Quantum ciphertext authentication and key recycling with the trap code

04/06/2018
by   Yfke Dulek, et al.
0

We investigate quantum authentication schemes constructed from quantum error-correcting codes. We show that if the code has a property called purity testing, then the resulting authentication scheme guarantees the integrity of ciphertexts, not just plaintexts. On top of that, if the code is strong purity testing, the authentication scheme also allows the encryption key to be recycled, partially even if the authentication rejects. Such a strong notion of authentication is useful in a setting where multiple ciphertexts can be present simultaneously, such as in interactive or delegated quantum computation. With these settings in mind, we give an explicit code (based on the trap code) that is strong purity testing but, contrary to other known strong-purity-testing codes, allows for natural computation on ciphertexts.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/17/2022

An efficient combination of quantum error correction and authentication

When sending quantum information over a channel, we want to ensure that ...
research
11/13/2020

Information-theoretically secure data origin authentication with quantum and classical resources

In conventional cryptography, information-theoretically secure message a...
research
09/27/2021

Investigations on Automorphism Groups of Quantum Stabilizer Codes

The stabilizer formalism for quantum error-correcting codes has been, wi...
research
11/03/2022

From Auditable Quantum Authentication to Best-of-Both-Worlds Multiparty Quantum Computation with Public Verifiable Identifiable Abort

We construct the first secure multiparty quantum computation with public...
research
03/21/2022

Proposal for Quantum Ciphertext-Policy Attribute-Based Encryption

A Quantum Ciphertext-Policy Attribute-Based Encryption scheme (QCP-ABE) ...
research
06/06/2022

LIN-MM: Multiplexed Message Authentication Code for Local Interconnect Network message authentication in road vehicles

The automotive market is profitable for cyberattacks with the constant s...

Please sign up or login with your details

Forgot password? Click here to reset