期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Lattice-Based Authentication Scheme to Prevent Quantum Attack in Public Cloud Environment
1
作者 Naveed Khan Zhang Jianbiao +2 位作者 Intikhab Ullah Muhammad Salman Pathan Huhnkuk Lim 《Computers, Materials & Continua》 SCIE EI 2023年第4期35-49,共15页
Public cloud computing provides a variety of services to consumersvia high-speed internet. The consumer can access these services anytimeand anywhere on a balanced service cost. Many traditional authenticationprotocol... Public cloud computing provides a variety of services to consumersvia high-speed internet. The consumer can access these services anytimeand anywhere on a balanced service cost. Many traditional authenticationprotocols are proposed to secure public cloud computing. However, therapid development of high-speed internet and organizations’ race to developquantum computers is a nightmare for existing authentication schemes. Thesetraditional authentication protocols are based on factorization or discretelogarithm problems. As a result, traditional authentication protocols arevulnerable in the quantum computing era. Therefore, in this article, we haveproposed an authentication protocol based on the lattice technique for publiccloud computing to resist quantum attacks and prevent all known traditionalsecurity attacks. The proposed lattice-based authentication protocolis provably secure under the Real-Or-Random (ROR) model. At the sametime, the result obtained during the experiments proved that our protocol islightweight compared to the existing lattice-based authentication protocols,as listed in the performance analysis section. The comparative analysis showsthat the protocol is suitable for practical implementation in a quantum-basedenvironment. 展开更多
关键词 LATTICE AUTHENTICATION quantum attack ProVerif
下载PDF
Round-robin differential quadrature phase-shift quantum key distribution
2
作者 Chun Zhou Ying-Ying Zhang +3 位作者 Wan-Su Bao Hong-Wei Li Yang Wang Mu-Sheng Jiang 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第2期63-67,共5页
Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phas... Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phase-encoded Bennett-Brassard 1984 protocol(PE-BB84) to the RRDPS,this paper presents another quantum key distribution protocol called round-robin differential quadrature phase-shift(RRDQPS) quantum key distribution.Regarding a train of many pulses as a single packet,the sender modulates the phase of each pulse by one of {0,π/2,π,3π/2},then the receiver measures each packet with a Mach-Zehnder interferometer having a phase basis of 0 or π/2.The RRDQPS protocol can be implemented with essential similar hardware to the PE-BB84,so it has great compatibility with the current quantum system.Here we analyze the security of the RRDQPS protocol against the intercept-resend attack and the beam-splitting attack.Results show that the proposed protocol inherits the advantages arising from the simplicity of the RRDPS protocol and is more robust against these attacks than the original protocol. 展开更多
关键词 round-robin differential phase-shift protocol quantum key distribution intercept-resend attack beam-splitting attack
下载PDF
Collision Attacks against AEZ-PRF for Authenticated Encryption AEZ 被引量:2
3
作者 Tairong Shi Chenhui Jin Jie Guan 《China Communications》 SCIE CSCD 2018年第2期46-53,共8页
AEZ is an AES-based authenticated encryption submitted to the ongoing CAESAR competition and was presented at Eurocrypt2015 with AEZ v3. There are three models for AEZ, AEZ-core, AEZ-tiny and AEZ-prf. In this paper, w... AEZ is an AES-based authenticated encryption submitted to the ongoing CAESAR competition and was presented at Eurocrypt2015 with AEZ v3. There are three models for AEZ, AEZ-core, AEZ-tiny and AEZ-prf. In this paper, we consider the security of AEZprf for AEZ v4.2, the latest version of AEZ.Our major finding is a collision of any 256-bit associated data for AES-prf. Then we launch collision attacks in a quantum setting and a classical setting respectively under different assumptions. In the quantum setting, by Simon's quantum algorithm, we amount a forgery with O(n) quantum superposition queries and an overwhelming probability close to 1.In the classical setting, one with the key of AEZ-prf can also construct the forgeries. Our results show that the AEZ-prf models of AEZ v4.2 is not secure in both the quantum setting and classical world. Furthermore, our results can also be applied to AEZ v3, which has been published on Eurocrypt 2015. As far as we know, no cryptanalysis of AEZ v4.2 has been published so far. 展开更多
关键词 CAESAR competition authen-ticated encryption AEZ collision attacks quantum attacks
下载PDF
The Braid-Based Bit Commitment Protocol 被引量:1
4
作者 王励成 曹珍富 +1 位作者 曹锋 钱海峰 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期200-204,共5页
With recent advances of quantum computanon, new threats key cryptosystems. In order to build more secure bit commitment schemes, this paper gave a survey of the new coming braid-based cryptography and then brought for... With recent advances of quantum computanon, new threats key cryptosystems. In order to build more secure bit commitment schemes, this paper gave a survey of the new coming braid-based cryptography and then brought forward the first braid-based bit commitment protocol. The security proof manifests that the proposed protocol is computationally binding and information-theoretically hiding. Furthermore, the proposed protocol is also invulnerable to currently known quantum attacks. 展开更多
关键词 bit commitment braid-based cryptography quantum attacks
下载PDF
Conditions for advantageous quantum Bitcoin mining
5
作者 Robert R.Nerem Daya R.Gaur 《Blockchain(Research and Applications)》 EI 2023年第3期52-63,共12页
Our aim is to determine the conditions for quantum computing technology to give rise to the security risks associated with quantum Bitcoin mining.Specifically,we determine the speed and energy efficiency a quantum com... Our aim is to determine the conditions for quantum computing technology to give rise to the security risks associated with quantum Bitcoin mining.Specifically,we determine the speed and energy efficiency a quantum computer needs to offer an advantage over classical mining.We analyze the setting in which the Bitcoin network is entirely classical except for a single quantum miner with a small hash rate compared to the network.We develop a closed-form approximation for the probability that the quantum miner successfully mines a block,with this probability dependent on the number of Grover iterations the quantum miner applies before making a measurement.Next,we show that for a quantum miner that is“peaceful”,this success probability is maximized if the quantum miner applies Grover iterations for 16 min before measuring,which is surprising,as the network mines blocks every 10 min on average.Using this optimal mining procedure,we show that the quantum miner outperforms a classical computer in efficiency(cost per block)if the condition Q<Crb is satisfied,where Q is the cost of a Grover iteration,C is the cost of a classical hash,r is the quantum miner's speed in Grover iterations per second,and b is a factor that attains its maximum if the quantum miner uses our optimal mining procedure.This condition lays the foundation for determining when quantum mining and the known security risks associated with it will arise. 展开更多
关键词 quantum algorithms quantum mining Grover search Bitcoin quantum attacks
原文传递
A quantum circuit design of AES requiring fewer quantum qubits and gate operations 被引量:5
6
作者 Ze-Guo Wang Shi-Jie Wei Gui-Lu Long 《Frontiers of physics》 SCIE CSCD 2022年第4期99-105,共7页
Advanced Encryption Standard(AES)is one of the most widely used block ciphers nowadays,and has been established as an encryption standard in 2001.Here we design AES-128 and the sample-AES(S-AES)quantum circuits for de... Advanced Encryption Standard(AES)is one of the most widely used block ciphers nowadays,and has been established as an encryption standard in 2001.Here we design AES-128 and the sample-AES(S-AES)quantum circuits for deciphering.In the quantum circuit of AES-128,we perform an affine transformation for the SubBytes part to solve the problem that the initial state of the output qubits in SubBytes is not the|0⟩⊗8 state.After that,we are able to encode the new round sub-key on the qubits encoding the previous round sub-key,and this improvement reduces the number of qubits used by 224 compared with Langenberg et al.’s implementation.For S-AES,a complete quantum circuit is presented with only 48 qubits,which is already within the reach of existing noisy intermediate-scale quantum computers. 展开更多
关键词 AES S-AES quantum circuit quantum attack
原文传递
Quantum Private Comparison via Cavity QED 被引量:2
7
作者 Tian-Yu Ye 《Communications in Theoretical Physics》 SCIE CAS CSCD 2017年第2期147-156,共10页
The first quantum private comparison(QPC) protocol via cavity quantum electrodynamics(QED) is proposed in this paper by making full use of the evolution law of atom via cavity QED, where the third party(TP) is allowed... The first quantum private comparison(QPC) protocol via cavity quantum electrodynamics(QED) is proposed in this paper by making full use of the evolution law of atom via cavity QED, where the third party(TP) is allowed to misbehave on his own but cannot conspire with either of the two users. The proposed protocol adopts two-atom product states rather than entangled states as the initial quantum resource, and only needs single-atom measurements for two users. Both the unitary operations and the quantum entanglement swapping operation are not necessary for the proposed protocol. The proposed protocol can compare the equality of one bit from each user in each round comparison with one two-atom product state. The proposed protocol can resist both the outside attack and the participant attack.Particularly, it can prevent TP from knowing two users' secrets. Furthermore, the qubit efficiency of the proposed protocol is as high as 50%. 展开更多
关键词 quantum private comparison(QPC) third party(TP) cavity quantum electrodynamics(QED) product state participant attack
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部