From graphs to keyed quantum hash functions


如何引用文章

全文:

开放存取 开放存取
受限制的访问 ##reader.subscriptionAccessGranted##
受限制的访问 订阅存取

详细

We present two new constructions of quantum hash functions: the first based on expander graphs and the second based on extractor functions and estimate the amount of randomness that is needed to construct them. We also propose a keyed quantum hash function based on extractor function that can be used in quantum message authentication codes and assess its security in a limited attacker model.

作者简介

M. Ziatdinov

Quantum Informatics Laboratory, Institute of Computational Mathematics and Information Technologies

编辑信件的主要联系方式.
Email: gltronred@gmail.com
俄罗斯联邦, Kremlevskaya ul. 35, Kazan, Tatarstan, 420008


版权所有 © Pleiades Publishing, Ltd., 2016
##common.cookie##