Bit-oriented quantum public-key encryption based on quantum perfect encryption

被引:0
作者
Chenmiao Wu
Li Yang
机构
[1] Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Information Engineering
[2] Chinese Academy of Sciences,Data Assurance and Communication Security Research Center
[3] University of Chinese Academy of Sciences,undefined
来源
Quantum Information Processing | 2016年 / 15卷
关键词
Quantum cryptography; Quantum public-key encryption; Bit-oriented encryption; Information-theoretic security;
D O I
暂无
中图分类号
学科分类号
摘要
A bit-oriented quantum public-key encryption scheme is presented. We use Boolean functions as private-key and randomly changed pairs of quantum state and classical string as public-keys. Following the concept of quantum perfect encryption, we prepare the public-key with Hadamard transformation and Pauli transformation. The quantum part of public-keys is various with different classical strings. In contrast to the typical classical public-key scheme, one private-key in our scheme corresponds to an exponential number of public-keys. We investigate attack to the private-key and prove that the public-key is a totally mixed state. So the adversary cannot acquire any information about private-key from measurement of the public-key. Then, the attack to encryption is analyzed. Since the trace distance between two different ciphertexts is zero, the adversary cannot distinguish between the two ciphertext states and also obtains nothing about plaintext and private-key. Thus, we have the conclusion that the proposed scheme is information-theoretically secure under an attack of the private-key and encryption.
引用
收藏
页码:3285 / 3300
页数:15
相关论文
共 12 条
[1]  
Kawachi A(2012)Computational indistinguishability between quantum states and its cryptographic application J. Cryptol. 25 528-555
[2]  
Koshiba T(2008)Applications of single-qubit rotations in quantum public-key cryptography Phys. Rev. A 77 032348-202
[3]  
Nishimura H(2009)Deterministic quantum-public-key encryption: forward search attack and randomization Phys. Rev. A 79 042327-undefined
[4]  
Yamakami T(2012)Symmetries and security of a quantum-public-key encryption based on single-qubit rotations Phys. Rev. A 85 022342-undefined
[5]  
Nikolopoulos GM(2012)Quantum McEliece public-key cryptosystem Quantum Inf. Comput. 12 181-undefined
[6]  
Nikolopoulos GM(2003)Optimal encryption of quantum bits Phys. Rev. A 67 042317-undefined
[7]  
Seyfarth U(undefined)undefined undefined undefined undefined-undefined
[8]  
Nikolopoulos GM(undefined)undefined undefined undefined undefined-undefined
[9]  
Alber G(undefined)undefined undefined undefined undefined-undefined
[10]  
Fujita H(undefined)undefined undefined undefined undefined-undefined