Decentralization using quantum blockchain: A theoretical analysis
Blockchain technology has been prominent recently due to its applications in
cryptocurrency. Numerous decentralized blockchain applications have been possible due to …
cryptocurrency. Numerous decentralized blockchain applications have been possible due to …
Computational indistinguishability between quantum states and its cryptographic application
We introduce a computational problem of distinguishing between two specific quantum
states as a new cryptographic problem to design a quantum cryptographic scheme that is …
states as a new cryptographic problem to design a quantum cryptographic scheme that is …
Public-key encryption and authentication of quantum information
M Liang, L Yang - Science China Physics, Mechanics and Astronomy, 2012 - Springer
Public-key cryptosystems for quantum messages are considered from two aspects: public-
key encryption and public-key authentication. Firstly, we propose a general construction of …
key encryption and public-key authentication. Firstly, we propose a general construction of …
Bit-oriented quantum public-key encryption based on quantum perfect encryption
C Wu, L Yang - Quantum Information Processing, 2016 - Springer
A bit-oriented quantum public-key encryption scheme is presented. We use Boolean
functions as private-key and randomly changed pairs of quantum state and classical string …
functions as private-key and randomly changed pairs of quantum state and classical string …
Cryptanalysis on quantum digital signature based on asymmetric quantum cryptography
WM Shi, YM Wang, YH Zhou, YG Yang - Optik, 2018 - Elsevier
In this paper, we first study the cryptanalysis of quantum signature scheme based
asymmetric quantum cryptography. Then the results of analysis show that quantum …
asymmetric quantum cryptography. Then the results of analysis show that quantum …
Block encryption of quantum messages
M Liang, L Yang - Quantum Information Processing, 2020 - Springer
Block encryption is a fundamental cryptographic primitive in modern cryptography. However,
it is impossible for block encryption to achieve the same security as one-time pad. Quantum …
it is impossible for block encryption to achieve the same security as one-time pad. Quantum …
Quantum-message-oriented public-key encryption scheme beyond computational hypothesis
M Liang, L Yang - Quantum Optics II, 2012 - spiedigitallibrary.org
We propose two definitions of quantum one-way transformation and quantum trapdoor one-
way transformation beyond computational hypothesis, and give four examples. Then, we …
way transformation beyond computational hypothesis, and give four examples. Then, we …
A quantum-classical scheme towards quantum functional encryption
A Ahuja - arxiv preprint arxiv:1703.00207, 2017 - arxiv.org
Quantum encryption is a well studied problem for both classical and quantum information.
However, little is known about quantum encryption schemes which enable the user, under …
However, little is known about quantum encryption schemes which enable the user, under …
Bit-oriented quantum public-key encryption
C Wu, L Yang - arxiv preprint arxiv:1501.05943, 2015 - arxiv.org
We propose a bit-oriented quantum public-key scheme which uses Boolean function as
private-key and randomly changed pairs of quantum state and classical string as public …
private-key and randomly changed pairs of quantum state and classical string as public …
Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security
M Liang, L Yang - arxiv preprint arxiv:1205.2246, 2012 - arxiv.org
Public-key cryptosystems for quantum messages are considered from two aspects: public-
key encryption and public-key authentication. Firstly, we propose a general construction of …
key encryption and public-key authentication. Firstly, we propose a general construction of …