J4 ›› 2015, Vol. 32 ›› Issue (1): 58-68.

• Quantum Optics • Previous Articles     Next Articles

Cluster states quantum fuzzy hashing and covert information search

CAO Dong   

  1. School of Electronic Engineering and Optoelectronic Technology, Nanjing University of Science and Technology, Nanjing 210094, China
  • Received:2014-10-10 Revised:2014-11-12 Published:2015-01-28 Online:2015-02-04

Abstract: A construction scheme of cluster states quantum fuzzy hash utilizing classical-quantum ε-universal hashing family was proposed. Traditional hash and fuzzy hash algorithm are not effective against quantum attacks. Our algorithms effectively solved the problem and the complexity of the algorithm is reduced. Utilizing the method of diamond norm, we construct a optimal subset of hash functions family and guarantee better security on the sense of information theory. Based on the unique physical one-way computation properties of quantum cluster states, the corresponding algorithm is more close to the physical realization. And then, We present a novel scheme of covert information search in the field of information security and biometrics. The biometrics search algorithm is constructed from the cluster states quantum ε-universal fuzzy hashing. The algorithm can effectively resist the quantum algorithms attack ensure data storage security. Compared to others similar schemes, our algorithm has a more simplified structure. Theoretical analysis shows that our algorithm has higher recognition efficiency and better data security.

Key words: quantum optics, Information security, Covert communication, Quantum hash