Attacking Quantum Hashing. Protocols and Their Cryptanalysis


如何引用文章

全文:

开放存取 开放存取
受限制的访问 ##reader.subscriptionAccessGranted##
受限制的访问 订阅存取

详细

Quantumhash functions are similar to classical (cryptographic) hash functions and their security is guaranteed by physical laws. However, security of a primitive does not automatically mean that protocols based on this primitive are secure. We propose protocols based on quantum hash function and assess their security using Holevo entropy and recently introduced notion of quantum information cost.

作者简介

M. Ziatdinov

Kazan (Volga region) Federal University

编辑信件的主要联系方式.
Email: gltronred@gmail.com
俄罗斯联邦, ul. Kremlevskaya 18, Kazan, Tatarstan, 420008


版权所有 © Pleiades Publishing, Ltd., 2018
##common.cookie##