Public-key encryption with quantum keys

K Barooti, AB Grilo, L Huguenin-Dumittan… - Theory of Cryptography …, 2023 - Springer
In the framework of Impagliazzo's five worlds, a distinction is often made between two
worlds, one where public-key encryption exists (Cryptomania), and one in which only one …

Quantum identity authentication based on the extension of quantum rotation

G Chen, Y Wang, L Jian, Y Zhou, S Liu - EPJ Quantum Technology, 2023 - Springer
In this work, we propose a bit-oriented QIA protocol based on special properties of quantum
rotation and the public key cryptographic framework. The proposed protocol exhibited good …

Quantum identity authentication protocol based on flexible quantum homomorphic encryption with qubit rotation

G Chen, Y Wang, L Jian, Y Zhou, S Liu, J Luo… - Journal of Applied …, 2023 - pubs.aip.org
Quantum identity authentication (QIA) ensures that entities of quantum communication will
not be impersonated by attackers. As an auxiliary protocol, an ideal QIA protocol cannot take …

Cryptographic one-way function based on boson sampling

GM Nikolopoulos - Quantum Information Processing, 2019 - Springer
The quest for practical cryptographic primitives that are robust against quantum computers is
of vital importance for the field of cryptography. Among the abundance of different …

Quantum Cryptography and Quantum Key Distribution Protocols: A Survey on the Concepts, Protocols, Current Trends and Open Challenges

GM Mangipudi, S Eswaran… - Protocols, Current Trends …, 2022 - papers.ssrn.com
Secure communication in the modern day is made possible by cryptography. With advances
in the field of quantum mechanics, classical cryptosystems have become vulnerable to …

Encryption with quantum public keys

AB Grilo, O Sattath, QH Vu - arXiv preprint arXiv:2303.05368, 2023 - arxiv.org
It is an important question to find constructions of quantum cryptographic protocols which
rely on weaker computational assumptions than classical protocols. Recently, it has been …

Symmetries and security of a quantum-public-key encryption based on single-qubit rotations

U Seyfarth, GM Nikolopoulos, G Alber - Physical Review A—Atomic, Molecular …, 2012 - APS
Exploring the symmetries underlying a previously proposed encryption scheme that relies
on single-qubit rotations, we derive an improved upper bound on the maximum information …

Public-key quantum signature for classical messages without third-party verification

HM Chen, HY Jia, X Wu, HX Kong, XL Wang - Quantum Information …, 2022 - Springer
Based on quantum asymmetric cryptosystem, a public-key quantum signature for classical
messages is proposed. In our scheme, the private key is randomly chosen by signer, and the …

Computational indistinguishability between quantum states and its cryptographic application

A Kawachi, T Koshiba, H Nishimura, T Yamakami - Journal of cryptology, 2012 - Springer
We introduce a computational problem of distinguishing between two specific quantum
states as a new cryptographic problem to design a quantum cryptographic scheme that is …

Quantum signature scheme using a single qubit rotation operator

MS Kang, CH Hong, J Heo, JI Lim, HJ Yang - International Journal of …, 2015 - Springer
We present a quantum signature scheme using a single qubit rotation operator. In this
protocol, the trusted center confirms the quantum signature and thus conforms with other …