Public-key cryptography based on bounded quantum reference frames
From MaRDI portal
Publication:477170
DOI10.1016/J.TCS.2014.09.016zbMATH Open1315.94117arXiv0903.5156OpenAlexW2041043686MaRDI QIDQ477170FDOQ477170
Michele Mosca, Lawrence M. Ioannou
Publication date: 2 December 2014
Published in: Theoretical Computer Science (Search for Journal in Brave)
Abstract: We demonstrate that the framework of bounded quantum reference frames has application to building quantum-public-key cryptographic protocols and proving their security. Thus, the framework we introduce can be seen as a public-key analogue of the framework of Bartlett et al. (Phys. Rev. A 70, 032307), where a private shared reference frame is shown to have cryptographic application. The protocol we present in this paper is an identification scheme, which, like a digital signature scheme, is a type of authentication scheme. We prove that our protocol is both reusable and secure under the honest-verifier assumption. Thus, we also demonstrate that secure reusable quantum-public-key authentication is possible to some extent.
Full work available at URL: https://arxiv.org/abs/0903.5156
Recommendations
- Unconditionally-secure and reusable public-key authentication
- Tomographic quantum cryptography protocols are reference frame independent
- A new spin on quantum cryptography: avoiding trapdoors and embracing public keys
- Quantum public-key encryption schemes based on conjugate coding
- Ternary quantum public-key cryptography based on qubit rotation
Cryptography (94A60) Quantum cryptography (quantum-theoretic aspects) (81P94) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Quantum cryptography based on Bell’s theorem
- Title not available (Why is that?)
- Reference frames, superselection rules, and quantum information
- Foundations of Cryptography
- Quantum measurements for hidden subgroup problems with optimal sample complexity
- Title not available (Why is that?)
- A three-stage quantum cryptography protocol
- Title not available (Why is that?)
- Applications of single-qubit rotations in quantum public-key cryptography
- Computational Indistinguishability Between Quantum States and Its Cryptographic Application
- Two-Message Quantum Interactive Proofs Are in PSPACE
- Title not available (Why is that?)
- Secure Identification and QKD in the Bounded-Quantum-Storage Model
- Optimal phase estimation in quantum networks
- Product Rules in Semidefinite Programming
Cited In (3)
This page was built for publication: Public-key cryptography based on bounded quantum reference frames
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q477170)