Cargando…

Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption

Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash functio...

Descripción completa

Detalles Bibliográficos
Autores principales: Yang, Yu-Guang, Xu, Peng, Yang, Rui, Zhou, Yi-Hua, Shi, Wei-Min
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group 2016
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4731770/
https://www.ncbi.nlm.nih.gov/pubmed/26823196
http://dx.doi.org/10.1038/srep19788
_version_ 1782412587242094592
author Yang, Yu-Guang
Xu, Peng
Yang, Rui
Zhou, Yi-Hua
Shi, Wei-Min
author_facet Yang, Yu-Guang
Xu, Peng
Yang, Rui
Zhou, Yi-Hua
Shi, Wei-Min
author_sort Yang, Yu-Guang
collection PubMed
description Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information.
format Online
Article
Text
id pubmed-4731770
institution National Center for Biotechnology Information
language English
publishDate 2016
publisher Nature Publishing Group
record_format MEDLINE/PubMed
spelling pubmed-47317702016-02-03 Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption Yang, Yu-Guang Xu, Peng Yang, Rui Zhou, Yi-Hua Shi, Wei-Min Sci Rep Article Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information. Nature Publishing Group 2016-01-29 /pmc/articles/PMC4731770/ /pubmed/26823196 http://dx.doi.org/10.1038/srep19788 Text en Copyright © 2016, Macmillan Publishers Limited http://creativecommons.org/licenses/by/4.0/ This work is licensed under a Creative Commons Attribution 4.0 International License. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in the credit line; if the material is not included under the Creative Commons license, users will need to obtain permission from the license holder to reproduce the material. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/
spellingShingle Article
Yang, Yu-Guang
Xu, Peng
Yang, Rui
Zhou, Yi-Hua
Shi, Wei-Min
Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption
title Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption
title_full Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption
title_fullStr Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption
title_full_unstemmed Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption
title_short Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption
title_sort quantum hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4731770/
https://www.ncbi.nlm.nih.gov/pubmed/26823196
http://dx.doi.org/10.1038/srep19788
work_keys_str_mv AT yangyuguang quantumhashfunctionanditsapplicationtoprivacyamplificationinquantumkeydistributionpseudorandomnumbergenerationandimageencryption
AT xupeng quantumhashfunctionanditsapplicationtoprivacyamplificationinquantumkeydistributionpseudorandomnumbergenerationandimageencryption
AT yangrui quantumhashfunctionanditsapplicationtoprivacyamplificationinquantumkeydistributionpseudorandomnumbergenerationandimageencryption
AT zhouyihua quantumhashfunctionanditsapplicationtoprivacyamplificationinquantumkeydistributionpseudorandomnumbergenerationandimageencryption
AT shiweimin quantumhashfunctionanditsapplicationtoprivacyamplificationinquantumkeydistributionpseudorandomnumbergenerationandimageencryption