Constructing quantum Hash functions based on quantum walks on Johnson graphs

被引:0
作者
Wei-Feng Cao
Yong-Ce Zhang
Yu-Guang Yang
Dan Li
Yi-Hua Zhou
Wei-Min Shi
机构
[1] Zhengzhou University of Light Industry,College of Electric and Information Engineering
[2] Beijing University of Technology,Faculty of Information Technology
[3] Nanjing University of Aeronautics and Astronautics,College of Computer Science and Technology
来源
Quantum Information Processing | 2018年 / 17卷
关键词
Quantum cryptography; Quantum walk; Hash function; Collision; Birthday attack;
D O I
暂无
中图分类号
学科分类号
摘要
We present a quantum hash function in a quantum walk framework on Johnson graphs. In this quantum hash function, the message bit decides which coin operator, i.e., Grover operator or DFT operator, is applied on the coin at each step. Then a fixed conditional shift operator is applied to decide the movement of the walker. Compared with existing quantum-walk-based hash functions, the present hash function has a lower collision rate and quantum resource cost. It provides a clue for the construction of other cryptography protocols by introducing the quantum walk model into hash functions.
引用
收藏
相关论文
共 53 条
[1]  
Buhrman H(2001)Quantum fingerprinting Phys. Rev. Lett. 87 167902-239
[2]  
Cleve R(2014)Cryptographic quantum hashing Laser Phys. Lett. 11 025202-424
[3]  
Watrous J(2016)On the balanced quantum hashing J. Phys: Conf. Ser. 681 012019-1513
[4]  
de Wolf R(2007)Quantum walk algorithm for element distinctness SIAM J. Comput. 37 210-2176
[5]  
Ablayev F(2007)Quantum algorithms for the triangle problem SIAM J. Comput. 37 413-271
[6]  
Vasiliev A(2014)A quantum-walk-inspired adiabatic algorithm for solving graph isomorphism problems J. Phys. A: Math. Theor. 47 325302-undefined
[7]  
Ablayev F(2013)Discrete-time interacting quantum walks and quantum Hash schemes Quantum Inf. Process. 12 1501-undefined
[8]  
Ablayev M(2013)Analysis of the two-particle controlled interacting quantum walks Quantum Inf. Process. 12 2167-undefined
[9]  
Vasiliev A(2016)Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption Sci. Rep. 6 19788-undefined
[10]  
Ambainis A(2012)Two quantum walkers sharing coins Phys. Rev. A 85 022307-undefined