Cargando…
Quantum asymmetric key crypto scheme using Grover iteration
Here, we propose a quantum asymmetric key cryptography scheme using Grover’s quantum search algorithm. In the proposed scheme, Alice generates a pair of public and private keys, keeps the private keys safe, and only discloses public keys to the outside. Bob uses Alice's public key to send a sec...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9992374/ https://www.ncbi.nlm.nih.gov/pubmed/36882516 http://dx.doi.org/10.1038/s41598-023-30860-0 |
_version_ | 1784902297930694656 |
---|---|
author | Yoon, Chun Seok Hong, Chang Ho Kang, Min Sung Choi, Ji-Woong Yang, Hyung Jin |
author_facet | Yoon, Chun Seok Hong, Chang Ho Kang, Min Sung Choi, Ji-Woong Yang, Hyung Jin |
author_sort | Yoon, Chun Seok |
collection | PubMed |
description | Here, we propose a quantum asymmetric key cryptography scheme using Grover’s quantum search algorithm. In the proposed scheme, Alice generates a pair of public and private keys, keeps the private keys safe, and only discloses public keys to the outside. Bob uses Alice's public key to send a secret message to Alice and Alice uses her private key to decrypt the secret message. Furthermore, we discuss the safety of quantum asymmetric key encryption techniques based on quantum mechanical properties. |
format | Online Article Text |
id | pubmed-9992374 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-99923742023-03-09 Quantum asymmetric key crypto scheme using Grover iteration Yoon, Chun Seok Hong, Chang Ho Kang, Min Sung Choi, Ji-Woong Yang, Hyung Jin Sci Rep Article Here, we propose a quantum asymmetric key cryptography scheme using Grover’s quantum search algorithm. In the proposed scheme, Alice generates a pair of public and private keys, keeps the private keys safe, and only discloses public keys to the outside. Bob uses Alice's public key to send a secret message to Alice and Alice uses her private key to decrypt the secret message. Furthermore, we discuss the safety of quantum asymmetric key encryption techniques based on quantum mechanical properties. Nature Publishing Group UK 2023-03-07 /pmc/articles/PMC9992374/ /pubmed/36882516 http://dx.doi.org/10.1038/s41598-023-30860-0 Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) . |
spellingShingle | Article Yoon, Chun Seok Hong, Chang Ho Kang, Min Sung Choi, Ji-Woong Yang, Hyung Jin Quantum asymmetric key crypto scheme using Grover iteration |
title | Quantum asymmetric key crypto scheme using Grover iteration |
title_full | Quantum asymmetric key crypto scheme using Grover iteration |
title_fullStr | Quantum asymmetric key crypto scheme using Grover iteration |
title_full_unstemmed | Quantum asymmetric key crypto scheme using Grover iteration |
title_short | Quantum asymmetric key crypto scheme using Grover iteration |
title_sort | quantum asymmetric key crypto scheme using grover iteration |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9992374/ https://www.ncbi.nlm.nih.gov/pubmed/36882516 http://dx.doi.org/10.1038/s41598-023-30860-0 |
work_keys_str_mv | AT yoonchunseok quantumasymmetrickeycryptoschemeusinggroveriteration AT hongchangho quantumasymmetrickeycryptoschemeusinggroveriteration AT kangminsung quantumasymmetrickeycryptoschemeusinggroveriteration AT choijiwoong quantumasymmetrickeycryptoschemeusinggroveriteration AT yanghyungjin quantumasymmetrickeycryptoschemeusinggroveriteration |