Twin-field quantum encryption protocol for E-payment based on blockchain

被引:0
作者
Guo-Dong Li
Jun-Jie Luo
Qing-Le Wang
机构
[1] North China Electric Power University,School of Control and Computer Engineering
[2] Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology
[3] Third Research Institute of the Ministry of Public Security,Key Laboratory of Information Network Security of Ministry of Public Security
来源
Quantum Information Processing | / 22卷
关键词
E-payment; Twin-field quantum; Quantum identity authentication; Blockchain;
D O I
暂无
中图分类号
学科分类号
摘要
Electronic payment (E-payment) systems rely heavily on secure communication, typically achieved through encryption processes in cryptography. Traditional cryptography often relies on complex mathematical problems for encryption, such as difficult decompositions or extracting discrete logarithms. With the development of quantum computing, the security of these classical encryption methods is under threat. To address this challenge, quantum E-payment protocols have emerged as a potential solution. However, the practical quantum E-payment protocols are limited due to the channel transmission efficiency decreasing exponentially with distance. This is further constrained by the Pirandola–Laurenza–Ottaviani–Banchi (PLOB) bound. To address this challenge, we propose a twin-field quantum encryption protocol for E-payment based on blockchain. In our protocol, we propose a twin-field quantum encryption method to authenticate identity and detect eavesdropping simultaneously. It not only eliminates side-channel attacks on the detectors but also has the potential to break the PLOB bound. Our security analysis shows that our E-payment protocol exhibits security properties such as blindness, unforgeability, and undeniability. Furthermore, our protocol demonstrates withstand against common inside and outside attacks.
引用
收藏
相关论文
共 142 条
  • [1] Junadi S(2015)A model of factors influencing consumer’s intention to use e-payment system in Indonesia Procedia Comput. Sci. 59 214-220
  • [2] Shor PW(1999)Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer SIAM Rev. 41 303-332
  • [3] Lo H-K(1997)Insecurity of quantum secure computations Phys. Rev. A 56 1154-21
  • [4] Brassard G(1994)Quantum computing: The end of classical cryptography? ACM SIGACT News 25 15-627
  • [5] Bellare M(2000)Design, implementation, and deployment of the IKP secure electronic payment system IEEE J. Sel. Areas Commun. 18 611-1166
  • [6] Garay JA(2018)Outsourcing service fair payment based on blockchain and its applications in cloud computing IEEE Trans. Serv. Comput. 14 1152-195
  • [7] Hauser R(1995)Quantum cryptography: How to beat the code breakers using quantum mechanics Contemp. Phys. 36 165-406
  • [8] Herzberg A(2001)Unconditional security in quantum cryptography J. ACM (JACM) 48 351-558
  • [9] Krawczyk H(2010)An e-payment system based on quantum blind and group signature Phys. Scr. 82 065403-1657
  • [10] Steiner M(2013)An inter-bank e-payment protocol based on quantum proxy blind signature Quantum Inf. Process. 12 549-2989