Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption

被引:73
作者
Yang, Yu-Guang [1 ,2 ,3 ,4 ]
Xu, Peng [1 ]
Yang, Rui [1 ]
Zhou, Yi-Hua [1 ]
Shi, Wei-Min [1 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci & Technol, Beijing 100124, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[3] Beijing Key Lab Trusted Comp, Beijing 100124, Peoples R China
[4] Natl Engn Lab Crit Technol Informat Secur Classif, Beijing 100124, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
STATISTICAL COMPLEXITY; RECURRENCE PLOTS; ALGORITHM;
D O I
10.1038/srep19788
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudorandom number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information.
引用
收藏
页数:14
相关论文
共 48 条
[1]   A novel parallel hash function based on 3D chaotic map [J].
Akhavan, Amir ;
Samsudin, Azman ;
Akhshani, Afshin .
EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2013,
[2]   Pseudo random number generator based on quantum chaotic map [J].
Akhshani, A. ;
Akhavan, A. ;
Mobaraki, A. ;
Lim, S. -C. ;
Hassan, Z. .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (01) :101-111
[3]   An image encryption scheme based on quantum logistic map [J].
Akhshani, A. ;
Akhavan, A. ;
Lim, S. -C. ;
Hassan, Z. .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2012, 17 (12) :4653-4661
[4]   Hash function based on hierarchy of 2D piecewise nonlinear chaotic maps [J].
Akhshani, A. ;
Behnia, S. ;
Akhavan, A. ;
Jafarizadeh, M. A. ;
Abu Hassan, H. ;
Hassan, Z. .
CHAOS SOLITONS & FRACTALS, 2009, 42 (04) :2405-2412
[5]   Quantum walk algorithm for element distinctness [J].
Ambainis, Andris .
SIAM JOURNAL ON COMPUTING, 2007, 37 (01) :210-239
[6]   Using a biased quantum random walk as a quantum lumped element router [J].
Babatunde, Ayeni M. ;
Cresser, James ;
Twamley, Jason .
PHYSICAL REVIEW A, 2014, 90 (01)
[7]   Permutation entropy: A natural complexity measure for time series [J].
Bandt, C ;
Pompe, B .
PHYSICAL REVIEW LETTERS, 2002, 88 (17) :4
[8]   A wavelet-based tool for studying non-periodicity [J].
Benitez, R. ;
Bolos, V. J. ;
Ramirez, M. E. .
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 60 (03) :634-641
[9]  
Bennett C.H., 1984, PROC IEEE INT C COMP, P175, DOI DOI 10.1016/J.TCS.2014.05.025
[10]   Generalized privacy amplification [J].
Bennett, CH ;
Brassard, G ;
Crepeau, C ;
Maurer, UM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) :1915-1923