Public-key encryption and authentication of quantum information

被引:21
|
作者
Liang Min [1 ,2 ]
Yang Li [1 ]
机构
[1] Chinese Acad Sci, State Key Lab Informat Secur, Inst Informat Engn, Beijing 100195, Peoples R China
[2] Chinese Acad Sci, Grad Univ, Beijing 100049, Peoples R China
基金
中国国家自然科学基金;
关键词
quantum cryptography; authentication; quantum public-key; private quantum channel; STATES;
D O I
10.1007/s11433-011-4806-y
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.
引用
收藏
页码:1618 / 1629
页数:12
相关论文
共 50 条
  • [31] Dynamic threshold public-key encryption
    Delerablee, Cecile
    Pointcheval, David
    ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 317 - 334
  • [32] Incremental Deterministic Public-Key Encryption
    Ilya Mironov
    Omkant Pandey
    Omer Reingold
    Gil Segev
    Journal of Cryptology, 2018, 31 : 134 - 161
  • [33] Integer Reconstruction Public-Key Encryption
    Ferradi, Houda
    Naccache, David
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 412 - 433
  • [34] Incremental Deterministic Public-Key Encryption
    Mironov, Ilya
    Pandey, Omkant
    Reingold, Omer
    Segev, Gil
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 628 - 644
  • [35] Universally anonymizable public-key encryption
    Hayashi, R
    Tanaka, K
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 293 - 312
  • [36] Public-Key Encryption with Delegated Search
    Ibraimi, Luan
    Nikova, Svetla
    Hartel, Pieter
    Jonker, Willem
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2011), 2011, 6715 : 532 - 549
  • [37] A new public-key encryption scheme
    Tian, Hai-Bo
    Sun, Xi
    Wang, Yu-Min
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (01) : 95 - 102
  • [38] Quantum public-key encryption protocol based on single-photon
    Luo, Wen-Jun
    Liu, Guan-Li
    Tongxin Xuebao/Journal on Communications, 2014, 35 : 9 - 13
  • [39] Quantum-resistant public-key encryption and signature schemes with smaller key sizes
    Soni, Lacchita
    Chandra, Harish
    Gupta, Daya Sagar
    Keval, Ram
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (01): : 285 - 297
  • [40] Quantum-resistant public-key encryption and signature schemes with smaller key sizes
    Lacchita Soni
    Harish Chandra
    Daya Sagar Gupta
    Ram Keval
    Cluster Computing, 2024, 27 : 285 - 297