期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Information-theoretically secure quantum timestamping with one-time universal hashing
1
作者 Ming-Yang Li Chen-Xun Weng +2 位作者 Wen-Bo Liu Mengya Zhu Zeng-Bing Chen 《Science China(Physics,Mechanics & Astronomy)》 2025年第10期172-183,共12页
Accurate and tamper-resistant timestamps are essential for applications demanding verifiable chronological ordering,such as legal documentation and digital intellectual property protection.Classical timestamp protocol... Accurate and tamper-resistant timestamps are essential for applications demanding verifiable chronological ordering,such as legal documentation and digital intellectual property protection.Classical timestamp protocols rely on computational assumptions for security,rendering them vulnerable to quantum attacks,which is a critical limitation given the rapid progress in quantum computing.To address this,we propose an information-theoretically secure quantum timestamping protocol based on one-time universal hashing with quantum keys.Our protocol simultaneously achieves information-theoretic security and high efficiency,enabling secure timestamping for arbitrarily long documents.Simulations demonstrate a generation rate exceeding 100 timestamps per second over intercity distances.In addition,our protocol only requires weak coherent states,making it practical for large-scale deployment.This work advances the field of quantum timestamping and contributes to the broader development of quantum cryptography and the future quantum internet. 展开更多
关键词 quantum timestamp one-time universal hashing NON-REPUDIATION UNFORGEABILITY weak coherent states
原文传递
Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model
2
作者 Qiqi LAI Yuan CHEN Yupu HU Baocang WANG Mingming JIANG 《Frontiers of Computer Science》 SCIE EI CSCD 2014年第3期469-477,共9页
Key-dependent message (KDM) security is an important security issue that has attracted much research in recent years. In this paper, we present a new construction of the symmetric encryption scheme in the the ideal ... Key-dependent message (KDM) security is an important security issue that has attracted much research in recent years. In this paper, we present a new construction of the symmetric encryption scheme in the the ideal cipher model (ICM); we prove that our scheme is KDM secure against active attacks with respect to arbitrary polynomialtime challenge functions. Our main idea is to introduce a universal hash function (UHF) h as a random value for each encrypfion, and then use s = h(sk) as the key of the ideal cipher F, where sk is the private key of our symmetric encryption scheme. Although many other schemes that are secure against KDM attacks have already been proposed, in both the ideal standard models, the much more significance of our paper is the simplicity in which we implement KDM security against active attacks. 展开更多
关键词 symmetric encryption key-dependent message challenge function universal hash function ideal cipher model
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部