A Hybrid Protocol for Quantum Authentication of Classical Messages

Quantum authentication of classical messages is discussed. We propose a non-interactive hybrid protocol reaching informationtheoretical security, even when an eavesdropper possesses infinite quantum and classical computer power. We show that, under certain conditions, a quantum computer can only distinguish a sequence of pseudo random bits from a truly sequence of random bits with an exponentially small probability. This suggests the use of such generator together with hash functions in order to provide an authentication scheme reaching a desirable level of security.

[1]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[2]  Larry Carter,et al.  New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..

[3]  M. Curty,et al.  Quantum authentication of classical messages , 2001, quant-ph/0103122.

[4]  Manuel Blum,et al.  How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[5]  M. Curty,et al.  Qubit authentication , 2001, quant-ph/0108100.

[6]  I. Chuang,et al.  Quantum Computation and Quantum Information: Bibliography , 2010 .

[7]  Gilles Brassard,et al.  On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys , 1982, CRYPTO.

[8]  Adam D. Smith,et al.  Authentication of quantum messages , 2001, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..