From graphs to keyed quantum hash functions

From MaRDI portal
Publication:2361672

DOI10.1134/S1995080216060202zbMATH Open1369.94574arXiv1606.00256MaRDI QIDQ2361672FDOQ2361672


Authors: Yanyan Li Edit this on Wikidata


Publication date: 30 June 2017

Published in: Lobachevskii Journal of Mathematics (Search for Journal in Brave)

Abstract: We present two new constructions of quantum hash functions: the first based on expander graphs and the second based on extractor functions and estimate the amount of randomness that is needed to construct them. We also propose a keyed quantum hash function based on extractor function that can be used in quantum message authentication codes and assess its security in a limited attacker model.


Full work available at URL: https://arxiv.org/abs/1606.00256




Recommendations




Cites Work


Cited In (11)





This page was built for publication: From graphs to keyed quantum hash functions

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2361672)