Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption

@article{Yang2016QuantumHF,
  title={Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption},
  author={Yuguang Yang and Peng Xu and Rui Yang and Yihua Zhou and Wei-Min shi},
  journal={Scientific Reports},
  year={2016},
  volume={6}
}
Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random… 
Quantum Random Oracle Model for Quantum Public-Key Encryption
TLDR
This work distinctively gives two instantiation examples of QRO by means of single-qubit rotation and quantum fingerprinting, and compares the numerical results of their performances under the key-collision attack, and extends the QRO model to the security analysis of quantum public-key encryption beyond quantum digital signature, and immunity from collision-type attacks.
An encryption protocol for NEQR images based on one-particle quantum walks on a circle
TLDR
This paper presents full quantum circuits of proposed encryption and decryption algorithms for NEQR images based on discrete quantum walks on a circle together with digital computer simulations of most common attacks on encrypted images.
Improving the efficiency of quantum hash function by dense coding of coin operators in discrete-time quantum walk
TLDR
This paper proposes an efficient QHF by dense coding of coin operators in discrete-time quantum walk and has the following advantages: the efficiency of the QHF can be doubled and even more; only one particle is enough and two-particle interactions are unnecessary so that quantum resources are saved.
Hash Function Based on Quantum Walks
TLDR
This work considers a quantum walk where a walker is driven by two coins alternately and at each step, a message bit decides whether to swap two coins, and establishes a generic quantum walk-based hash function model.
Security Analysis Based on Quantum Random Oracle Model
TLDR
This work uses the QRO model for the security analysis of quantum public-key encryption and quantum digital signature and introduces quantum random oracle, a general security analysis tool for rigorous security proof and effective cryptographic protocol design.
Constructing quantum Hash functions based on quantum walks on Johnson graphs
TLDR
A quantum hash function in a quantum walk framework on Johnson graphs is presented, which provides a clue for the construction of other cryptography protocols by introducing the quantum walk model into hash functions.
Multi-image encryption scheme based on quantum 3D Arnold transform and scaled Zhongtang chaotic system
TLDR
Numerical simulations and theoretical analyses demonstrate that the proposed quantum multi-image encryption scheme outperforms both its classical counterparts and the existing typical quantum image encryption algorithms in terms of security, robustness, encryption capacity and computational complexity.
Quantum Fingerprinting and Quantum Hashing. Computational and Cryptographical Aspects
TLDR
Computational aspects of quantum fingerprinting are presented, cryptographical properties of quantum hashing are discussed, and the possible use ofquantum hashing for quantum hash-based message authentication codes is presented.
Controlled Alternate Quantum Walk based Block Hash Function
TLDR
To process message in batch amounts, controlled alternate quantum walk based block hash function is presented by using the time-position-dependent controlled quantum walks on complete graphs with self-loops.
...
...

References

SHOWING 1-10 OF 52 REFERENCES
Novel Image Encryption based on Quantum Walks
TLDR
Simulations and performance comparisons show that the proposal is secure enough for image encryption and outperforms prior works, which opens the door towards introducing quantum computation into imageryption and promotes the convergence between quantum computation and image processing.
Pseudo random number generator based on quantum chaotic map
Novel image encryption/decryption based on quantum Fourier transform and double phase encoding
TLDR
A novel gray-level image encryption/decryption scheme is proposed, which is the first time that the double random-phase encoding technique is generalized to quantum scenarios and paves the way for introducing more optical information processing techniques into quantum scenarios.
Discrete-time interacting quantum walks and quantum Hash schemes
TLDR
The security of this kind of quantum Hash scheme relies on the infinite possibilities of the initial state rather than the algorithmic complexity of hard problems, which will greatly enhance the security of the Hash schemes.
Quantum walks: a comprehensive review
TLDR
This paper has reviewed several algorithms based on both discrete- and continuous-time quantum walks as well as a most important result: the computational universality of both continuous- and discrete- time quantum walks.
Chaotic image encryption system using phase-magnitude transformation and pixel substitution
TLDR
The proposed chaotic image encryption system, which is used frequency and time domain together, is more secure than most of single domain image encryption systems.
...
...