Xiaoyu Li
School of Information Engineering, Zhengzhou University, Zhengzhou City, 450001, People`s Republic of China
Yuqing Ma
School of Information Engineering, Zhengzhou University, Zhengzhou City, 450001, People`s Republic of China
ABSTRACT
This study presents an unconditionally secure public-key cryptosystem using entangled quantum states. Users share a group of entangled quantum systems with a Key Management Center (KMC) as the private key and the public key. Any two users can exchange secret information by the help of KMC. At the same time a user can also perform digital signature on the information to be transmitted. The principles of quantum physics guarantee that this public-key cryptosystem is unconditionally secure. No quantum channels are needed between two users. On the other hand users neednt perform complex quantum operations. So, the cryptosystem is easy to carry out in practice and more robust against attacks.
PDF References
How to cite this article
Xiaoyu Li and Yuqing Ma, 2013. Unconditionally Secure Public-key Cryptosystem using Entangled Quantum States. Information Technology Journal, 12: 3820-3824.
DOI: 10.3923/itj.2013.3820.3824
URL: https://scialert.net/abstract/?doi=itj.2013.3820.3824
DOI: 10.3923/itj.2013.3820.3824
URL: https://scialert.net/abstract/?doi=itj.2013.3820.3824
REFERENCES
- Barrett, J., R. Colbeck and A. Kent, 2012. Unconditionally secure device-independent quantum key distribution with only two devices. Phys. Rev. A, Vol. 86.
Direct Link - Bennett, C.H. and S.J. Wiesner, 1992. Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. Phys. Rev. Lett., 69: 2881-2884.
Direct Link - Diffie, W. and M.E. Hellman, 1976. New directions in cryptography. IEEE Trans. Inform. Theory, 22: 644-654.
CrossRefDirect Link - Ekert, A.K., 1991. Quantum cryptography based on Bell's theorem. Phys. Rev. Lett., 67: 661-663.
CrossRefDirect Link - Horodecki, K., M. Horodecki, P. Horodecki, D. Leung and J. Oppenheim, 2008. Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity. IEEE Trans. Inform. Theory, 54: 2604-2620.
CrossRef - Nikolopoulos, G.M., 2008. Applications of single-qubit rotations in quantum public-key cryptography. Phys. Rev. A, Vol. 77.
CrossRef - Nikolopoulos, G.M. and L. Ioannou, 2009. Deterministic quantum-public-key encryption: Forward search attack and randomization. Phys. Revi. A, Vol. 79.
Direct Link - Rivest, R.L., A. Shamir and L. Adleman, 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM., 21: 120-126.
CrossRefDirect Link - Shor, P.W., 1994. Algorithms for quantum computation: Discrete logarithms and factoring. Proceedings of the 35th Annual Symposium on the Foundations of Computer Science, November 20-22, 1994, Santa Fe, NM., pp: 124-134.
CrossRef - Seyfarth, U., G.M. Nikolopoulos and G. Alber, 2012. Symmetries and security of a quantum-public-key encryption based on single-qubit rotations. Phys. Rev. A, Vol. 85.
CrossRef - Zhao, Y., B. Qi and H.K. Lo, 2008. Quantum key distribution with an unknown and untrusted. Phys. Rev. A, Vol. 77.
CrossRef