol can be extended to a higher dimension.
引用
收藏
相关论文
共 50 条
  • [31] Public-key cryptography and invariant theory
    Grigoriev D.
    Journal of Mathematical Sciences, 2005, 126 (3) : 1152 - 1157
  • [32] Probability theory and public-key cryptography
    Bessonov, Mariya
    Grigoriev, Dima
    Shpilrain, Vladimir
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS- COMPUTER SYSTEMS THEORY, 2021, 6 (04) : 285 - 290
  • [33] Public-key cryptography on smart cards
    Fuchsberger, A
    Gollmann, D
    Lothian, P
    Paterson, KG
    Sidiropoulos, A
    CRYPTOGRAPHY: POLICY AND ALGORITHMS, 1996, 1029 : 250 - 269
  • [34] Hierarchical key assignment without public-key cryptography
    Lin, CH
    COMPUTERS & SECURITY, 2001, 20 (07) : 612 - 619
  • [35] Traitor tracing using identity based public-key cryptography
    National Key Laboratory of ISN, Xidian University, Xi'an 710071, China
    不详
    Chin J Electron, 2006, 4 (687-691):
  • [36] Traitor tracing using identity based public-key cryptography
    Lv Xixiang
    Yang Bo
    CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (04): : 687 - 691
  • [37] Efficient Public-Key Cryptography in the Presence of Key Leakage
    Dodis, Yevgeniy
    Haralambiev, Kristiyan
    Lopez-Alt, Adriana
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 613 - 631
  • [38] Public-Key Cryptography Based on a Cubic Extension of the Lucas Functions
    Roettger, Eric
    Williams, Hugh C.
    FUNDAMENTA INFORMATICAE, 2012, 114 (3-4) : 325 - 344
  • [39] A public-key quantum group blind signature scheme based on single-qubit rotations
    Tian, Fuyao
    Lu, Dianjun
    Wang, Chengxiang
    Yao, Weixin
    LASER PHYSICS LETTERS, 2024, 21 (03)
  • [40] Generalized public-key cryptography with tight security
    Wu, Ge
    Guo, Fuchun
    Susilo, Willy
    INFORMATION SCIENCES, 2019, 504 : 561 - 577