Masking property of quantum random cipher with phase mask encryption
From MaRDI portal
Abstract: The security analysis of physical encryption protocol based on coherent pulse position modulation(CPPM) originated by Yuen is one of the most interesting topics in the study of cryptosystem with a security level beyond the Shannon limit. Although the implementation of CPPM scheme has certain difficulty, several methods have been proposed recently. This paper deals with the CPPM encryption in terms of symplectic transformation, which includes a phase mask encryption as a special example, and formulates a unified security analysis for such encryption schemes. Specifically, we give a lower bound of Eve's symbol error probability using reliability function theory to ensure that our proposed system exceeds the Shannon limit. Then we assume the secret key is given to Eve after her heterodyne measurement. Since this assumption means that Eve has a great advantage in the sense of the conventional cryptography, the lower bound of her error indeed ensures the security level beyond the Shannon limit. In addition, we show some numerical examples of the security performance.
Recommendations
- Masking quantum information encoded In pure and mixed states
- Quantum information masking of Hadamard sets
- Quantum Channel State Masking
- Quantum secret sharing based on quantum information masking
- Selected Areas in Cryptography
- Qubit masking in multipartite qubit system
- Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker
- Analyzing masked ciphers against transition and coupling effects
- Phase-time coding quantum cryptography
Cites work
- scientific article; zbMATH DE number 3182945 (Why is no real title available?)
- scientific article; zbMATH DE number 3783731 (Why is no real title available?)
- scientific article; zbMATH DE number 3249395 (Why is no real title available?)
- scientific article; zbMATH DE number 3316587 (Why is no real title available?)
- On the security of \(\alpha \eta\): response to \` some attacks on quantum-based cryptographic protocols'
- Optical communication with two-photon coherent states--Part I: Quantum-state propagation and quantum-noise
- Optical communication with two-photon coherent states--Part III: Quantum measurements realizable with photoemissive detectors
- Optimum testing of multiple hypotheses in quantum detection theory
- Quantum coding theorems
- Quantum detection and estimation theory
Cited in
(2)
This page was built for publication: Masking property of quantum random cipher with phase mask encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q479443)