J4 ›› 2015, Vol. 32 ›› Issue (1): 58-68.

• 量子光学 • 上一篇    下一篇

Cluster states quantum fuzzy hashing and covert information search

曹东   

  • 收稿日期:2014-10-10 修回日期:2014-11-12 出版日期:2015-01-28 发布日期:2015-02-04
  • 通讯作者: 曹东 (1974-)江苏人,博士,博士后,副教授,主要研究方向:量子信息、量子安全通信与高性能并行计算 E-mail:caod@njust.edu.cn, caodongcn@gmail.com

Cluster states quantum fuzzy hashing and covert information search

CAO Dong   

  1. School of Electronic Engineering and Optoelectronic Technology, Nanjing University of Science and Technology, Nanjing 210094, China
  • Received:2014-10-10 Revised:2014-11-12 Published:2015-01-28 Online:2015-02-04

摘要: 提出一种采用经典-量子ε-universal哈希类的簇态量子模糊哈希构造方案。传统哈希与模糊哈希算法不能有效抵抗量子攻击。我们的算法有效解决该类问题并且降低了算法的计算复杂度。通过采用diamond范数方法,我们构建了一种哈希函数类最优子集并且提供信息论意义上的更优安全性。基于量子簇态独特的物理级单向计算属性,相应算法更接近于物理可实现。进一步,我们构造了一种在信息安全与生物特征识别方面的隐蔽信息搜索策略。该生物识别搜索算法基于簇态量子ε-universal模糊哈希构建。该策略能有效抵抗量子算法攻击确保数据存储安全。相比于其他类似策略,我们的算法具有更精简的结构,理论分析表明我们的算法具有较高的识别效率与更好的数据安全性。

关键词: 量子光学, 信息安全, 隐蔽通信, 量子哈希

Abstract: A construction scheme of cluster states quantum fuzzy hash utilizing classical-quantum ε-universal hashing family was proposed. Traditional hash and fuzzy hash algorithm are not effective against quantum attacks. Our algorithms effectively solved the problem and the complexity of the algorithm is reduced. Utilizing the method of diamond norm, we construct a optimal subset of hash functions family and guarantee better security on the sense of information theory. Based on the unique physical one-way computation properties of quantum cluster states, the corresponding algorithm is more close to the physical realization. And then, We present a novel scheme of covert information search in the field of information security and biometrics. The biometrics search algorithm is constructed from the cluster states quantum ε-universal fuzzy hashing. The algorithm can effectively resist the quantum algorithms attack ensure data storage security. Compared to others similar schemes, our algorithm has a more simplified structure. Theoretical analysis shows that our algorithm has higher recognition efficiency and better data security.

Key words: quantum optics, Information security, Covert communication, Quantum hash