An Information-Theoretic Security Analysis of Quantum String Sealing
نویسندگان
چکیده
A quantum sealing protocol is a quantum cryptographic protocol that can detect unsealing of a message. It is known that quantum bit sealing is insecure. However, this does not imply that quantum string sealing is also insecure. So the possibility of quantum string sealing has been studied. In this paper, we propose a quantum sealing protocol and give an information theoretic analysis. We also show that our protocol is almost optimal for uniformly distributed inputs in the sense that the upper bound of information leaks almost matches the trivial lower bound. Key–Words: Quantum cryptography, Quantum sealing, Security analysis
منابع مشابه
Bit-oriented quantum public-key encryption
We propose a bit-oriented quantum public-key scheme which uses Boolean function as private-key and randomly changed pairs of quantum state and classical string as public-keys. Contrast to the typical classical public-key scheme, one private-key in our scheme corresponds to an exponential number of public-keys. The goal of our scheme is to achieve information-theoretic security, and the security...
متن کاملLarge N Quantum Cryptography
In quantum cryptography, the level of security attainable by a protocol which implements a particular task N times bears no simple relation to the level of security attainable by a protocol implementing the task once. Useful partial security, and even near-perfect security in an appropriate sense, can be obtained for N copies of a task which itself cannot be securely implemented. We illustrate ...
متن کاملOn the design and security of a lattice-based threshold secret sharing scheme
In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...
متن کاملInformation Security in a Quantum World
It is well known that classical computationally-secure cryptosystems may be susceptible to quantum attacks, i.e., attacks by adversaries able to process quantum information. A prominent example is the RSA public key cryptosystem, whose security is based on the hardness of factoring; it can be broken using a quantum computer running Shor’s efficient factoring algorithm. In this extended abstract...
متن کاملIndistinguishability and semantic security for quantum encryption scheme
We investigate the definition of security for encryption scheme in quantum context. We systematically define the indistinguishability and semantic security for quantum public-key and private-key encryption schemes, and for computational security, physical security and information-theoretic security. Based on our definition, we present a necessary and sufficient condition that leads to informati...
متن کامل