期刊文献+

簇态量子模糊哈希与隐蔽信息搜索(英文) 被引量:1

Cluster states quantum fuzzy hashing and covert information search
下载PDF
导出
摘要 提出一种采用经典-量子ε-universal哈希类的簇态量子模糊哈希构造方法.传统哈希与模糊哈希算法不能有效抵抗量子攻击.通过采用diamond范数方法,构建了一种哈希函数类最优子集并且提供信息论意义上的更优安全性.基于量子簇态独特的物理级单向计算属性,相应算法更接近于物理可实现.进一步,构造了一种在信息安全与生物特征识别方面的隐蔽信息搜索策略.该生物识别搜索算法基于簇态量子ε-universal模糊哈希构建.该策略能有效抵抗量子算法攻击,确保数据存储安全,并降低了计算复杂度.相比于其他类似策略,此算法具有更精简的结构,理论分析表明此算法具有较高的识别效率与更好的数据安全性. A novel construction method of cluster states quantum fuzzy hash utilizing classical-quantum ε-universal hashing family was proposed. Traditional hash and fuzzy hash algorithm are not effective against quantum attacks. Utilizing the method of diamond norm, an optimal subset of hash functions family was constructed and better security on the sense of information theory was guaranteed. Based on the unique physical one-way computation properties of quantum cluster states, the corresponding algorithm is more close to the physical realization. And then, a novel scheme of covert information search in the field of information security and biometrics was presented. The biometrics search algorithm is constructed from the cluster states quantum ε-universal fuzzy hashing. The algorithm can effectively resist the quantum algorithm attack, ensure data storage security and reduce the complexity. Compared to others similar schemes, the algorithm has a more simplified structure. Theoretical analysis shows that the algorithm has higher recognition efficiency and better data security.
作者 曹东
出处 《量子电子学报》 CAS CSCD 北大核心 2015年第1期58-68,共11页 Chinese Journal of Quantum Electronics
基金 supported by the National Natural Science Foundation of China(61071145,61271331) the Specialized Research Fund for the Doctoral Program of Higher Education(200802880014) the China Postdoctoral Science Foundation(2013M541671) Jiangsu Province Postdoctoral Science Foundation(1302076B)
关键词 量子光学 信息安全 隐蔽通信 量子哈希 quantum optics information security covert communication quantum hash
  • 相关文献

参考文献3

二级参考文献32

  • 1胡韦伟,汪荣贵,方帅,胡琼.基于双边滤波的Retinex图像增强算法[J].工程图学学报,2010,31(2):104-109. 被引量:55
  • 2ZHANG XingLan1 & JI DongYao2 1 College of Computer Science and Technology, Beijing University of Technology, Beijing 100124, China,2 State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences, Beijing 100049, China.Analysis of a kind of quantum cryptographic schemes based on secret sharing[J].Science China(Physics,Mechanics & Astronomy),2009,52(9):1313-1316. 被引量:8
  • 3龚薇,斯科,叶秀清,顾伟康.一种强鲁棒性的实时图像增强算法[J].传感技术学报,2007,20(9):2024-2028. 被引量:16
  • 4Juels A, Wattenberg M. A fuzzy commitment scheme [A]. The 6th ACM Conference on Computer and Communications Security [ C].New York:ACM Press, 1999.28- 36.
  • 5Emanuele M, Patrizio C. Fuzzy Commitment for Function Based Signature Template Protection [ J ]. IEEE Signal Processing Letters, 2010,17(3) : 249 - 252.
  • 6Tanya I,Frans M J W. Information Leakage in Fuzzy Commitment Schemes [J]. IFEE Transactions on Information Forensics and Security,2010,5(2) :337 - 348.
  • 7Emile J C K, Jeroen B, Tom A M K, Ileana B,and Raymond N J V. Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme [J]. IEEE Transactions on Information Forensics and Security, 2011,6( 1 ) : 107 - 121.
  • 8Hsieh M H, Francois L G. NP-hardness of decoding quantum error correction codes [J]. Physical Review A, 2011,83 ( 5 ) : 052331.
  • 9Gottesman D. A theory of fault-tolerant quantum computation [J]. Physical Review A, 1998,57 (1) : 127 - 137.
  • 10Brun T, Devetak I, and Hsieh M H. Correcting quantum errors with entanglement [J]. Science,2006,314(5798) :436 - 439.

共引文献41

同被引文献4

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部