A Method for Constructing Quantum Hash Functions Based on Controlled Alternating Quantum Walks on a Two-dimensional Plane

A two-dimensional plane, hash function technology, applied in the field of quantum hash function, can solve problems such as difficulties

Active Publication Date: 2020-07-07
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when this technique is applied to a quantum computer, it still needs to perform a two-particle quantum walk, and the coin toss operation is a 4×4 unitary matrix, which brings certain difficulties to the experiment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method for Constructing Quantum Hash Functions Based on Controlled Alternating Quantum Walks on a Two-dimensional Plane
  • A Method for Constructing Quantum Hash Functions Based on Controlled Alternating Quantum Walks on a Two-dimensional Plane
  • A Method for Constructing Quantum Hash Functions Based on Controlled Alternating Quantum Walks on a Two-dimensional Plane

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Below in conjunction with accompanying drawing and specific embodiment, further illustrate the present invention, should be understood that these examples are only for illustrating the present invention and are not intended to limit the scope of the present invention, after having read the present invention, those skilled in the art will understand various aspects of the present invention All modifications of the valence form fall within the scope defined by the appended claims of the present application.

[0026] A method for constructing quantum hash functions based on controlled alternating quantum walks on a two-dimensional plane, such as figure 2 shown, including the following steps:

[0027] Step 1, if you want to generate a 200-bit hash value, select N 1 =N 2 =5, k=8, making N 1 N 2 k=200. Then randomly select two parameters θ in the range of (-π / 2, π / 2) 0 = π / 3 and θ 1 = π / 5, generate two coin toss operations C 0 and C 1 :

[0028] and

[0029] S...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for constructing a quantum hash function based on controlled alternate quantum walks on a two-dimensional plane. Based on the proposed controlled alternate quantum walks, an information sequence is used to control coin throwing operations, the controlled alternate quantum walks are used to achieve a unidirectional compression process of quantum hash, and the probability obtained by measuring the location of a walker are used as original data and then processed as a hash value. The method adopts the controlled alternate quantum walks, and controls the walks on the two-dimensional plane with a two-dimensional coin. Thus, the method not only avoids a predictable collision behavior in a previous quantum hash mechanism, but also facilitates the physical experiment. A reliable and practical quantum hash mechanism is realized.

Description

technical field [0001] The invention belongs to the technical field of computer security, and in particular relates to a quantum hash function using controlled alternate quantum walks on a two-dimensional plane to realize hash one-way compression. Background technique [0002] Quantum communication technology has developed rapidly, and various quantum protocols have emerged in an endless stream in recent years. Hash functions have been widely used in quantum protocols to ensure the security of quantum communication. However, MD5 has been cracked. Will other hash functions be safe in the future? Especially, the excellent computing power of quantum computers can solve the problem of large integer decomposition in polynomial time, and it is hoped that other problems will be solved in the near future. Hash functions based on mathematically difficult problems pose a threat. Therefore, the use of classical hash functions in quantum protocols can pose a threat to the security of q...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
CPCH04L9/0643
Inventor 李丹许娟袁家斌
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products