1 Introduction
The security of classical cryptosystems is mostly reliant on the complexity of the computations, but quantum computers can efficiently develop quantum states to model multifaceted challenges and to handle computationally complex problems [
1-
3]. The superposition of states on quantum computers assures the exponential speedup of algorithms and simulations over their classical complements. The probability of each state expresses the particular state’s behavior on measurement. Towards the major milestones for the development of quantum computers, Google announced quantum supremacy by producing the Sycamore (54 Qubit) and the Bristlecone (72 Qubit) chips [
4]. In contrast, IBM recently announced that they thrived the 100-qubit barrier by producing the 127-qubit Eagle processor [
5]. The computational resources of these mainframes can effectively handle conventional hard problems like discrete logarithms and integer factorization. These resources also validate the quadratic speedup in tackling unstructured search problems [
6,
7], which threatens the complexity of traditional cryptography techniques. An adversary can bout a specific execution, attempting to dispute the operation, regardless of the physical mechanism employed to deactivate the device even after a single use.
The complexity of breaking asymmetric cryptosystems, such as Diffie−Hellman and Elliptic Curve Cryptography (ECC), is reliant on the difficulties in discrete logarithmic problems (DLP) in order to determine integer
, such that
, where
is the DLP of
. The computation for
is quite challenging in the classical environment if the designated parameters are large enough [
8]. Furthermore, ECC provides the same level of protection as RSA and DLP methods and is considered secure and efficient [
9]. It employs the pair
in the equation
, where
, along with imaginary point
at infinity. Factorization of large numbers and reckonings of discrete logarithms can be violated on quantum computers via Shor’s algorithm [
10]. The smaller key space of ECC compared to RSA makes breaches easier with a modified Shor’s algorithm on data encrypted with ECC [
11,
12]. Proos and Zalka [
13] described the use of Shor’s algorithm to break ECC over
, while Boudot
et al. [
14] highlighted the factorization of RSA-240 and cracking a DLP of the same size with Shor’s method. It has also been demonstrated that a 1000-qubit processor is required to break a 160-bit elliptic curve, and a 2000-qubit processor is required to factorize 1024-bit RSA [
13].
Lov Grover, on the other hand, developed an algorithm to search unsorted databases using quantum resources that deliver a square root speedup over classical brute force [
7]. This algorithm can find a specific entry in an unsorted database of
N entries from
N searches, operates on
for an
n-bit cipher, which poses a threat to symmetric cryptographic schemes. In this case, a symmetric cipher with a 128-bit key size, such as AES-128, would offer a security level of 64 bits. Bone and Castro [
15] commented on the impact of Grover’s algorithm on DES-56, which required just 185 searches to find the key. Recently, Joshi and Gupta [
16] implemented Grover’s algorithm in a 4-qubit search space using IBM’s QISKit. To secure information in the post-quantum era, NIST [
17] and NSA [
18] recommended the AES cipher with key sizes of 192 and 256 bits. Furthermore, the hash function’s security is reliant on a fixed-length output, and Grover’s method can be employed to detect a collision by searching an unsorted database, which suffers from the same problem as symmetric ciphers. It has also been proven that this method, when combined with the birthday paradox, may effectively execute a collision attack [
19]. As a result, most existing hash algorithms are inadequate for utilization in the quantum era.
Public key algorithms such as DSA, ECDSA, ElGamal, and others are extensively used for digital signatures, and their security is reliant on the aforementioned discrete logarithmic problems, rendering them equally frail to Shor’s algorithm on quantum resources. Despite being slower than Shor’s method, Grover’s algorithm has several applications in symmetric cryptosystems, and the research community is refining Grover’s algorithm as well as developing comparable category classifications, which poses a severe threat to classical ciphers [
20]. Therefore, cryptographic algorithms that are robust to quantum processes are required.
In the era of quantum information technologies, quantum computation [
21], cryptography [
22], and metrology [
23] enable efficient processing, secure communications, and precise measurements. Quantum cryptography is one of the emergent quantum technologies, and experimental analysis of quantum key distribution (QKD) has already been conducted [
24-
27]. Although these approaches are favorable, they are far from being enacted with existing technologies. The traditional information exchange techniques can be enhanced by introducing the gain of quantumness [
28,
29]. Recently, hybrid systems for probabilistic one-time programs were proposed [
30,
31], but they face several theoretical and technological requirements and challenges that limit their implementation. Post-quantum cryptography (PQC) can also be used for authentication and encryption, and is believed to be useful for short-term security, such as authentication [
32]. Except for Shor’s algorithm, this technique is not yet theoretically secure and raises concerns about security against alternative conventional and quantum algorithms.
The ability to transfer quantum states to carry classical information is an important feature of a quantum information processing system [
33]. These states can either contain a message or be utilized to establish entanglement between the two sites [
34,
35]. The limitation and the challenge of quantum states are to store and manipulate the reconstruction on a classical computer, and various techniques have been devised that require partial information to inspect the generated states [
36-
38]. To overcome limitations, we developed a model similar to blind quantum computation (BQC) [
39-
42] in which the classical client can delegate quantum states for classical data, and the server or a malicious user will not be able to learn any information about the input, output, or algorithm. The proposed method addresses the following concerns.
• A quantum-assisted classical computation model that transforms classical data into unclonable quantum states and predicts classical information based on retrieved quantum states.
• An arbitrary quantum signature (AQS) scheme to authenticates users with classical key and plaintext spaces, making the model feasible for existing technologies.
We experimentally validated the proposed algorithm’s efficiency, feasibility, and stability in authenticating users and transferring quantum states in order to represent classical data for quantum-safe communication.
This article is organized into six sections. Section 2 explains the procedure for generating unclonable quantum states, the signature scheme for user authentication, and the proposed model for securely sharing classical information in the form of quantum states. Experimental results of the proposed methodology when employing surveillance imagery are presented in Section 3. Section 4 contains performance analyses of the proposed model. Section 5 highlights a few real-world applications, and Section 6 comprises concluding remarks as well as information on supplementary documents.
2 Methodology
The establishment of quantum states to model a system, and the arbitrary quantum signature scheme are developed in this section. The proposed AQS scheme, which comprises initialization, signing, and verification, was developed by combining quantum theory with classical cryptography. This section also illustrates a proposed model for secure data sharing between two entities using arbitrary states.
2.1 Generation of quantum spin states
For a spin system,
, vectors are usually signified in terms of a Hermitian Cartesian component such as
, and are represented in the Zeeman basis with the states
for
[
43,
44]. The Cartesian operators for non-Hermitian components
satisfy the basis of states
,
, and
, where
. Hence,
and
.
For a spin system, the possible states with the components for the angular momentum are for spin up, , and for spin down, . Hence, and .
Let us consider as a matrix that represents the spin system as and . To solve these equivalences, we received , , , and . Hence,
• with .
Similarly, the spin operators in and directions are
• with , and
• with .
Pauli’s matrices can be extracted from the above equations as .
The spin constituent in the direction along the unit vector as ,
therefore, spin vector can be represented as a unit vector, . Hence, , which implies with eigenvectors and .
The passive operators [
39,
45,
46] to spin the states in the coordinate system can be computed as
. Hence,
• ,
• , and
• .
The superposition of states for a qubit system on the Bloch sphere for diverse phase domains using IBM quantum composer and fetch the states for a classical system as shown in Fig.2. Quantum mainframes can efficiently simulate the states for many-body systems [
47,
48], and these complex states can be used to authenticate users and simulate data over classical as well as quantum computers. For a single qubit system, in Fig.2, there are several superposition states. Each state has distinct symmetrical characteristics, and the interconnection of these states allows information to be propagated from one state to the next.
Each state comprises binary information 0 and 1, and the probability of each state expresses the particular behavior on measurement. The ability to transfer these states to carry classical information is an important feature of a quantum information processing system, and the information obtained via this approach can be conceived as a hash function of q-states on classical systems. These can either contain a message or be employed to establish entanglement between the two sites by utilizing a spin lock mechanism to detect the phase transition between sites and pair generations.
The demonstrated states in Fig.2 are generated at six points [−21.1040, −15.5460, −9.9880, −4.4300, 1.1280, 6.6860], and each point value indicates 24 distinct states to represent data. For a spin system, we can model complex structures and many-point systems in the phase domain with minimum step sizes. In the supplemental file, Fig.2 and Fig.3 elaborate on the demonstration of 15 and 25 point systems for various domains of phases.
2.2 AQS scheme
The proposed AQS scheme consists of initializing, signing, and verifying through a combination of quantum theory and classical cryptography.
Assume and are two distinct sets of one-way functions with uniform output distribution, where and . All one-way functions will be independent of each other for different .
Initializing
Let Alice and Bob would like to share a few private credentials with a trustworthy arbitrator, Trent, using QKD or the protocol developed by Marie
et al. [
30,
31].
• Conferring Alice’s private key, , she secretly chooses one-way function from the sets and .
• Similarly, conferring Bob’s private key, , he secretly chooses one-way function from the sets and .
Let us define , Hadamard , and unit operator I, where and .
Signing
Let the message needs to be signed.
• Alice calculates the hash of the message as and , where and for each and .
• She generates a signature from her private key for Trent, ,
where
• She sends to Bob using the classical and the quantum channel.
Verification
Bob will make an appropriate measurement after receiving on each state according to by choosing basis or to measure for . By using the consequences of and the measurement, he is able to set .
• Bob will use his private key, , and one-way functions, , to derive and announce the pair for Trent to download, where .
• Trent will compute using the one-way functions of Alice and Bob as:
, and
, where .
• Trent announces the validity of publicly if , and Bob will accept as a valid signature.
Bob will set the basis accordingly to measure the states, which allows him to fetch the message, .
2.3 Proposed model for state transfer
We consider data sharing between Alice and Bob where Alice provides data in the form of arbitrary states, and Bob retrieves data from the received states. She encodes classical data in the form of states, which grow linearly in the number of q-sequences required to execute function , and then sends the states to Bob. He will assess the received states sequentially to extract the plaintext data. These evaluations are primarily irreversible, and Bob must evaluate function , whereas (in unison for some input) it prevents him from learning about such that . The overview of quantum-assisted classical computation is given in Fig.3.
The interconnection of states allows Alice to propagate information from one state to the next, and each state contains binary information 0 and 1 at the same time. For the classical 8-bit data stream illustrated in Fig.3, the transitions to spin states are as follows.
• If the first bit is 0, the transferred state would be the same as the generated one.
• If the first bit is 1, it spins the state at the designated phase (up-spin of ) in Fig.3.
• The proceeding states spins at the designated phase on the bit flip.
• On reception, the receiver sets the basis with the shared information and a private key to measure the incoming states to retrieve the classical bits.
The probabilistic version of states (pointed out by Roehsner MC
et al. [
30,
31]) for the classical data, encoded using a single qubit, is specified in Fig.4. The measurement corresponding to input is anti-commute [
49], which can be obtained by fixing the basis to be consistent with inputs 0 and 1,
, respectively, to find the state to encode and decode the data.
The encoding is related to Wiesner’s conjugate encoding [
50] and is equivalent to the quantum random access code addressed in Ref. [
51].
To demonstrate the feasibility of the proposed scheme, we consider a program to generate q-states for universal classical computation that transforms classical message into state , in which two entities can share their data without disclosing their credentials to other parties. To accomplish the objective, Alice encodes her classical data stream with the generated q-states and transmits it with the delegation of signature. On the other hand, after authenticating Bob’s factual identification, the program returns a classical bit sequence. Fig.5 depicts an overview of the model.
Bob computes a hash of the message to sign, uses it as input to generate states for message retrieval, and Trent verifies the output of the one-way function (see Section 2.2). However, we assume spin locking between Alice and Bob in order to generate q-states on both sides (either with Trent or in a symmetric fashion) to transform classical bits into spin states and then extract the classical data by measuring the generated and received states.
3 Experimental results
We conducted an experiment using surveillance drone imagery to securely transmit specified aerial information to the receiver (Fig.6). Tab.1 analyzes the information loss in the recovered imagery (compared to the original) to confirm the efficacy of classical data recovery from quantum states.
The source was high-resolution aerial surveillance imagery (image 1) captured with a high payload capacity WingtraOne mapping drone equipped with a Sony RX1R II camera, accessible from the WingtraOne data sets repository. We assumed the spectator is required to transmit specific information from the construction site (image 2) to another individual to demonstrate the progress in a specific region (image 3). The experiment was carried out under ideal conditions, with no channel loss or state disruption, transforming the imagery into q-states for transmission and recovering it from free states upon reception. We used correlation analysis [
52,
53] to compare the transmitted and recovered data and observed a minor loss in the retrieved information. Analyses of the structural similarity index measure (SSIM), the structural content (SC), and normalized absolute error (NAE) [
54,
55] for the original and recovered imagery (see Fig.6) were carried out in Tab.1 to validate the feasibility of the proposed methodology in Fig.5. The supplementary document contains detailed experiments on multispectral, medical, and RGB images, as well as correlation analyses in horizontal, vertical, and diagonal directions.
The correlation error and NAE between the original and recovered images were almost negligible, whereas the recovered content’s luminance, divergence, and assembly had more than 98% similarity to the original captured content. The structural details of the recovered imagery in terms of sharpness and noise had more than 99% similarity. These results validate the efficacy of the proposed model with a trivial loss in the recovery of data from q-states.
4 Discussion
Quantum technology permits consummate levels of data protection by encoding classical information into small quantum states for quantum-assisted classical computations. These programs expedite the diversity of applications ranging from data sharing to one-time signature delegation authority [
31]. The exponential speedup of quantum computers can unravel multifaceted challenges, but the generated states in this study are unclonable and cannot be copied or replicated by the observer in the channel. An observer needs to compute
combinations to predict the basis of the states, where
n is the number of points on which the states are generated. To predict the measurement for the correct basis on six-point state generation (see Fig.2), it is necessary to compute
combinations if a step size of 1 was used to generate states.
4.1 Attacks on model
State encoding programs are non-orthogonal and coupled with the no-cloning theorem [
56], which implies the impossibility of producing two copies from a single copy. In a single-shot regime of state conversion for a distinct copy of a state, where numerous copies are assumed to be available, one must solve for all pure and mixed states [
57-
59]. The mixed states prevent dishonest users from learning about the function’s coherent query and extracting any information about classified data.
Birthday attack
The birthday paradox contemplates the probability of randomly chosen states from a set of states, and substantiates similar features with the selected states. This attack exploits the reckonings behind the state conversion problem in probability theory and depends on a fixed degree of permutation, such as . On measurement, each state clicks the 50% probability of diverging into a definite state. To launch this attack on the states generated in Fig.2 in order to find a collision in random attempts, the probability is for measuring an accurate basis to retrieve a classical solo bit, where correspond to row, column, and diagonal entries of states. Each state spins on a different point; thus, finding a collision between the axis of rotation for the states is not possible by an observer in the channel.
Secret state recovery attack
An adversary needs to estimate function for to recover the secret states.
• Let are two arbitrary numbers in fixed by an adversary.
• To measure the states in the channel, , an adversary needs to produce arbitrary states to estimate an arbitrary function:
• By using function and the states over the channel, an adversary can try to estimate to forge a message by measuring the states on a channel using .
The generated states in the algorithm shown in Fig.5 withstand this attack by means of Trent to validate the factual identity and unique states for the message. The states for message are inimitable and have no collisions or correlations. Tab.2 summarizes the characteristics of the proposed model in comparison to existing methodologies.
The most frequent approaches employ quantum channels for a perfect state transfer to carry classical data. For perfect state transfer on the quantum channel, existing methodologies assume entanglement, which is far from being addressed with the existing technology. Our proposed model is compatible with today’s technology because it shares data in the form of perfect states over a classical channel, rather than establishing a secure path using entanglement.
4.2 Attacks on AQS
The novelty of existing AQS schemes depends on QKD, BQC, and the distribution of quantum particles among partners using entangled states, whereas the proposed technique leverages the classical channel to interact with the verifier through a trusted arbitrator. Furthermore, a quantum swap test [
61] is not required to validate the quantum message for the devised technique in this work. In this section, a few key analyses are carried out to assess the resilience of the developed scheme counter to certain attacks.
Security of the private key
A malicious user can forge the signature on any message in AQS schemes if the private key is revealed. In the proposed scheme, Alice and Trent share private key
using QKD or the technique developed in [
31], which constrains a malicious user from breaking or bypassing the private key in the initializing phase.
• An adversary needs to fetch the information, , interpreted through the public channel to break the private key.
• He can try to impersonate Bob to verify the signature with to derive .
• are redundant parameters derived from , and an adversary needs to predict the output of with an insignificant probability of .
• After predicting the output, he needs to estimate from the transformed unclonable states with a probability of to predict .
Arbitrary states enable distinct sequences for the same input data while preventing information leakage that may compromise the key. As a result, the probability of estimating to break the key is negligible.
Forgery attack
There are two possibilities to forge the signature by a malicious user.
1. Forge a legitimate signature with an arbitrarily generated signature on the same message: Given the unique states for message m and private key , the accompanying signature, , will be unique. Therefore, it is impossible to replace a valid signature with a fake signature on the same message.
2. Forge with arbitrarily produced signature on a new message: A malicious user needs to set pair and share it with Trent to announce its validity publicly. Although he expects to receive , without knowledge of , , , and , he will try to guess with an insignificant probability of . Hence, this forgery is also not viable for adversary.
Disavowal attack
In the proposed scheme, Alice and Trent will not share with Bob. He has to derive it from signature by measuring the received states. He can confirm the validity of the signature with the assistance of Trent by sharing the derived . As a result, neither Alice nor Bob can deny the authenticity of a particular signature .
4.3 Characteristics comparison
In modern signature schemes, both the signer and the verifier need to perform QKD [
62,
63] or BQC [
40] to share an
n-bit secret key before signing a message. The distribution of quantum particles among companions, before establishing a signature by the signer or arbitrator, can reduce the efficiency of signature schemes [
64,
65]. Furthermore, entangled-state-based signature schemes are promising, but the effectiveness of their implementation is too complex with the existing technology. Tab.3 contains a few analyses of the proposed approach in contrast to existing methodologies.
Most existing authentication methods, irrespective of plaintext, key, or signature space, need entanglement or the quantum channel, which are not compatible with today’s technology. The schemes proposed in Refs. [
36] and [
39] employ BQC to establish entangled states between end users under perfect security constraints, but an adversary can disrupt the states during formation of a secure connection using BQC, rendering the path unavailable for communication. As a result, end users would be unable to establish a secure connection. The signature space between Alice-Bob and Alice-Trent in the proposed model is quantum, to prevent forgery and manipulation, whereas the key and plaintext are classical, making it feasible with existing technology.
5 Applications
The developed probabilistic model has a wide range of potential applications, including satellite and drone imagery, conventional, medical, and RGB content, quantum-assisted classical internet, internet of things security, and so on. We summarize a few segments related to real-time applications below.
Satellite imagery: At the time of writing, the Defense Advanced Research Projects Agency (DARPA) was preparing to launch the Blackjack LEO satellite for surveillance imaging, secure data transfer, navigation, and satellite phones [
66,
67]. Hancom, on the other hand, recently launched Sejong-1 (South Korea’s first private commercial earth observation satellite) for integrated image analysis, with plans to launch five more LEO spacecraft by 2025 [
68]. However, satellite data transmission may pose certain threats, such as cyberattacks. Radiometric, spectral, spatial, and temporal resolutions of imagery can benefit from the proposed probabilistic model in real-time secure transmissions for decision-making.
Quantum internet: The objective of the quantum internet is to deliver new technologies by enabling quantum communications among numerous locations around the globe [
69]. The proposed model can transform quantum information into classical data, and offers interaction between the quantum internet and current technologies.
Internet of things security: To work effectively, IoT applications collect a large amount of personal data. IoT devices employ conventional hashing algorithms to encrypt passwords to secure user data, but they may be cracked using a rainbow table. In the development of IoT devices, developers must include a digital signature while developing software in order to prevent hackers from replacing it with malicious firmware [
70]. The proposed AQS algorithm can be used in IoT devices with slight modifications for device constraints. In general, hackers bypass a secure boot by replicating the authentic signature using a Dyn or Mirai botnet, a baby monitor, and TRENDnet attacks [
70,
71]. For the proposed AQS, there is a need to measure perfect states in which digital signatures are generated and placed, with infinite computational resources to bypass the secure boot.
6 Conclusion
In this paper, we demonstrated the arbitrated quantum signature and unclonable spin states, in both theory and experimentation, for secure transmission and reception of classical data. The experiment is comprehended without assumptions of computational hardness and entanglement exertion, and the findings verified that quantum physics countenances improved security tradeoffs for certain computing tasks in classical communications. We observed that the outcomes produced by the proposed methodology are in good accord with the readily available technology, and we believe that the provided work insinuates the rich domain of quantum practices to enhance the security of classical computations. Future advancements would allow for quantum state verification and non-separable measurement on the client side, which might be the intention of, and an improvement to, the anticipated model.