From graphs to keyed quantum hash functions


Cite item

Full Text

Open Access Open Access
Restricted Access Access granted
Restricted Access Subscription Access

Abstract

We present two new constructions of quantum hash functions: the first based on expander graphs and the second based on extractor functions and estimate the amount of randomness that is needed to construct them. We also propose a keyed quantum hash function based on extractor function that can be used in quantum message authentication codes and assess its security in a limited attacker model.

About the authors

M. Ziatdinov

Quantum Informatics Laboratory, Institute of Computational Mathematics and Information Technologies

Author for correspondence.
Email: gltronred@gmail.com
Russian Federation, Kremlevskaya ul. 35, Kazan, Tatarstan, 420008


Copyright (c) 2016 Pleiades Publishing, Ltd.

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies