From graphs to keyed quantum hash functions
- 作者: Ziatdinov M.1
-
隶属关系:
- Quantum Informatics Laboratory, Institute of Computational Mathematics and Information Technologies
- 期: 卷 37, 编号 6 (2016)
- 页面: 705-712
- 栏目: Article
- URL: https://journals.rcsi.science/1995-0802/article/view/198385
- DOI: https://doi.org/10.1134/S1995080216060202
- ID: 198385
如何引用文章
详细
We present two new constructions of quantum hash functions: the first based on expander graphs and the second based on extractor functions and estimate the amount of randomness that is needed to construct them. We also propose a keyed quantum hash function based on extractor function that can be used in quantum message authentication codes and assess its security in a limited attacker model.
作者简介
M. Ziatdinov
Quantum Informatics Laboratory, Institute of Computational Mathematics and Information Technologies
编辑信件的主要联系方式.
Email: gltronred@gmail.com
俄罗斯联邦, Kremlevskaya ul. 35, Kazan, Tatarstan, 420008