New encoding schemes for quantum authentication

We study the potential of general quantum operations, Trace-Preserving Completely-Positive Maps (TPCPs), as encoding and decoding mechanisms in quantum authentication protocols. The study shows that these general operations do not offer significant advantage over unitary encodings. We also propose a practical authentication protocol based on the use of two successive unitary encodings.

[1]  Hugo Krawczyk,et al.  LFSR-based Hashing and Authentication , 1994, CRYPTO.

[2]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[3]  David J. Santos,et al.  Quantum authentication with unitary coding sets , 2003 .

[4]  Debbie W. Leung,et al.  Quantum vernam cipher , 2000, Quantum Inf. Comput..

[5]  Gilles Brassard,et al.  Experimental Quantum Cryptography , 1990, EUROCRYPT.

[6]  M. Nielsen,et al.  Information-theoretic approach to quantum error correction and reversible measurement , 1997, Proceedings of the Royal Society of London. Series A: Mathematical, Physical and Engineering Sciences.

[7]  Larry Carter,et al.  New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..

[8]  M. Curty,et al.  Quantum authentication of classical messages , 2001, quant-ph/0103122.

[9]  M. Curty,et al.  Qubit authentication , 2001, quant-ph/0108100.

[10]  Gilles Brassard,et al.  On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys , 1982, CRYPTO.

[11]  Adam D. Smith,et al.  Authentication of quantum messages , 2001, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..

[12]  Carlton M. Caves Quantum Error Correction and Reversible Operations , 1998 .

[13]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[14]  N. Gisin,et al.  Underwater quantum coding , 1995, Nature.

[15]  J. Gea-Banacloche Hiding messages in quantum data , 2002 .

[16]  F. MacWilliams,et al.  Codes which detect deception , 1974 .

[17]  N. Gisin,et al.  Quantum cryptography over 23 km in installed under-lake telecom fibre , 1996 .

[18]  Charles H. Bennett,et al.  Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.