Computational Indistinguishability Between Quantum States and Its Cryptographic Application

被引:0
作者
Akinori Kawachi
Takeshi Koshiba
Harumichi Nishimura
Tomoyuki Yamakami
机构
[1] Tokyo Institute of Technology,Department of Mathematical and Computing Sciences
[2] Saitama University,Division of Mathematics, Electronics and Informatics, Graduate School of Science and Engineering
[3] Osaka Prefecture University,Department of Mathematics and Information Sciences, Graduate School of Science
[4] Japan Science and Technology Agency,ERATO
来源
Journal of Cryptology | 2012年 / 25卷
关键词
Quantum cryptography; Computational indistinguishability; Trapdoor; Worst-case/average-case equivalence; Graph automorphism problem; Quantum public-key cryptosystem;
D O I
暂无
中图分类号
学科分类号
摘要
We introduce a computational problem of distinguishing between two specific quantum states as a new cryptographic problem to design a quantum cryptographic scheme that is “secure” against any polynomial-time quantum adversary. Our problem, QSCDff, is to distinguish between two types of random coset states with a hidden permutation over the symmetric group of finite degree. This naturally generalizes the commonly-used distinction problem between two probability distributions in computational cryptography. As our major contribution, we show that QSCDff has three properties of cryptographic interest: (i) QSCDff has a trapdoor; (ii) the average-case hardness of QSCDff coincides with its worst-case hardness; and (iii) QSCDff is computationally at least as hard as the graph automorphism problem in the worst case. These cryptographic properties enable us to construct a quantum public-key cryptosystem which is likely to withstand any chosen plaintext attack of a polynomial-time quantum adversary. We further discuss a generalization of QSCDff, called QSCDcyc, and introduce a multi-bit encryption scheme that relies on similar cryptographic properties of QSCDcyc.
引用
收藏
页码:528 / 555
页数:27
相关论文
共 49 条
[1]  
Aharonov D.(2007)Adiabatic quantum state generation SIAM J. Comput. 37 47-82
[2]  
Ta-Shma A.(2006)Graph isomorphism is in SPP Inf. Comput. 204 835-852
[3]  
Arvind V.(1984)How to generate cryptographically strong sequences of pseudo-random bits SIAM J. Comput. 13 850-864
[4]  
Kurur P.P.(2006)On worst-case to average-case reductions for NP problems SIAM J. Comput. 36 1119-1159
[5]  
Blum M.(1976)New directions in cryptography IEEE Trans. Inf. Theory IT-22 644-654
[6]  
Micali S.(2000)On quantum algorithms for noncommutative hidden subgroups Adv. Appl. Math. 25 239-251
[7]  
Bogdanov A.(1984)Probabilistic encryption J. Comput. Syst. Sci. 28 270-299
[8]  
Trevisan L.(2004)Quantum mechanical algorithms for the nonabelian hidden subgroup problem Combinatorica 24 137-154
[9]  
Diffie W.(1988)Complexity measures for public-key cryptosystems SIAM J. Comput. 17 309-335
[10]  
Hellman M.E.(2003)The hidden subgroup problem and quantum computation using group representations SIAM J. Comput. 32 916-934