# Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption

@article{Yang2016QuantumHF, title={Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption}, author={Yuguang Yang and Peng Xu and Rui Yang and Yihua Zhou and Wei-Min shi}, journal={Scientific Reports}, year={2016}, volume={6} }

Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-randomâ€¦Â

## 63 Citations

Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption

- Computer SciencePhysica A: Statistical Mechanics and its Applications
- 2020

Quantum Random Oracle Model for Quantum Public-Key Encryption

- Computer Science, MathematicsIEEE Access
- 2019

This work distinctively gives two instantiation examples of QRO by means of single-qubit rotation and quantum fingerprinting, and compares the numerical results of their performances under the key-collision attack, and extends the QRO model to the security analysis of quantum public-key encryption beyond quantum digital signature, and immunity from collision-type attacks.

An encryption protocol for NEQR images based on one-particle quantum walks on a circle

- Computer Science, MathematicsQuantum Inf. Process.
- 2019

This paper presents full quantum circuits of proposed encryption and decryption algorithms for NEQR images based on discrete quantum walks on a circle together with digital computer simulations of most common attacks on encrypted images.

Improving the efficiency of quantum hash function by dense coding of coin operators in discrete-time quantum walk

- Computer Science
- 2018

This paper proposes an efficient QHF by dense coding of coin operators in discrete-time quantum walk and has the following advantages: the efficiency of the QHF can be doubled and even more; only one particle is enough and two-particle interactions are unnecessary so that quantum resources are saved.

Hash Function Based on Quantum Walks

- Computer Science, MathematicsInternational Journal of Theoretical Physics
- 2019

This work considers a quantum walk where a walker is driven by two coins alternately and at each step, a message bit decides whether to swap two coins, and establishes a generic quantum walk-based hash function model.

Security Analysis Based on Quantum Random Oracle Model

- Computer Science, Mathematics
- 2020

This work uses the QRO model for the security analysis of quantum public-key encryption and quantum digital signature and introduces quantum random oracle, a general security analysis tool for rigorous security proof and effective cryptographic protocol design.

Constructing quantum Hash functions based on quantum walks on Johnson graphs

- Computer Science, MathematicsQuantum Inf. Process.
- 2018

A quantum hash function in a quantum walk framework on Johnson graphs is presented, which provides a clue for the construction of other cryptography protocols by introducing the quantum walk model into hash functions.

Multi-image encryption scheme based on quantum 3D Arnold transform and scaled Zhongtang chaotic system

- Computer Science, PhysicsQuantum Inf. Process.
- 2018

Numerical simulations and theoretical analyses demonstrate that the proposed quantum multi-image encryption scheme outperforms both its classical counterparts and the existing typical quantum image encryption algorithms in terms of security, robustness, encryption capacity and computational complexity.

Quantum Fingerprinting and Quantum Hashing. Computational and Cryptographical Aspects

- Computer ScienceBalt. J. Mod. Comput.
- 2016

Computational aspects of quantum fingerprinting are presented, cryptographical properties of quantum hashing are discussed, and the possible use ofquantum hashing for quantum hash-based message authentication codes is presented.

Controlled Alternate Quantum Walk based Block Hash Function

- Computer Science, Mathematics
- 2022

To process message in batch amounts, controlled alternate quantum walk based block hash function is presented by using the time-position-dependent controlled quantum walks on complete graphs with self-loops.

## References

SHOWING 1-10 OF 52 REFERENCES

Novel Image Encryption based on Quantum Walks

- Computer ScienceScientific reports
- 2015

Simulations and performance comparisons show that the proposal is secure enough for image encryption and outperforms prior works, which opens the door towards introducing quantum computation into imageryption and promotes the convergence between quantum computation and image processing.

Pseudo random number generator based on quantum chaotic map

- Computer ScienceCommun. Nonlinear Sci. Numer. Simul.
- 2014

Novel image encryption/decryption based on quantum Fourier transform and double phase encoding

- Computer ScienceQuantum Inf. Process.
- 2013

A novel gray-level image encryption/decryption scheme is proposed, which is the first time that the double random-phase encoding technique is generalized to quantum scenarios and paves the way for introducing more optical information processing techniques into quantum scenarios.

Discrete-time interacting quantum walks and quantum Hash schemes

- Computer Science, PhysicsQuantum Inf. Process.
- 2013

The security of this kind of quantum Hash scheme relies on the infinite possibilities of the initial state rather than the algorithmic complexity of hard problems, which will greatly enhance the security of the Hash schemes.

Quantum walks: a comprehensive review

- PhysicsQuantum Inf. Process.
- 2012

This paper has reviewed several algorithms based on both discrete- and continuous-time quantum walks as well as a most important result: the computational universality of both continuous- and discrete- time quantum walks.

Chaotic keyed hash function based on feedforwardâ€“feedback nonlinear digital filter

- Computer Science
- 2007

Chaotic image encryption system using phase-magnitude transformation and pixel substitution

- Computer ScienceTelecommun. Syst.
- 2013

The proposed chaotic image encryption system, which is used frequency and time domain together, is more secure than most of single domain image encryption systems.