A probabilistic model of quantum states for classical data security

被引:2
作者
Hafiz, Muhammad Waseem [1 ]
Hwang, Seong Oun [2 ]
机构
[1] Gachon Univ, Dept IT Convergence Engn, Seongnam 13120, South Korea
[2] Gachon Univ, Dept Comp Engn, Seongnam 13120, South Korea
基金
新加坡国家研究基金会;
关键词
information security; quantum-classical cryptography; quantum information processing; quantum spin states; spin-1/2; algebra; user authentication; PUBLIC-KEY CRYPTOSYSTEM; DISCRETE LOGARITHMS; COMPUTATION; ALGORITHMS;
D O I
10.1007/s11467-023-1293-3
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
The phenomenal progress of quantum information theory over the last decade has substantially broadened the potential to simulate the superposition of states for exponential speedup of quantum algorithms over their classical peers. Therefore, the conventional and modern cryptographic standards (encryption and authentication) are susceptible to Shor's and Grover's algorithms on quantum computers. The significant improvement in technology permits consummate levels of data protection by encoding classical data into small quantum states that can only be utilized once by leveraging the capabilities of quantum-assisted classical computations. Considering the frequent data breaches and increasingly stringent privacy legislation, we introduce a hybrid quantum-classical model to transform classical data into unclonable states, and we experimentally demonstrate perfect state transfer to exemplify the classical data. To alleviate implementation complexity, we propose an arbitrary quantum signature scheme that does not require the establishment of entangled states to authenticate users in order to transmit and receive arbitrated states to retrieve classical data. The consequences of the probabilistic model indicate that the quantum-assisted classical framework substantially enhances the performance and security of digital data, and paves the way toward real-world applications.
引用
收藏
页数:12
相关论文
共 71 条
  • [11] Bhat M I., 2021, IMPACT COMPUTATIONAL, P45
  • [12] Bhatt Alekha Parimal, 2019, [Journal of Electronic Science and Technology, 电子科技学刊(英文版)], V17, P213
  • [13] Bone S., 1997, BRIEF HIST QUANTUM C
  • [14] Borowitz M., 2022, MILITARY USE SMALL S
  • [15] Boudot Fabrice, 2020, Advances in Cryptology - CRYPTO 2020. 40th Annual International Cryptology Conference, CRYPTO 2020. Proceedings. Lecture Notes in Computer Science (LNCS 12171), P62, DOI 10.1007/978-3-030-56880-1_3
  • [16] Branson J., 2013, QUANTUM PHYS DERIVE
  • [17] Cryptanalysis of quantum digital signature for the access control of sensitive data
    Cai, Xiao-Qiu
    Wang, Tian-Yin
    Wei, Chun-Yan
    Gao, Fei
    [J]. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2022, 593
  • [18] Chow J., 2021, IBM QUANTUM BREAKS 1
  • [19] Erwin S., 2021, Space News
  • [20] The controlled SWAP test for determining quantum entanglement
    Foulds, Steph
    Kendon, Viv
    Spiller, Tim
    [J]. QUANTUM SCIENCE AND TECHNOLOGY, 2021, 6 (03)