A multi-valued quantum fully homomorphic encryption scheme

Y Zhang, T Shang, J Liu - Quantum Information Processing, 2021 - Springer
Fully homomorphic encryption enables computation on encrypted data while maintaining
secrecy. This leads to an important open question whether quantum computation can be …

Cascade cryptographic key-distribution protocol over a public network based on snapshot compressive ghost imaging

WK Yu, SF Wang, KQ Shang - Physical Review Applied, 2024 - APS
Computational ghost imaging is widely used in classical cryptographic key distribution
(CKD) because its measurement and reconstruction are equivalent to the encoding and …

Universal construction of a full quantum one-way function

Y Tang, T Shang, J Liu - Quantum Information Processing, 2022 - Springer
Classical one-way function is a fundamental part of cryptography. Its one-wayness is
threatened by the emerging quantum computers. Quantum one-way function (QOWF) was …

Instantiation of quantum point obfuscation

Y Zhang, T Shang, R Chen, J Liu - Quantum Information Processing, 2022 - Springer
In cryptography, obfuscation is one of the strongest forms of encryption. Point functions have
been widely discussed in classical obfuscation so that obfuscation of point functions …

Universal quantum obfuscation for quantum non-linear functions

C Pan, T Shang, Y Zhang - Frontiers in Physics, 2023 - frontiersin.org
Research on quantum cryptography has burgeoned in the recent decades and combined
quantum mechanics and cryptography theory. Among the existing quantum cryptographic …

Quantum Obfuscation of Generalized Quantum Power Functions with Coefficient

Y Jiang, T Shang, Y Tang, J Liu - Entropy, 2023 - mdpi.com
Quantum obfuscation is one of the important primitives in quantum cryptography that can be
used to enhance the security of various quantum cryptographic schemes. The research on …

Quantum homomorphic encryption based on quantum obfuscation

YJ Zhang, T Shang, JW Liu… - 2020 International Wireless …, 2020 - ieeexplore.ieee.org
Homomorphic encryption enables computation on encrypted data while maintaining
secrecy. This leads to an important open question whether quantum computation can be …

Local thinning of 3D stereo images based on symmetric decryption algorithm

C Wu, Z Li - Microprocessors and Microsystems, 2021 - Elsevier
In traditional 3D image thinning methods, because the thinning data is not symmetrical, the
skeleton connectivity of 3D image is reduced, and the thinned image is seriously distorted …

Quantum Symmetric Encryption

T Shang - Quantum Nonlinear Function Obfuscation Theory and …, 2024 - Springer
Quantum symmetric encryption can be based on the obfuscation of a specific kind of
function, which will not be ruled out by the impossible result. Also, quantum point …

Quantum Point Obfuscation

T Shang - Quantum Nonlinear Function Obfuscation Theory and …, 2024 - Springer
We take two typical quantumnonlinearfunctions for example. One is a quantum point
function which is an easy form of quantum nonlinear functions to implement the functionality …