Cargando…
Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption
Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash functio...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group
2016
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4731770/ https://www.ncbi.nlm.nih.gov/pubmed/26823196 http://dx.doi.org/10.1038/srep19788 |
_version_ | 1782412587242094592 |
---|---|
author | Yang, Yu-Guang Xu, Peng Yang, Rui Zhou, Yi-Hua Shi, Wei-Min |
author_facet | Yang, Yu-Guang Xu, Peng Yang, Rui Zhou, Yi-Hua Shi, Wei-Min |
author_sort | Yang, Yu-Guang |
collection | PubMed |
description | Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information. |
format | Online Article Text |
id | pubmed-4731770 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2016 |
publisher | Nature Publishing Group |
record_format | MEDLINE/PubMed |
spelling | pubmed-47317702016-02-03 Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption Yang, Yu-Guang Xu, Peng Yang, Rui Zhou, Yi-Hua Shi, Wei-Min Sci Rep Article Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information. Nature Publishing Group 2016-01-29 /pmc/articles/PMC4731770/ /pubmed/26823196 http://dx.doi.org/10.1038/srep19788 Text en Copyright © 2016, Macmillan Publishers Limited http://creativecommons.org/licenses/by/4.0/ This work is licensed under a Creative Commons Attribution 4.0 International License. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in the credit line; if the material is not included under the Creative Commons license, users will need to obtain permission from the license holder to reproduce the material. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/ |
spellingShingle | Article Yang, Yu-Guang Xu, Peng Yang, Rui Zhou, Yi-Hua Shi, Wei-Min Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption |
title | Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption |
title_full | Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption |
title_fullStr | Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption |
title_full_unstemmed | Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption |
title_short | Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption |
title_sort | quantum hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4731770/ https://www.ncbi.nlm.nih.gov/pubmed/26823196 http://dx.doi.org/10.1038/srep19788 |
work_keys_str_mv | AT yangyuguang quantumhashfunctionanditsapplicationtoprivacyamplificationinquantumkeydistributionpseudorandomnumbergenerationandimageencryption AT xupeng quantumhashfunctionanditsapplicationtoprivacyamplificationinquantumkeydistributionpseudorandomnumbergenerationandimageencryption AT yangrui quantumhashfunctionanditsapplicationtoprivacyamplificationinquantumkeydistributionpseudorandomnumbergenerationandimageencryption AT zhouyihua quantumhashfunctionanditsapplicationtoprivacyamplificationinquantumkeydistributionpseudorandomnumbergenerationandimageencryption AT shiweimin quantumhashfunctionanditsapplicationtoprivacyamplificationinquantumkeydistributionpseudorandomnumbergenerationandimageencryption |