Skip to main content
Top
Published in: Quantum Information Processing 11/2020

01-11-2020

Quantum public-key encryption schemes based on conjugate coding

Authors: Li Yang, Biyao Yang, Chong Xiang

Published in: Quantum Information Processing | Issue 11/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We present several quantum public-key encryption (QPKE) protocols designed using conjugate coding single-photon strings; thus, they may be realized in the laboratory using current techniques. The first two schemes can encrypt one-bit messages; these are then extended to two kinds of QPKE schemes oriented toward multi-bit messages. In these schemes, Boolean functions are used as private keys and classical-quantum pairs as public keys, where one private key corresponds to an exponential number of public keys. Later, we discuss some issues related to authentication and a possible way to improve the security of the proposed schemes in this paper. The novel structure of the protocols presented here ensures that most of them are information-theoretic secure under attacks on the private key and on the encryption, while they can be realized more easily compared to other protocols.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Rivest, R.L., Shamir, A., Adleman, L.A.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978)MathSciNetCrossRef Rivest, R.L., Shamir, A., Adleman, L.A.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978)MathSciNetCrossRef
2.
go back to reference ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31, 469–471 (1985)MathSciNetCrossRef ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31, 469–471 (1985)MathSciNetCrossRef
3.
go back to reference Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Goldwasser, S. (ed.) Proceedings of the 35th Annual Symposium on the Foundations of Computer Science, pp. 124–134 (1994) Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Goldwasser, S. (ed.) Proceedings of the 35th Annual Symposium on the Foundations of Computer Science, pp. 124–134 (1994)
4.
go back to reference Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India. IEEE, New York (1984) Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India. IEEE, New York (1984)
5.
go back to reference Ekert, A.K.: Quantum cryptography based on Bell?s theorem. Phys. Rev. Lett. 67, (1991) Ekert, A.K.: Quantum cryptography based on Bell?s theorem. Phys. Rev. Lett. 67, (1991)
6.
go back to reference Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, (1992) Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, (1992)
7.
go back to reference Wang, L., Zhou, Y., Zhou, X., et al.: New scheme for measurement-device-independent quantum key distribution. Quantum Inf. Process. 17, 231 (2018)ADSMathSciNetCrossRef Wang, L., Zhou, Y., Zhou, X., et al.: New scheme for measurement-device-independent quantum key distribution. Quantum Inf. Process. 17, 231 (2018)ADSMathSciNetCrossRef
8.
go back to reference Lee, C., Mower, J., Zhang, Z., et al.: Finite-key analysis of high-dimensional time–energy entanglement-based quantum key distribution. Quantum Inf. Process. 14, 1005–1015 (2015)ADSMathSciNetCrossRef Lee, C., Mower, J., Zhang, Z., et al.: Finite-key analysis of high-dimensional time–energy entanglement-based quantum key distribution. Quantum Inf. Process. 14, 1005–1015 (2015)ADSMathSciNetCrossRef
9.
go back to reference Okamoto, T., Tanaka, K., Uchiyama, S.: Quantum Public-key cryptosystems. In: Bellare, M. (ed.) Advances in Cryptology: Crypto 2000 Proceedings, LNCS, vol. 1880, pp. 147–165 (2000) Okamoto, T., Tanaka, K., Uchiyama, S.: Quantum Public-key cryptosystems. In: Bellare, M. (ed.) Advances in Cryptology: Crypto 2000 Proceedings, LNCS, vol. 1880, pp. 147–165 (2000)
10.
go back to reference Gottesman, D.: Quantum public key cryptography with information-theoretic security. In: Workshop on Classical and Quantum Information Security, pp. 15–18 (2005) Gottesman, D.: Quantum public key cryptography with information-theoretic security. In: Workshop on Classical and Quantum Information Security, pp. 15–18 (2005)
11.
go back to reference Kawachi, A., Koshiba, T., Nishimura, H., Yamakami, T.: Computational indistinguishability between quantum states and its cryptographic application. In: Cramer, R. (ed.) Advances in Cryptology: Eurocrypt 2005 Proceedings, LNCS, vol. 3494, pp. 268–284 (2005) Kawachi, A., Koshiba, T., Nishimura, H., Yamakami, T.: Computational indistinguishability between quantum states and its cryptographic application. In: Cramer, R. (ed.) Advances in Cryptology: Eurocrypt 2005 Proceedings, LNCS, vol. 3494, pp. 268–284 (2005)
12.
go back to reference Kawachi, A., Koshiba, T., Nishimura, H., Yamakami, T.: Computational indistinguishability between quantum states and its cryptographic application. J. Cryptol. 25(3), 528–555 (2012)MathSciNetCrossRef Kawachi, A., Koshiba, T., Nishimura, H., Yamakami, T.: Computational indistinguishability between quantum states and its cryptographic application. J. Cryptol. 25(3), 528–555 (2012)MathSciNetCrossRef
13.
14.
go back to reference Nikolopoulos, G.M.: Deterministic quantum-public-key encryption: forward search attack and randomization. Phys. Rev. A. 79, 042327 (2009)ADSCrossRef Nikolopoulos, G.M.: Deterministic quantum-public-key encryption: forward search attack and randomization. Phys. Rev. A. 79, 042327 (2009)ADSCrossRef
15.
go back to reference Fujita, H.: Quantum McEliece public-key cryptosystem. Quantum Inf. Comput. 12(3–4), 181–202 (2012)MathSciNetMATH Fujita, H.: Quantum McEliece public-key cryptosystem. Quantum Inf. Comput. 12(3–4), 181–202 (2012)MathSciNetMATH
16.
go back to reference Yang, L.: A public-key cryptosystem for quantum message transmission. In: Proceedings of the SPIE vol. 5631(1), pp. 233–236 (2005) Yang, L.: A public-key cryptosystem for quantum message transmission. In: Proceedings of the SPIE vol. 5631(1), pp. 233–236 (2005)
17.
go back to reference Yang, L., Liang, M., Li, B., Hu, L., Feng, D.G.: Quantum public-key cryptosystems based on induced trapdoor one-way transformations, e-print arXiv:1012.5249 (2010) Yang, L., Liang, M., Li, B., Hu, L., Feng, D.G.: Quantum public-key cryptosystems based on induced trapdoor one-way transformations, e-print arXiv:​1012.​5249 (2010)
18.
go back to reference Liang, M., Yang, L.: Public-key encryption and authentication of quantum information. Sci. China Phys. Mech. Astron. 55(9), 1618–1629 (2012)ADSCrossRef Liang, M., Yang, L.: Public-key encryption and authentication of quantum information. Sci. China Phys. Mech. Astron. 55(9), 1618–1629 (2012)ADSCrossRef
19.
go back to reference Gao, F., Wen, Q.Y., Qin, S.J., Zhu, F.C.: Quantum asymmetric cryptography with symmetric keys. Sci. China Ser. G Phys. Mech. Astron. 52, 1925–1931 (2009)ADSCrossRef Gao, F., Wen, Q.Y., Qin, S.J., Zhu, F.C.: Quantum asymmetric cryptography with symmetric keys. Sci. China Ser. G Phys. Mech. Astron. 52, 1925–1931 (2009)ADSCrossRef
20.
go back to reference Yang, L., Yang, B., Pan, J.: Quantum public-key encryption protocols with information-theoretic security. In: Proceedings of the SPIE, vol. 8440, pp. 84400E-1–84400E-7 (2012) Yang, L., Yang, B., Pan, J.: Quantum public-key encryption protocols with information-theoretic security. In: Proceedings of the SPIE, vol. 8440, pp. 84400E-1–84400E-7 (2012)
21.
go back to reference Wu, C., Yang, L.: Bit-oriented quantum public-key encryption based on quantum perfect encryption. Quantum Inf. Process. 15(8), 3285–3300 (2016)ADSMathSciNetCrossRef Wu, C., Yang, L.: Bit-oriented quantum public-key encryption based on quantum perfect encryption. Quantum Inf. Process. 15(8), 3285–3300 (2016)ADSMathSciNetCrossRef
22.
go back to reference Wu, C., Yang, L.: Qubit-wise teleportation and its application in public-key secret communication. Sci. China (Inf. Sci.) 3, 183–194 (2017) Wu, C., Yang, L.: Qubit-wise teleportation and its application in public-key secret communication. Sci. China (Inf. Sci.) 3, 183–194 (2017)
23.
go back to reference Wu, W., Cai, Q., Zhang, H., et al.: Quantum public key cryptosystem based on bell states. Int. J. Theor. Phys. (2017) Wu, W., Cai, Q., Zhang, H., et al.: Quantum public key cryptosystem based on bell states. Int. J. Theor. Phys. (2017)
24.
go back to reference Wang, Y., She, K.: A practical quantum public-key encryption model. In: 2017 3rd International Conference on Information Management (ICIM), Chengdu, pp. 367–372 (2017) Wang, Y., She, K.: A practical quantum public-key encryption model. In: 2017 3rd International Conference on Information Management (ICIM), Chengdu, pp. 367–372 (2017)
25.
26.
go back to reference Rabin, M.O.: How to exchange secrets by oblivious transfer. Harvard University: Aiken Computation Laboratory, Technical Report TR-81 (1981) Rabin, M.O.: How to exchange secrets by oblivious transfer. Harvard University: Aiken Computation Laboratory, Technical Report TR-81 (1981)
27.
go back to reference Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology. Springer, Boston (1983) Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology. Springer, Boston (1983)
28.
go back to reference Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69(5), 052319 (2004)ADSCrossRef Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69(5), 052319 (2004)ADSCrossRef
29.
go back to reference Yang, L., Xiang, C., Li, B.: Quantum probabilistic encryption protocol based on cojugate coding. China Commun. 10(2), 19–26 (2013)CrossRef Yang, L., Xiang, C., Li, B.: Quantum probabilistic encryption protocol based on cojugate coding. China Commun. 10(2), 19–26 (2013)CrossRef
30.
go back to reference Bethune, D.S., Risk, W.P.: An autocompensating fiber-optic quantum cryptography system based on polarization splitting of light. J. Quantum Electron. 36(3), 100 (2000)CrossRef Bethune, D.S., Risk, W.P.: An autocompensating fiber-optic quantum cryptography system based on polarization splitting of light. J. Quantum Electron. 36(3), 100 (2000)CrossRef
31.
32.
go back to reference Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)MATH Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)MATH
33.
go back to reference Hayashi, M., Kawachi, A., Cobayashi, H.: Quantum measurements for hidden subgroup problems with optimal sample complexity. Quantum Inf. Comput. 8, 0345–0358 (2008)MathSciNet Hayashi, M., Kawachi, A., Cobayashi, H.: Quantum measurements for hidden subgroup problems with optimal sample complexity. Quantum Inf. Comput. 8, 0345–0358 (2008)MathSciNet
34.
go back to reference Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)MATH Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)MATH
35.
go back to reference Barnum, H., Crepeau, C., Gottesman, D.: Authentication of quantum messages. In: The 34rd Annual IEEE Symposium on Foundations of Computer Science, November 16, et al.: November 19, 2002, Vancouver, BC, p. 2002. Institute of Electrical and Electronics Engineers Computer Society, Canada (2002) Barnum, H., Crepeau, C., Gottesman, D.: Authentication of quantum messages. In: The 34rd Annual IEEE Symposium on Foundations of Computer Science, November 16, et al.: November 19, 2002, Vancouver, BC, p. 2002. Institute of Electrical and Electronics Engineers Computer Society, Canada (2002)
36.
go back to reference Yang, L., Hu, L., Feng, D.: Quantum message authentication based on algebraic coding theory. In: Guo, G.-C., Lo, H.-K., Sasaki, M., Liu, S. (eds.) Quantum Optics and Applications in Computing and Communications II. Proceedings of SPIE Vol. 5631. SPIE, Bellingham (2005) Yang, L., Hu, L., Feng, D.: Quantum message authentication based on algebraic coding theory. In: Guo, G.-C., Lo, H.-K., Sasaki, M., Liu, S. (eds.) Quantum Optics and Applications in Computing and Communications II. Proceedings of SPIE Vol. 5631. SPIE, Bellingham (2005)
37.
go back to reference Garg, S., Yuen, H., Zhandry, M.: New security notions and feasibility results for authentication of quantum data. In: Annual International Cryptology Conference, pp. 342–371. Springer (2017) Garg, S., Yuen, H., Zhandry, M.: New security notions and feasibility results for authentication of quantum data. In: Annual International Cryptology Conference, pp. 342–371. Springer (2017)
38.
go back to reference Broadbent, A., Gutoski, G., Stebila, D.: Quantum one-time programs. In: Advances in CryptologyCCRYPTO 2013, pp. 344–360. Springer (2013) Broadbent, A., Gutoski, G., Stebila, D.: Quantum one-time programs. In: Advances in CryptologyCCRYPTO 2013, pp. 344–360. Springer (2013)
39.
go back to reference Aharonov, D., Ben-Or, M., Eban, E.: Interactive proofs for quantum computations. In: Proceedings of Innovations in Computer Science. Tsinghua University Press (2010) Aharonov, D., Ben-Or, M., Eban, E.: Interactive proofs for quantum computations. In: Proceedings of Innovations in Computer Science. Tsinghua University Press (2010)
40.
go back to reference Broadbent, A., Wainewright, E.: Efficient simulation for quantum message authentication. In: Nascimento, A., Barreto, P. (eds.) Information Theoretic Security. ICITS 2016. Lecture Notes in Computer Science, vol. 10015. Springer Broadbent, A., Wainewright, E.: Efficient simulation for quantum message authentication. In: Nascimento, A., Barreto, P. (eds.) Information Theoretic Security. ICITS 2016. Lecture Notes in Computer Science, vol. 10015. Springer
41.
go back to reference Buhrman, H., Cleve, R., Watrous, J., De Wolf, R.: Quantum fingerprinting. Phys. Rev.Lett. 87(16), 167902 (2001)ADSCrossRef Buhrman, H., Cleve, R., Watrous, J., De Wolf, R.: Quantum fingerprinting. Phys. Rev.Lett. 87(16), 167902 (2001)ADSCrossRef
Metadata
Title
Quantum public-key encryption schemes based on conjugate coding
Authors
Li Yang
Biyao Yang
Chong Xiang
Publication date
01-11-2020
Publisher
Springer US
Published in
Quantum Information Processing / Issue 11/2020
Print ISSN: 1570-0755
Electronic ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-020-02912-1

Other articles of this Issue 11/2020

Quantum Information Processing 11/2020 Go to the issue