Cargando…

Quantum asymmetric key crypto scheme using Grover iteration

Here, we propose a quantum asymmetric key cryptography scheme using Grover’s quantum search algorithm. In the proposed scheme, Alice generates a pair of public and private keys, keeps the private keys safe, and only discloses public keys to the outside. Bob uses Alice's public key to send a sec...

Descripción completa

Detalles Bibliográficos
Autores principales: Yoon, Chun Seok, Hong, Chang Ho, Kang, Min Sung, Choi, Ji-Woong, Yang, Hyung Jin
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9992374/
https://www.ncbi.nlm.nih.gov/pubmed/36882516
http://dx.doi.org/10.1038/s41598-023-30860-0
_version_ 1784902297930694656
author Yoon, Chun Seok
Hong, Chang Ho
Kang, Min Sung
Choi, Ji-Woong
Yang, Hyung Jin
author_facet Yoon, Chun Seok
Hong, Chang Ho
Kang, Min Sung
Choi, Ji-Woong
Yang, Hyung Jin
author_sort Yoon, Chun Seok
collection PubMed
description Here, we propose a quantum asymmetric key cryptography scheme using Grover’s quantum search algorithm. In the proposed scheme, Alice generates a pair of public and private keys, keeps the private keys safe, and only discloses public keys to the outside. Bob uses Alice's public key to send a secret message to Alice and Alice uses her private key to decrypt the secret message. Furthermore, we discuss the safety of quantum asymmetric key encryption techniques based on quantum mechanical properties.
format Online
Article
Text
id pubmed-9992374
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-99923742023-03-09 Quantum asymmetric key crypto scheme using Grover iteration Yoon, Chun Seok Hong, Chang Ho Kang, Min Sung Choi, Ji-Woong Yang, Hyung Jin Sci Rep Article Here, we propose a quantum asymmetric key cryptography scheme using Grover’s quantum search algorithm. In the proposed scheme, Alice generates a pair of public and private keys, keeps the private keys safe, and only discloses public keys to the outside. Bob uses Alice's public key to send a secret message to Alice and Alice uses her private key to decrypt the secret message. Furthermore, we discuss the safety of quantum asymmetric key encryption techniques based on quantum mechanical properties. Nature Publishing Group UK 2023-03-07 /pmc/articles/PMC9992374/ /pubmed/36882516 http://dx.doi.org/10.1038/s41598-023-30860-0 Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Article
Yoon, Chun Seok
Hong, Chang Ho
Kang, Min Sung
Choi, Ji-Woong
Yang, Hyung Jin
Quantum asymmetric key crypto scheme using Grover iteration
title Quantum asymmetric key crypto scheme using Grover iteration
title_full Quantum asymmetric key crypto scheme using Grover iteration
title_fullStr Quantum asymmetric key crypto scheme using Grover iteration
title_full_unstemmed Quantum asymmetric key crypto scheme using Grover iteration
title_short Quantum asymmetric key crypto scheme using Grover iteration
title_sort quantum asymmetric key crypto scheme using grover iteration
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9992374/
https://www.ncbi.nlm.nih.gov/pubmed/36882516
http://dx.doi.org/10.1038/s41598-023-30860-0
work_keys_str_mv AT yoonchunseok quantumasymmetrickeycryptoschemeusinggroveriteration
AT hongchangho quantumasymmetrickeycryptoschemeusinggroveriteration
AT kangminsung quantumasymmetrickeycryptoschemeusinggroveriteration
AT choijiwoong quantumasymmetrickeycryptoschemeusinggroveriteration
AT yanghyungjin quantumasymmetrickeycryptoschemeusinggroveriteration