Quantum Digital Signatures with Random Pairing
- URL: http://arxiv.org/abs/2201.10530v1
- Date: Tue, 25 Jan 2022 18:36:38 GMT
- Title: Quantum Digital Signatures with Random Pairing
- Authors: Ji-Qian Qin, Cong Jiang, Yun-Long Yu and Xiang-Bin Wang
- Abstract summary: We propose a general method of random pairing QDS (RP-QDS), which can drastically improve QDS efficiency.
In the method, the parity value of each pair is used for the outcome bit value.
numerical simulation results show that the signature rate can be increased by more than 100% under noisy channel.
- Score: 5.188295416244742
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Digital signatures can guarantee the unforgeability and transferability of
the message. Different from classical digital signatures, whose security
depends on computational complexity, quantum digital signatures (QDS) can
provide information-theoretic security. We propose a general method of random
pairing QDS (RP-QDS), which can drastically improve QDS efficiency. In a way,
our random pairing method provide a tightened result of security level of QDS.
In the method, the parity value of each pair is used for the outcome bit value.
We present general formulas for fraction of untagged bits and error rates of
the outcome bits. Random pairing can be applied as a fundamental method to
improve the QDS efficiency for all existing quantum key distribution (QKD)
protocols. We take sending-or-not-sending (SNS) QDS and side-channel-free (SCF)
QDS as examples to demonstrate the advantage of random pairing through
numerical simulation. Similar advantage with random pairing is also founded
with decoy-state MDIQKD and also decoy-state BB84 protocol. We study the
RP-SNS-QDS with finite data size through novel optimization. The numerical
simulation results show that the signature rate can be increased by more than
100% under noisy channel using our random pairing method.
Related papers
- Continuous-variable quantum digital signatures that can withstand coherent attacks [5.777874043843867]
Quantum digital signatures (QDSs) guarantee authenticity, integrity, and nonrepudiation of classical messages based on quantum laws.
We introduce a CV QDS protocol designed to withstand general coherent attacks through the use of a cutting-edge fidelity test function.
Results demonstrate a significant reduction of eight orders of magnitude in signature length for a megabit message signing task.
arXiv Detail & Related papers (2024-07-04T03:39:59Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv Detail & Related papers (2024-02-13T12:12:39Z) - Efficient Quantum Digital Signatures over Long Distances with Likely Bit
Strings [0.0]
We propose an efficient QDS protocol with hash functions over long distances.
Our method of likely bit strings can be applied to any quantum key distribution-based QDS protocol.
We demonstrate the advantages of our method and our improved method with the example of sending-or-not-sending QDS.
arXiv Detail & Related papers (2024-02-07T03:01:57Z) - Importance sampling for stochastic quantum simulations [68.8204255655161]
We introduce the qDrift protocol, which builds random product formulas by sampling from the Hamiltonian according to the coefficients.
We show that the simulation cost can be reduced while achieving the same accuracy, by considering the individual simulation cost during the sampling stage.
Results are confirmed by numerical simulations performed on a lattice nuclear effective field theory.
arXiv Detail & Related papers (2022-12-12T15:06:32Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Numerical Method for Finite-size Security Analysis of Quantum Key
Distribution [1.2891210250935146]
We develop a finite-size security analysis against general attacks for general QKD protocols.
Our result shows that the finite-size key rate can surpass the linear key-rate bound in a realistic communication time.
arXiv Detail & Related papers (2021-11-16T09:10:56Z) - Efficient Quantum Digital Signatures without Symmetrization Step [7.848038078036641]
Quantum digital signatures (QDS) exploit quantum laws to guarantee non-repudiation, unforgeability and transferability of messages.
Current QDS protocols face two major restrictions, including the requirement of the symmetrization step.
We present an efficient QDS protocol to overcome these issues by utilizing the classical post-processing operation called post-matching method.
arXiv Detail & Related papers (2021-04-08T01:54:50Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Improved, Deterministic Smoothing for L1 Certified Robustness [119.86676998327864]
We propose a non-additive and deterministic smoothing method, Deterministic Smoothing with Splitting Noise (DSSN)
In contrast to uniform additive smoothing, the SSN certification does not require the random noise components used to be independent.
This is the first work to provide deterministic "randomized smoothing" for a norm-based adversarial threat model.
arXiv Detail & Related papers (2021-03-17T21:49:53Z) - Loss-tolerant quantum key distribution with a twist [0.0]
We provide an extension of the loss-tolerant protocol [Phys. Rev. A 90, 052314 (2014)], a leading proof technique for analyzing the security of QKD, to MDI QKD protocols that employ mixed signal states.
We find that the mixed states can be interpreted as providing Alice and Bob with a virtual shield system they can employ to reduce Eve's knowledge of the secret key.
arXiv Detail & Related papers (2020-07-16T12:37:43Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.