期刊文献+

高效的多比特量子公钥加密方案 被引量:1

An Efficient Multi-Bit Quantum Public Key Encryption Scheme
原文传递
导出
摘要 在量子计算机问世后,目前广泛使用的公钥密码体制将被破译,故而急需提出新的可替换的抗量子计算攻击的公钥密码体制.结合量子比特旋转变换和经典的单向函数(Hash函数)构建了一个多比特的量子公钥加密方案,分析结果显示,该方案可以抵制前向搜索和选择密文攻击,而且加密相同长度的明文所需的公钥量子比特数比Kawachi等的方案显著降低. After the advent of quantum computers,the widely used public key cryptosystem will be broken,so it is urgent to propose new public key schemes to resistant quantum computing attacks.A single qubit-rotation transformation and classical one-way functions(Hash functions)are used to construct a multi-qubit quantum public key encryption scheme.The analysis results show that the new scheme is against the known forward search attack and a chosen ciphertext attack.Furthermore,the number of public key qubits used in the new scheme is obviously lower than that in the scheme presented by Kawachi et al.
作者 郑世慧 闻楷 谷利泽 ZHENG Shi-hui;WEN Kai;GU Li-ze(School of Cyberspace,Beijing University of Posts and Telecommunications,Beijing 100876,China)
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2019年第4期38-42,共5页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(61502048) 国家科技重大专项项目(2017YFB0803001)
关键词 多比特量子公钥加密 选择密文攻击 前向搜索攻击 multi-bit quantum public key encryption chosen ciphertext attack forward search attack
  • 相关文献

参考文献1

二级参考文献34

  • 1GROVER L K. Quantum mechanics helps in searching for a needle in a haystack[J]. Physical Review Letters, 1997, 79(2): 325-328.
  • 2.tIANG M, ZHANG Z K, L! X X, et oL Improved scheme for probabilistic transformation and teleportation of multi-particle quantum states[J]. Tsinghua Science And Technology, 2009, 6(14): 735-738.
  • 3JIANG M, HUANG X, ZHOU Y M. Deterministic teleportation channel using Bell state measure- ments only[.J]. Tsinghua Science And Technolo- gy, 2010, 2(15): 184-189.
  • 4BENNETT C 14, BRASSARD G. Quantum cryptog- raphy: Public-key distribution and tossing[C]// Proceeding of IEEE International Conference on Computers, Systems and Signal Processing: December 10-12, 1984, Bangalore, India, 1984: 175-179.
  • 5SHOR P W, PRESKILL] J. Simple proof of security of the BB84 quantum key distribution proto- col[J]. Physical Review Letters, 2000, 85(2): 441- 444.
  • 6LU H, CAI Q Y. Quantum key distribution with classical Alice[J]. International Journal of Quan- tum Information, 2008, 6(6): 1195-1202.
  • 7U X H, DENG F G, ZHOU H Y. Efficient quantumkey distribution over a collective noise chan- nel[J]. Physical Review A, 2008, 78(2): 022322.
  • 8GAO F, UU B, WEN Q Y, et aL Flexible quantum private queries based on quantum key distri- bution[J]. Optics express, 2012, 20(16): 17411- 27420.
  • 9I QURESHI "1", SHIBLI 1", SHEEL A. Master key se- cured quantum key distribution[EB/OL]. [2013- 01-17]. http://a rxiv.org/a bs/1301.5015.
  • 10BEAUDRY N, LUCAMARINI M, MANCINI S, et aL Security of two-way quantum key distribu- tion[J]. Physical Review A, 2023, 88(6): 062302- 22.

共引文献1

同被引文献14

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部