Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption

Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information.

[1]  Ueli Maurer,et al.  Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[2]  M. Jafarizadeh,et al.  Hash function based on hierarchy of 2D piecewise nonlinear chaotic maps , 2009 .

[3]  Frédéric Magniez,et al.  Quantum algorithms for the triangle problem , 2005, SODA '05.

[4]  Qiang Li,et al.  A hybrid classical-quantum clustering algorithm based on quantum walks , 2011, Quantum Inf. Process..

[5]  Kevin Curran,et al.  A hash-based image encryption algorithm , 2010 .

[6]  Amir Akhavan,et al.  A novel parallel hash function based on 3D chaotic map , 2013, EURASIP Journal on Advances in Signal Processing.

[7]  Osvaldo A. Rosso,et al.  Intensive statistical complexity measure of pseudorandom number generators , 2005 .

[8]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[9]  C L Webber,et al.  Dynamical assessment of physiological systems and states using recurrence plot strategies. , 1994, Journal of applied physiology.

[10]  Jason Twamley,et al.  Using a biased quantum random walk as a quantum lumped element router , 2014 .

[11]  Jürgen Kurths,et al.  Recurrence plots for the analysis of complex systems , 2009 .

[12]  J. Zbilut,et al.  Embeddings and delays as derived from quantification of recurrence plots , 1992 .

[13]  Rolf Landauer,et al.  A simple measure of complexity , 1988, Nature.

[14]  Mohammad Eshghi,et al.  Chaotic image encryption system using phase-magnitude transformation and pixel substitution , 2011, Telecommunication Systems.

[15]  O A Rosso,et al.  Distinguishing noise from chaos. , 2007, Physical review letters.

[16]  Dario Tamascelli,et al.  A quantum-walk-inspired adiabatic algorithm for solving graph isomorphism problems , 2014, 1401.1278.

[17]  Andrew M. Childs,et al.  Spatial search by continuous-time quantum walks on crystal lattices , 2014, 1403.2676.

[18]  Hua Zhang,et al.  Novel image encryption/decryption based on quantum Fourier transform and double phase encoding , 2013, Quantum Inf. Process..

[19]  Ricardo López-Ruiz,et al.  A Statistical Measure of Complexity , 1995, ArXiv.

[20]  Zengqiang Chen,et al.  A new image encryption algorithm based on hyper-chaos , 2008 .

[21]  Rafael Benítez,et al.  A wavelet-based tool for studying non-periodicity , 2010, Comput. Math. Appl..

[22]  Jian Li,et al.  Perfect state transfer and efficient quantum routing: a discrete-time quantum walk approach , 2014, 1405.6422.

[23]  D. Ruelle,et al.  Recurrence Plots of Dynamical Systems , 1987 .

[24]  J. Kurths,et al.  Recurrence-plot-based measures of complexity and their application to heart-rate-variability data. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[25]  Xing-Yuan Wang,et al.  Cryptanalysis on a parallel keyed hash function based on chaotic neural network , 2010, Neurocomputing.

[26]  Hui Chen,et al.  Discrete-time interacting quantum walks and quantum Hash schemes , 2013, Quantum Inf. Process..

[27]  A. Akhavan,et al.  An image encryption scheme based on quantum logistic map , 2012 .

[28]  Osvaldo A. Rosso,et al.  Statistical complexity and disequilibrium , 2003 .

[29]  I. Jex,et al.  Directional correlations in quantum walks with two particles , 2011, 1102.4445.

[30]  Osvaldo A. Rosso,et al.  Intensive entropic non-triviality measure , 2004 .

[31]  Thierry Paul,et al.  Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.

[32]  K. Birgitta Whaley,et al.  Quantum random-walk search algorithm , 2002, quant-ph/0210064.

[33]  Amir Akhavan,et al.  Pseudo random number generator based on quantum chaotic map , 2014, Commun. Nonlinear Sci. Numer. Simul..

[34]  Pierre L'Ecuyer,et al.  TestU01: A C library for empirical testing of random number generators , 2006, TOMS.

[35]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[36]  Andris Ambainis,et al.  Quantum walk algorithm for element distinctness , 2003, 45th Annual IEEE Symposium on Foundations of Computer Science.

[37]  Yu-Guang Yang,et al.  Novel Image Encryption based on Quantum Walks , 2015, Scientific Reports.

[38]  B. Pompe,et al.  Permutation entropy: a natural complexity measure for time series. , 2002, Physical review letters.

[39]  Jingbo B. Wang,et al.  pyCTQW: A continuous-time quantum walk simulator on distributed memory computers , 2015, Comput. Phys. Commun..

[40]  Salvador Elías Venegas-Andraca,et al.  Quantum walks: a comprehensive review , 2012, Quantum Information Processing.

[41]  Wei Guo,et al.  Cryptanalysis on a parallel keyed hash function based on chaotic maps , 2009 .

[42]  Xiaoling Huang,et al.  An image encryption algorithm based on hyper-chaos and DNA sequence , 2012, Multimedia Tools and Applications.

[43]  Masato Koashi,et al.  Unconditionally secure key distribution based on two nonorthogonal states. , 2003, Physical review letters.

[44]  S. Mallat A wavelet tour of signal processing , 1998 .

[45]  Cristel Chandre,et al.  Time–frequency analysis of chaotic systems , 2002, nlin/0209015.

[46]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[47]  S. Mallat VI – Wavelet zoom , 1999 .

[48]  Wenfang Zhang,et al.  Chaotic keyed hash function based on feedforward–feedback nonlinear digital filter , 2007 .

[49]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.