Ternary quantum public-key cryptography based on qubit rotation

被引:0
|
作者
Yuqi Wang
Geng Chen
Liya Jian
Yi Zhou
Shiming Liu
机构
[1] Minnan Normal University,School of Computer
[2] Fujian Province University,Key Laboratory of Data Science and Intelligence Application
关键词
Quantum public-key cryptography; Qubit rotation; Ternary quantum;
D O I
暂无
中图分类号
学科分类号
摘要
Quantum public-key cryptography (QPKC) can perform the management and distribution of keys in a large-scale quantum communication network, thus being the foundation for many cryptographic applications. The QPKC system, which uses qubit rotation as a quantum one-way function, is one of the most practical public key systems and has found many valuable extensions. In this paper, we analyze and provide supplementary properties of binary qubit rotation. On the basis of Nikolopoulos’work (Phys Rev A 77(3):032348, 2008), we have extended the qubit rotation to three dimensions and propose a ternary QPKC protocol. The protocol can resist forward search attack and achieve higher security than binary QPKC protocol. Theoretically, the protocol can be extended to a higher dimension.
引用
收藏
相关论文
共 50 条
  • [41] A novel unified architecture for public-key cryptography
    Cilardo, A
    Mazzeo, A
    Mazzocca, N
    Romano, L
    DESIGNERS' FORUM: DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION, 2005, : 52 - 57
  • [42] Public-Key Cryptography from Different Assumptions
    Applebaum, Benny
    Barak, Boaz
    Wigderson, Avi
    STOC 2010: PROCEEDINGS OF THE 2010 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2010, : 171 - 180
  • [43] Public-key cryptography for RFID-tags
    Batina, L.
    Guajardo, J.
    Kerins, T.
    Mentens, N.
    Tuyls, P.
    Verbauwhede, I.
    FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, : 217 - +
  • [44] The Magic of Elliptic Curves and Public-Key Cryptography
    Florian Heß
    Andreas Stein
    Sandra Stein
    Manfred Lochter
    Jahresbericht der Deutschen Mathematiker-Vereinigung, 2012, 114 (2) : 59 - 88
  • [45] PUBLIC-KEY CRYPTOGRAPHY - FROM THEORY TO STANDARD
    TEREKHOV, AN
    TISKIN, AV
    PROGRAMMING AND COMPUTER SOFTWARE, 1994, 20 (05) : 189 - 192
  • [46] Information security, mathematics, and public-key cryptography
    Blake-Wilson, S
    DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) : 77 - 99
  • [47] Computational Thinking Enrichment: Public-Key Cryptography
    Rosamond, Frances
    INFORMATICS IN EDUCATION, 2018, 17 (01): : 93 - 103
  • [48] An-algebraic method for public-key cryptography
    Anshel, I
    Anshel, M
    Goldfeld, D
    MATHEMATICAL RESEARCH LETTERS, 1999, 6 (3-4) : 287 - 291
  • [49] Inverse matrices with applications in public-key cryptography
    Makoui, Farshid Haidary
    Gulliver, Thomas Aaron
    JOURNAL OF ALGORITHMS & COMPUTATIONAL TECHNOLOGY, 2024, 18
  • [50] SECRET-HARDWARE PUBLIC-KEY CRYPTOGRAPHY
    KAK, SC
    IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1986, 133 (02): : 94 - 96