Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption

نویسندگان

  • Yu-Guang Yang
  • Peng Xu
  • Rui Yang
  • Yi-Hua Zhou
  • Wei-Min Shi
چکیده

Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

nt - p h / 06 06 07 2 v 2 3 A ug 2 00 6 Free - space quantum key distribution with entangled photons

We report on a complete experimental implementation of a quantum key distribution protocol through a free space link using polarization-entangled photon pairs from a compact parametric down-conversion source. Over 10 hours of uninterrupted communication between sites 1.5 km apart, we observe average key generation rates of 630 per second after error correction and privacy amplification. Our sch...

متن کامل

Image encryption based on chaotic tent map in time and frequency domains

The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...

متن کامل

A Security Real-time Privacy Amplification Scheme in QKD System

Quantum Key Distribution (QKD) technology, based on the laws of physics, can create unconditional security keys between communication parties. In recent years, researchers draw more and more attention to the QKD technology. Privacy amplification is a very significant procedure in QKD system. In this paper, we propose the real-time privacy amplification (RTPA) scheme which converts the weak secr...

متن کامل

A New Trend of Pseudo Random Number Generation using QKD

Random Numbers determine the security level of cryptographic applications as they are used to generate padding schemes in the encryption/decryption process as well as used to generate cryptographic keys. This paper utilizes the QKD to generate a random quantum bit rely on BB84 protocol, using the NIST and DIEHARD randomness test algorithms to test and evaluate the randomness rates for key gener...

متن کامل

68 Gbps quantum random number generation by measuring laser phase fluctuations

Random numbers have a wide range of applications such as encryption, Monte Carlo simulation, statistical analysis, and lottery. The indeterministic nature of quantum mechanics allows us to construct quantum random number generators (QRNGs) whose output cannot be predicted. The generation speed is essential for practical applications, such as high-speed quantum key distribution systems. Here, we...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2016