Constructing quantum Hash functions based on quantum walks on Johnson graphs

被引:17
作者
Cao, Wei-Feng [1 ]
Zhang, Yong-Ce [2 ]
Yang, Yu-Guang [2 ]
Li, Dan [3 ]
Zhou, Yi-Hua [2 ]
Shi, Wei-Min [2 ]
机构
[1] Zhengzhou Univ Light Ind, Coll Elect & Informat Engn, Zhengzhou 450002, Henan, Peoples R China
[2] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Jiangsu, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Quantum cryptography; Quantum walk; Hash function; Collision; Birthday attack;
D O I
10.1007/s11128-018-1923-9
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
We present a quantum hash function in a quantum walk framework on Johnson graphs. In this quantum hash function, the message bit decides which coin operator, i.e., Grover operator or DFT operator, is applied on the coin at each step. Then a fixed conditional shift operator is applied to decide the movement of the walker. Compared with existing quantum-walk-based hash functions, the present hash function has a lower collision rate and quantum resource cost. It provides a clue for the construction of other cryptography protocols by introducing the quantum walk model into hash functions.
引用
收藏
页数:11
相关论文
共 26 条
[1]   On the balanced quantum hashing [J].
Ablayev, F. ;
Ablayev, M. ;
Vasiliev, A. .
INTERNATIONAL CONFERENCE ON COMPUTER SIMULATION IN PHYSICS AND BEYOND 2015, 2016, 681
[2]   Cryptographic quantum hashing [J].
Ablayev, F. M. ;
Vasiliev, A. V. .
LASER PHYSICS LETTERS, 2014, 11 (02)
[3]  
Aharonov D., 2001, P 33 ANN ACM S THEOR, P50, DOI DOI 10.1145/380752.380758
[4]   Quantum walk algorithm for element distinctness [J].
Ambainis, Andris .
SIAM JOURNAL ON COMPUTING, 2007, 37 (01) :210-239
[5]  
Babai L., ARXIV151203547
[6]  
Bellare M, 2004, LECT NOTES COMPUT SC, V3027, P401
[7]   Quantum fingerprinting [J].
Buhrman, H ;
Cleve, R ;
Watrous, J ;
de Wolf, R .
PHYSICAL REVIEW LETTERS, 2001, 87 (16)
[8]  
Chabaud F, 1998, LECT NOTES COMPUT SC, V1462, P56, DOI 10.1007/BFb0055720
[9]   Cryptanalysis of MD4 [J].
Dobbertin, H .
JOURNAL OF CRYPTOLOGY, 1998, 11 (04) :253-271
[10]  
Knuth D. E., 1998, Sorting and Searching, V2