Cryptographic Properties of the Quantum Hashing Based on Expander Graphs

被引:0
|
作者
Zinnatullin, I. [1 ]
机构
[1] Kazan Fed Univ, Inst Computat Math & Informat Technol, Kazan 420008, Tatarstan, Russia
关键词
quantum hash function; quantum cryptography; expander graph;
D O I
10.1134/S1995080223020397
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Quantum hashing is a useful technique in different computational and cryptographic scenarios in the quantum world. A set of random parameters is required to construct a quantum hashing scheme. For instance, random walks on expander graphs (expanders) are known to be efficient randomness generators in many areas of computer science. We analyze a scheme based on expanders. Collision resistance and preimage resistance of this scheme are considered. We show that quantum hashing based on expanders is collision-resistant (in quantum sense), and the considered scheme's accessible information is O(1).
引用
收藏
页码:776 / 787
页数:12
相关论文
共 50 条
  • [41] Generating sets for the multiplicative groups of algebras over finite fields and expander graphs
    Huang, Ming-Deh
    Liu, Lian
    JOURNAL OF SYMBOLIC COMPUTATION, 2018, 85 : 170 - 187
  • [42] High-dimensional cryptographic quantum parameter estimation
    Xie, Dong
    Xu, Chunling
    Chen, Jianyong
    Wang, An Min
    QUANTUM INFORMATION PROCESSING, 2018, 17 (05)
  • [43] Comments on "A Quantum Cryptographic Protocol for Secure Vehicular Communication"
    Shi, Run-Hua
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (12) : 21796 - 21798
  • [44] Using quantum key distribution for cryptographic purposes: A survey
    Alleaume, R.
    Branciard, C.
    Bouda, J.
    Debuisschert, T.
    Dianati, M.
    Gisin, N.
    Godfrey, M.
    Grangier, P.
    Laenger, T.
    Luetkenhaus, N.
    Monyk, C.
    Painchault, P.
    Peev, M.
    Poppe, A.
    Pornin, T.
    Rarity, J.
    Renner, R.
    Ribordy, G.
    Riguidel, M.
    Salvail, L.
    Shields, A.
    Weinfurter, H.
    Zeilinger, A.
    THEORETICAL COMPUTER SCIENCE, 2014, 560 : 62 - 81
  • [45] Controlling the key by choosing the detection bits in quantum cryptographic protocols
    Liu Bin
    Gao Fei
    Huang Wei
    Li Dan
    Wen QiaoYan
    SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (11) : 1 - 11
  • [46] Computational Indistinguishability Between Quantum States and Its Cryptographic Application
    Kawachi, Akinori
    Koshiba, Takeshi
    Nishimura, Harumichi
    Yamakami, Tomoyuki
    JOURNAL OF CRYPTOLOGY, 2012, 25 (03) : 528 - 555
  • [47] A complete quantum cryptographic system using a continuous wave laser
    Sharma, V
    Lance, AM
    Symul, T
    Weedbrook, C
    Ralph, TC
    Lam, PK
    PHOTONICS: DESIGN, TECHNOLOGY, AND PACKAGING II, 2006, 6038
  • [48] Computational Indistinguishability Between Quantum States and Its Cryptographic Application
    Akinori Kawachi
    Takeshi Koshiba
    Harumichi Nishimura
    Tomoyuki Yamakami
    Journal of Cryptology, 2012, 25 : 528 - 555
  • [49] Controlling the key by choosing the detection bits in quantum cryptographic protocols
    LIU Bin
    GAO Fei
    HUANG Wei
    LI Dan
    WEN QiaoYan
    ScienceChina(InformationSciences), 2015, 58 (11) : 200 - 210
  • [50] Cryptographic Key Distribution in Optical Systems: Quantum vs. Chaos
    Guerreiro, A.
    ICTON: 2009 11TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, VOLS 1 AND 2, 2009, : 812 - 813