Attacking Quantum Hashing. Protocols and Their Cryptanalysis


Cite item

Full Text

Open Access Open Access
Restricted Access Access granted
Restricted Access Subscription Access

Abstract

Quantumhash functions are similar to classical (cryptographic) hash functions and their security is guaranteed by physical laws. However, security of a primitive does not automatically mean that protocols based on this primitive are secure. We propose protocols based on quantum hash function and assess their security using Holevo entropy and recently introduced notion of quantum information cost.

About the authors

M. T. Ziatdinov

Kazan (Volga region) Federal University

Author for correspondence.
Email: gltronred@gmail.com
Russian Federation, ul. Kremlevskaya 18, Kazan, Tatarstan, 420008


Copyright (c) 2018 Pleiades Publishing, Ltd.

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies