提出一种采用经典-量子ε-universal哈希类的簇态量子模糊哈希构造方法.传统哈希与模糊哈希算法不能有效抵抗量子攻击.通过采用diamond范数方法,构建了一种哈希函数类最优子集并且提供信息论意义上的更优安全性.基于量子簇态独特的物理级单向计算属性,相应算法更接近于物理可实现.进一步,构造了一种在信息安全与生物特征识别方面的隐蔽信息搜索策略.该生物识别搜索算法基于簇态量子ε-universal模糊哈希构建.该策略能有效抵抗量子算法攻击,确保数据存储安全,并降低了计算复杂度.相比于其他类似策略,此算法具有更精简的结构,理论分析表明此算法具有较高的识别效率与更好的数据安全性.
参考文献
[1] | Gottesman D;Chuang I .Quantum digital signatures[OL].http://arxiv.org/abs/quant-ph/0105032 Technical Report,Cornell University Library,2001. |
[2] | Buhrman H.;Watrous J.;de Wolf R.;Cleve R..Quantum fingerprinting - art. no. 167902[J].Physical review letters,200116(16):7902-0. |
[3] | Xin L;Feng D G.Quantum digital signature based on quantum one-way functions[A].,2005:514-517. |
[4] | ZHOU JingXian;ZHOU YaJian;NIU XinXin;YANG YiXian.Quantum proxy signature scheme with public verifiability[J].中国科学:物理学 力学 天文学(英文版),2011(10):1828-1832. |
[5] | Ablayev F;Vasiliev A .Quantum hashing[OL].http://arxiv.org/abs/1310.4922v1,2013. |
[6] | Vasiliev A .Quantum communications based on quantum hashing[OL].http://arxiv.org/abs/1312.1661,2013. |
[7] | Ablayev F;Marat A .Quantum hashing via classical e-universal hashing constructions[OL].http://arxiv.org/abs/1404.1503v1,2014. |
[8] | Jesse K .Identifying almost identical files using context triggered piecewise hashing[OL].http://www.sciencedirect.com/science/article/pii/S1742287606000764 |
[9] | Hao F.;Daugman J.;Zielinski P..A Fast Search Algorithm for a Large Fuzzy Database[J].IEEE transactions on information forensics and security,20082(2):203-212. |
[10] | Lemire, D.;Kaser, O..Recursive n-gram hashing is pairwise independent, at best[J].Computer speech & language,20104(4):698-710. |
[11] | Baier H;Breitinger F.Security aspects of piecewise hashing in computer forensics[A].Stuttgart,Germany,2011 |
[12] | Raussendorf R.;Briegel HJ..A one-way quantum computer[J].Physical review letters,200122(22):5188-5191. |
[13] | Lau, H.-K.;Weedbrook, C..Quantum secret sharing with continuous-variable cluster states[J].Physical Review, A,20134 Pt.A(4 Pt.A):042313-1-042313-18. |
[14] | Inaba K;Tokunaga Y;Tamaki K.High-fidelity cluster state generation for ultracold atoms in an optical lattice[J].Physical Review Letters,2014112:110501. |
[15] | Menicucci N C.Fault-tolerant measurement-based quantum computing with continuous-variable cluster states[J].Physical Review Letters,2014112:120504. |
[16] | Aguilar G H;Kolb T;Cavalcanti D.Linear-optical simulation of the cooling of a cluster-state Hamiltonian system[J].Physical Review Letters,2014112:160501. |
[17] | Briegel H;Raussendorf J.Persisteent entanglement in arrays of interacting particles[J].PRL,200186(5):910-913. |
[18] | Carter J;Wegman M.Universal classes of Hash functions[J].Computer and System Sciences,197918:143-154. |
[19] | Stinson D R .On the connections between universal hashing,combinatorial designs and error-correcting codes[OL].http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.50.5465 |
[20] | Minho J.Quantum hashing for multimedia[J].IEEE Transactions on Information Forensics and Security,20094(4):982-994. |
[21] | 曹东;宋耀良.基于纠缠辅助码的量子模糊承诺和生物认证[J].电子学报,2012(7):1492-1496. |
[22] | Ben-Aroya A;Ta-Shma A .On the complexity of approximating the diamond norm[OL].http://arxiv.org/abs/0902.3397v3,2009. |
[23] | Watrous J .Semidefinite programs for completely bounded norms[OL].http://arxiv.org/abs/0901.4709v2,2009. |
[24] | Benenti, G.;Strini, G..Computing the distance between quantum channels: Usefulness of the Fano representation[J].Journal of Physics, B. Atomic, Molecular and Optical Physics: An Institute of Physics Journal,201021(21):215508-1-215508-7. |
[25] | Watrous J .Theory of quantum information[OL].https://cs.uwaterloo.ca/watrous/quant-info/,2011. |
[26] | 刘海波;汤群芳;杨杰.改进直方图均衡和Retinex算法在灰度图像增强中的应用[J].量子电子学报,2014(5):525-532. |
上一张
下一张
上一张
下一张
计量
- 下载量()
- 访问量()
文章评分
- 您的评分:
-
10%
-
20%
-
30%
-
40%
-
50%