Quantum public-key encryption schemes based on conjugate coding

  • PDF / 290,497 Bytes
  • 16 Pages / 439.37 x 666.142 pts Page_size
  • 109 Downloads / 223 Views

DOWNLOAD

REPORT


Quantum public-key encryption schemes based on conjugate coding Li Yang1,2 · Biyao Yang1,2,3,4 · Chong Xiang5 Received: 24 April 2020 / Accepted: 22 October 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract We present several quantum public-key encryption (QPKE) protocols designed using conjugate coding single-photon strings; thus, they may be realized in the laboratory using current techniques. The first two schemes can encrypt one-bit messages; these are then extended to two kinds of QPKE schemes oriented toward multi-bit messages. In these schemes, Boolean functions are used as private keys and classical-quantum pairs as public keys, where one private key corresponds to an exponential number of public keys. Later, we discuss some issues related to authentication and a possible way to improve the security of the proposed schemes in this paper. The novel structure of the protocols presented here ensures that most of them are information-theoretic secure under attacks on the private key and on the encryption, while they can be realized more easily compared to other protocols. Keywords Quantum cryptography · Quantum public-key encryption · Information-theoretic security · Conjugate coding

Part of this work was presented in a conference proceeding [20].

B

Biyao Yang [email protected]

1

State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China

2

School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China

3

Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing 100093, China

4

Beijing Institute of Information Application Technology, Beijing 100044, China

5

China Information Technology Security Evaluation Center, Beijing 100085, China 0123456789().: V,-vol

123

415

Page 2 of 16

L. Yang et al.

1 Introduction Public-key encryption [1,2] is an important branch of modern cryptography. Until now, the security of classical public-key encryption schemes has been based on certain mathematically difficult problems whose difficulty has not been proved. In a quantum computing environment, most of these problems will cease to be difficult [3]; in that case, the related public-key protocols will not be secure. Therefore, new schemes must be developed to resist the attacks of quantum adversaries. Private key protocols utilizing quantum key distribution (QKD) can be utilized to address such issues [4–8]. Another solution involves the development of quantum public-key encryption (QPKE). Okamoto et al. [9] introduced a public-key encryption scheme with a quantum algorithm in the key generation phase. Gottesman [10] proposed a QPKE protocol based on teleportation with information-theoretic security. Kawachi et al. [11,12] investigated the cryptographic property of the “computational indistinguishability” of two quantum states generated via fully flipped permutations and proposed QPKE schemes based on it. Nikolopoulos constructed a QPKE [1