A probabilistic model of quantum states for classical data security

Muhammad Waseem Hafiz , Seong Oun Hwang

Front. Phys. ›› 2023, Vol. 18 ›› Issue (5) : 51304

PDF (6376KB)
Front. Phys. ›› 2023, Vol. 18 ›› Issue (5) : 51304 DOI: 10.1007/s11467-023-1293-3
RESEARCH ARTICLE

A probabilistic model of quantum states for classical data security

Author information +
History +
PDF (6376KB)

Abstract

The phenomenal progress of quantum information theory over the last decade has substantially broadened the potential to simulate the superposition of states for exponential speedup of quantum algorithms over their classical peers. Therefore, the conventional and modern cryptographic standards (encryption and authentication) are susceptible to Shor’s and Grover’s algorithms on quantum computers. The significant improvement in technology permits consummate levels of data protection by encoding classical data into small quantum states that can only be utilized once by leveraging the capabilities of quantum-assisted classical computations. Considering the frequent data breaches and increasingly stringent privacy legislation, we introduce a hybrid quantum-classical model to transform classical data into unclonable states, and we experimentally demonstrate perfect state transfer to exemplify the classical data. To alleviate implementation complexity, we propose an arbitrary quantum signature scheme that does not require the establishment of entangled states to authenticate users in order to transmit and receive arbitrated states to retrieve classical data. The consequences of the probabilistic model indicate that the quantum-assisted classical framework substantially enhances the performance and security of digital data, and paves the way toward real-world applications.

Graphical abstract

Keywords

information security / quantum-classical cryptography / quantum information processing / quantum spin states / spin-${\color{[RGB]{12,108,100}} {\frac{1}{2}}} $ algebra / user authentication

Cite this article

Download citation ▾
Muhammad Waseem Hafiz, Seong Oun Hwang. A probabilistic model of quantum states for classical data security. Front. Phys., 2023, 18(5): 51304 DOI:10.1007/s11467-023-1293-3

登录浏览全文

4963

注册一个新账户 忘记密码

1 Introduction

The security of classical cryptosystems is mostly reliant on the complexity of the computations, but quantum computers can efficiently develop quantum states to model multifaceted challenges and to handle computationally complex problems [1-3]. The superposition of states on quantum computers assures the exponential speedup of algorithms and simulations over their classical complements. The probability of each state expresses the particular state’s behavior on measurement. Towards the major milestones for the development of quantum computers, Google announced quantum supremacy by producing the Sycamore (54 Qubit) and the Bristlecone (72 Qubit) chips [4]. In contrast, IBM recently announced that they thrived the 100-qubit barrier by producing the 127-qubit Eagle processor [5]. The computational resources of these mainframes can effectively handle conventional hard problems like discrete logarithms and integer factorization. These resources also validate the quadratic speedup in tackling unstructured search problems [6, 7], which threatens the complexity of traditional cryptography techniques. An adversary can bout a specific execution, attempting to dispute the operation, regardless of the physical mechanism employed to deactivate the device even after a single use.

The complexity of breaking asymmetric cryptosystems, such as Diffie−Hellman and Elliptic Curve Cryptography (ECC), is reliant on the difficulties in discrete logarithmic problems (DLP) in order to determine integer r, such that gr=xmodp, where r is the DLP of xg. The computation for r =log gxmodp is quite challenging in the classical environment if the designated parameters are large enough [8]. Furthermore, ECC provides the same level of protection as RSA and DLP methods and is considered secure and efficient [9]. It employs the pair ( x,y) in the equation y2=x3+a x+b modp, where a,b Zp, along with imaginary point θ at infinity. Factorization of large numbers and reckonings of discrete logarithms can be violated on quantum computers via Shor’s algorithm [10]. The smaller key space of ECC compared to RSA makes breaches easier with a modified Shor’s algorithm on data encrypted with ECC [11,12]. Proos and Zalka [13] described the use of Shor’s algorithm to break ECC over GF(p), while Boudot et al. [14] highlighted the factorization of RSA-240 and cracking a DLP of the same size with Shor’s method. It has also been demonstrated that a 1000-qubit processor is required to break a 160-bit elliptic curve, and a 2000-qubit processor is required to factorize 1024-bit RSA [13].

Lov Grover, on the other hand, developed an algorithm to search unsorted databases using quantum resources that deliver a square root speedup over classical brute force [7]. This algorithm can find a specific entry in an unsorted database of N entries from N searches, operates on 2n /2 for an n-bit cipher, which poses a threat to symmetric cryptographic schemes. In this case, a symmetric cipher with a 128-bit key size, such as AES-128, would offer a security level of 64 bits. Bone and Castro [15] commented on the impact of Grover’s algorithm on DES-56, which required just 185 searches to find the key. Recently, Joshi and Gupta [16] implemented Grover’s algorithm in a 4-qubit search space using IBM’s QISKit. To secure information in the post-quantum era, NIST [17] and NSA [18] recommended the AES cipher with key sizes of 192 and 256 bits. Furthermore, the hash function’s security is reliant on a fixed-length output, and Grover’s method can be employed to detect a collision by searching an unsorted database, which suffers from the same problem as symmetric ciphers. It has also been proven that this method, when combined with the birthday paradox, may effectively execute a collision attack [19]. As a result, most existing hash algorithms are inadequate for utilization in the quantum era.

Public key algorithms such as DSA, ECDSA, ElGamal, and others are extensively used for digital signatures, and their security is reliant on the aforementioned discrete logarithmic problems, rendering them equally frail to Shor’s algorithm on quantum resources. Despite being slower than Shor’s method, Grover’s algorithm has several applications in symmetric cryptosystems, and the research community is refining Grover’s algorithm as well as developing comparable category classifications, which poses a severe threat to classical ciphers [20]. Therefore, cryptographic algorithms that are robust to quantum processes are required.

In the era of quantum information technologies, quantum computation [21], cryptography [22], and metrology [23] enable efficient processing, secure communications, and precise measurements. Quantum cryptography is one of the emergent quantum technologies, and experimental analysis of quantum key distribution (QKD) has already been conducted [24-27]. Although these approaches are favorable, they are far from being enacted with existing technologies. The traditional information exchange techniques can be enhanced by introducing the gain of quantumness [28,29]. Recently, hybrid systems for probabilistic one-time programs were proposed [30,31], but they face several theoretical and technological requirements and challenges that limit their implementation. Post-quantum cryptography (PQC) can also be used for authentication and encryption, and is believed to be useful for short-term security, such as authentication [32]. Except for Shor’s algorithm, this technique is not yet theoretically secure and raises concerns about security against alternative conventional and quantum algorithms.

The ability to transfer quantum states to carry classical information is an important feature of a quantum information processing system [33]. These states can either contain a message or be utilized to establish entanglement between the two sites [34,35]. The limitation and the challenge of quantum states are to store and manipulate the reconstruction on a classical computer, and various techniques have been devised that require partial information to inspect the generated states [36-38]. To overcome limitations, we developed a model similar to blind quantum computation (BQC) [39-42] in which the classical client can delegate quantum states for classical data, and the server or a malicious user will not be able to learn any information about the input, output, or algorithm. The proposed method addresses the following concerns.

• A quantum-assisted classical computation model that transforms classical data into unclonable quantum states and predicts classical information based on retrieved quantum states.

• An arbitrary quantum signature (AQS) scheme to authenticates users with classical key and plaintext spaces, making the model feasible for existing technologies.

We experimentally validated the proposed algorithm’s efficiency, feasibility, and stability in authenticating users and transferring quantum states in order to represent classical data for quantum-safe communication.

This article is organized into six sections. Section 2 explains the procedure for generating unclonable quantum states, the signature scheme for user authentication, and the proposed model for securely sharing classical information in the form of quantum states. Experimental results of the proposed methodology when employing surveillance imagery are presented in Section 3. Section 4 contains performance analyses of the proposed model. Section 5 highlights a few real-world applications, and Section 6 comprises concluding remarks as well as information on supplementary documents.

2 Methodology

The establishment of quantum states to model a system, and the arbitrary quantum signature scheme are developed in this section. The proposed AQS scheme, which comprises initialization, signing, and verification, was developed by combining quantum theory with classical cryptography. This section also illustrates a proposed model for secure data sharing between two entities using arbitrary states.

2.1 Generation of quantum spin states

For a spin system, S, vectors are usually signified in terms of a Hermitian Cartesian component such as S^= (S^ x S^yS^z), and are represented in the Zeeman basis with the states |S,m for m=S, S+1, ,S1,S [43,44]. The Cartesian operators for non-Hermitian components Sx= 12( S++S)andSy=12 i (S+ S) satisfy the basis of states m| S^x|m =12 S( S+1)mm(δm,m +1+ δm+1,m), m| S^y|m =1 2i S(S+1)mm(δ m,m +1 δm+1,m), and m| S^z|m =δm ,m m, where S+=Sx+Syand S=(Sxi Sy). Hence, m|S^+ |m= S(S+1)mmδm,m +1 and m| S^|m=S( S+1) mm δ m+1 ,m.

For a spin 12 system, the possible states with the z components for the angular momentum are +2 for spin up, ( 10), and 2 for spin down, ( 01). Hence, S z|+ =+ 2|+ and S z|=2 |.

Let us consider S z=( ijkl) as a 2×2 matrix that represents the spin 12 system as ( ijk l)( 10)=+2| + and ( ijkl) (01)= 2| . To solve these equivalences, we received i=+ 2, j=0, k=0, and l= 2. Hence,

S z=2( 1001) with |+ z= 12 (10) and |z=12 (01).

Similarly, the spin operators in x and y directions are

S x=2( 0110) with |+ x= 12 (11) and |x=12( 11), and

S y=2( 0i i0) with |+y=12( 1i)and |y=12 (1i).

Pauli’s matrices σ i can be extracted from the above equations as S i=2σi.

The spin constituent in the direction along the unit vector as n^= i^sinθcos ϕ+j^sinθ sinϕ+k^cosθ,

therefore, spin vector S can be represented as a unit vector, S n=Sn^. Hence, S n=Sxsinθcos ϕ+Sysinθsin ϕ+Szcosθ, which implies S n=2( cosθsinθ e iϕ sinθeiϕcosθ) with eigenvectors |+n=cos θ2|+ +sin θ2e iϕ | and |n=sinθ2 |+cosθ 2eiϕ| .

The passive operators [39, 45, 46] to spin the states in the coordinate system can be computed as S i(θi)=e i Siθi /i Siθi . Hence,

S x(θ)= (cosθ2isinθ2isinθ2 cosθ2),

S y(θ)= (cosθ2sinθ2 sin θ2 cos θ 2), and

S z(θ)= (eiθ20 0 e iθ2).

The superposition of states for a qubit system on the Bloch sphere for diverse phase domains using IBM quantum composer and fetch the states for a classical system as shown in Fig.2. Quantum mainframes can efficiently simulate the states for many-body systems [47, 48], and these complex states can be used to authenticate users and simulate data over classical as well as quantum computers. For a single qubit system, in Fig.2, there are several superposition states. Each state has distinct symmetrical characteristics, and the interconnection of these states allows information to be propagated from one state to the next.

Each state comprises binary information 0 and 1, and the probability of each state expresses the particular behavior on measurement. The ability to transfer these states to carry classical information is an important feature of a quantum information processing system, and the information obtained via this approach can be conceived as a hash function of q-states on classical systems. These can either contain a message or be employed to establish entanglement between the two sites by utilizing a spin lock mechanism to detect the phase transition between sites and pair generations.

The demonstrated states in Fig.2 are generated at six points [−21.1040, −15.5460, −9.9880, −4.4300, 1.1280, 6.6860], and each point value indicates 24 distinct states to represent data. For a spin 12 system, we can model complex structures and many-point systems in the phase domain 720and720 with minimum step sizes. In the supplemental file, Fig.2 and Fig.3 elaborate on the demonstration of 15 and 25 point systems for various domains of phases.

2.2 AQS scheme

The proposed AQS scheme consists of initializing, signing, and verifying through a combination of quantum theory and classical cryptography.

Assume {Qα 1}α and {Qβ2} β are two distinct sets of one-way functions with uniform output distribution, where α,β{0,1}n and Qα1, Qβ 2: {0,1} {0,1}n. All one-way functions will be independent of each other for different α andβ {0 ,1}n.

Initializing

Let Alice and Bob would like to share a few private credentials with a trustworthy arbitrator, Trent, using QKD or the protocol developed by Marie et al. [30, 31].

• Conferring Alice’s private key, PkAT=(Pk1AT, Pk 2A T,,Pkn AT){0,1}n, she secretly chooses one-way function QPk(AT)1, QPk(AT)2: {0,1} {0,1}n from the sets {Qα1}α and {Qβ 2}β.

• Similarly, conferring Bob’s private key, PkBT= (Pk1BT,Pk2BT, ,P knBT){0,1}n, he secretly chooses one-way function QPk(BT)1, QPk(BT)2: {0,1} {0,1}n from the sets {Qα1}α and {Qβ 2}β.

Let us define x=( x1,x2,. .., xn)andy =(y1,y2,,yn) {0,1}n, Hadamard H=22( 111 1), and unit operator I, where xy=( x1 y1, x2 y2, ,x3 y3) and H 0=1.

Signing

Let the message m=( m1,m2, ,mn){0,1}n needs to be signed.

• Alice calculates the hash of the message as hA=QPk(AT)1(m)QPk(AT)2(m) and r A=hAm, where h A=( h1,h2, ,hn) and rA=(r1,r2, ,rn) for each 1in and ri=himi.

• She generates a signature from her private key for Trent, | Sm,pk,λT := i =1n |Si,

where |Si=Hri |mi={ |0for ri= 0and mi=0, |1for ri= 0and mi=1, |+for ri= 1and mi=0, |for ri= 1and mi=1.

• She sends r A and |Sm, Pk( AT) to Bob using the classical and the quantum channel.

Verification

Bob will make an appropriate measurement after receiving rAand| Sm ,Pk(AT) on each state according to r i and |Si by choosing basis { |0, |1 } or { |+ , |} to measure | Si for r i=0. By using the consequences of | Si and the measurement, he is able to set m i:={ 0 for |Si=|0or|+1 for |Si=|1or|.

• Bob will use his private key, PkBT, and one-way functions, QPk(BT)1and QPk( BT)2, to derive hB and announce the pair (m,hB) for Trent to download, where hB= QPk( BT)1( hA rAm)QPk(BT)2(hArAm).

• Trent will compute hA and hB using the one-way functions of Alice and Bob as:

hA=Q Pk( AT)1(m)QPk(AT)2(m), and

hB=Q Pk( BT)1( hArA m)QPk(BT)2(hA rAm ), where rA= hA m.

• Trent announces the validity of (m,hB) publicly if hB=hB, and Bob will accept (m, hA|Sm, Pk( AT)) as a valid signature.

Bob will set the basis accordingly to measure the states, which allows him to fetch the message, m=( m1,m2, ,mn).

2.3 Proposed model for state transfer

We consider data sharing between Alice and Bob where Alice provides data in the form of arbitrary states, and Bob retrieves data from the received states. She encodes classical data in the form of states, which grow linearly in the number of q-sequences required to execute function f, and then sends the states to Bob. He will assess the received states sequentially to extract the plaintext data. These evaluations are primarily irreversible, and Bob must evaluate function f (x), whereas (in unison for some input) it prevents him from learning about f( x) such that x x. The overview of quantum-assisted classical computation is given in Fig.3.

The interconnection of states allows Alice to propagate information from one state to the next, and each state contains binary information 0 and 1 at the same time. For the classical 8-bit data stream illustrated in Fig.3, the transitions to spin states are as follows.

• If the first bit is 0, the transferred state would be the same as the generated one.

• If the first bit is 1, it spins the state at the designated phase (up-spin of 45 ) in Fig.3.

• The proceeding states spins at the designated phase on the bit flip.

• On reception, the receiver sets the basis with the shared information and a private key to measure the incoming states to retrieve the classical bits.

The probabilistic version of states (pointed out by Roehsner MC et al. [30, 31]) for the classical data, encoded using a single qubit, is specified in Fig.4. The measurement corresponding to input is anti-commute [49], which can be obtained by fixing the basis to be consistent with inputs 0 and 1, σzfor 0andσxfor 1, respectively, to find the state to encode and decode the data.

The encoding is related to Wiesner’s conjugate encoding [50] and is equivalent to the quantum random access code addressed in Ref. [51].

To demonstrate the feasibility of the proposed scheme, we consider a program to generate q-states for universal classical computation that transforms classical message m into state |m, in which two entities can share their data without disclosing their credentials to other parties. To accomplish the objective, Alice encodes her classical data stream with the generated q-states and transmits it with the delegation of signature. On the other hand, after authenticating Bob’s factual identification, the program returns a classical bit sequence. Fig.5 depicts an overview of the model.

Bob computes a hash of the message to sign, uses it as input to generate states for message retrieval, and Trent verifies the output of the one-way function (see Section 2.2). However, we assume spin locking between Alice and Bob in order to generate q-states on both sides (either with Trent or in a symmetric fashion) to transform classical bits into spin states and then extract the classical data by measuring the generated and received states.

3 Experimental results

We conducted an experiment using surveillance drone imagery to securely transmit specified aerial information to the receiver (Fig.6). Tab.1 analyzes the information loss in the recovered imagery (compared to the original) to confirm the efficacy of classical data recovery from quantum states.

The source was high-resolution aerial surveillance imagery (image 1) captured with a high payload capacity WingtraOne mapping drone equipped with a Sony RX1R II camera, accessible from the WingtraOne data sets repository. We assumed the spectator is required to transmit specific information from the construction site (image 2) to another individual to demonstrate the progress in a specific region (image 3). The experiment was carried out under ideal conditions, with no channel loss or state disruption, transforming the imagery into q-states for transmission and recovering it from free states upon reception. We used correlation analysis [52, 53] to compare the transmitted and recovered data and observed a minor loss in the retrieved information. Analyses of the structural similarity index measure (SSIM), the structural content (SC), and normalized absolute error (NAE) [54, 55] for the original and recovered imagery (see Fig.6) were carried out in Tab.1 to validate the feasibility of the proposed methodology in Fig.5. The supplementary document contains detailed experiments on multispectral, medical, and RGB images, as well as correlation analyses in horizontal, vertical, and diagonal directions.

The correlation error and NAE between the original and recovered images were almost negligible, whereas the recovered content’s luminance, divergence, and assembly had more than 98% similarity to the original captured content. The structural details of the recovered imagery in terms of sharpness and noise had more than 99% similarity. These results validate the efficacy of the proposed model with a trivial loss in the recovery of data from q-states.

4 Discussion

Quantum technology permits consummate levels of data protection by encoding classical information into small quantum states for quantum-assisted classical computations. These programs expedite the diversity of applications ranging from data sharing to one-time signature delegation authority [31]. The exponential speedup of quantum computers can unravel multifaceted challenges, but the generated states in this study are unclonable and cannot be copied or replicated by the observer in the channel. An observer needs to compute 1440 n combinations to predict the basis of the states, where n is the number of points on which the states are generated. To predict the measurement for the correct basis on six-point state generation (see Fig.2), it is necessary to compute 14406 combinations if a step size of 1 was used to generate states.

4.1 Attacks on model

State encoding programs are non-orthogonal and coupled with the no-cloning theorem [56], which implies the impossibility of producing two copies from a single copy. In a single-shot regime of state conversion for a distinct copy of a state, where numerous copies are assumed to be available, one must solve for all pure and mixed states [57-59]. The mixed states prevent dishonest users from learning about the function’s coherent query and extracting any information about classified data.

Birthday attack

The birthday paradox contemplates the probability of randomly chosen states from a set of n states, and substantiates similar features with the selected states. This attack exploits the reckonings behind the state conversion problem in probability theory and depends on a fixed degree of permutation, such as S={SiS4× 4(I,Sx(θ),Sy(θ),Sz(θ)),i=1,2,,24}. On measurement, each state clicks the 50% probability of diverging into a definite state. To launch this attack on the states generated in Fig.2 in order to find a collision in random attempts, the probability is 1(2 ×m×n )d for measuring an accurate basis to retrieve a classical solo bit, where m,n,andd correspond to row, column, and diagonal entries of states. Each state spins on a different point; thus, finding a collision between the axis of rotation for the states is not possible by an observer in the channel.

Secret state recovery attack

An adversary needs to estimate function f (x) for f(x) to recover the secret states.

• Let b{ 0,1} ,x{0,1} n,andα1, α2 are two arbitrary numbers in {0, 1}n fixed by an adversary.

• To measure the states in the channel, |Sm, an adversary needs to produce arbitrary states | α to estimate an arbitrary function:

ε(f)={ | 0 for { |Sm1 ,| α1}, {| Sm 2,| α1 }, |1 for { |Sm1 ,| α2 }, {|Sm2 ,| α2 }.

• By using function ε(f ) and the states over the channel, an adversary can try to estimate f (x)= ((|S m1,α1, |S m1,α2)(|S m2,α1, |S m2,α2)) to forge a message by measuring the states on a channel using f(x).

The generated states in the algorithm shown in Fig.5 withstand this attack by means of Trent to validate the factual identity and unique states for the message. The states | Si for message mi are inimitable and have no collisions or correlations. Tab.2 summarizes the characteristics of the proposed model in comparison to existing methodologies.

The most frequent approaches employ quantum channels for a perfect state transfer to carry classical data. For perfect state transfer on the quantum channel, existing methodologies assume entanglement, which is far from being addressed with the existing technology. Our proposed model is compatible with today’s technology because it shares data in the form of perfect states over a classical channel, rather than establishing a secure path using entanglement.

4.2 Attacks on AQS

The novelty of existing AQS schemes depends on QKD, BQC, and the distribution of quantum particles among partners using entangled states, whereas the proposed technique leverages the classical channel to interact with the verifier through a trusted arbitrator. Furthermore, a quantum swap test [61] is not required to validate the quantum message for the devised technique in this work. In this section, a few key analyses are carried out to assess the resilience of the developed scheme counter to certain attacks.

Security of the private key

A malicious user can forge the signature on any message in AQS schemes if the private key is revealed. In the proposed scheme, Alice and Trent share private key P k(AT ) using QKD or the technique developed in [31], which constrains a malicious user from breaking or bypassing the private key in the initializing phase.

• An adversary needs to fetch the information, m,rA,hB, and|S m,PK( AT) , interpreted through the public channel to break the private key.

• He can try to impersonate Bob to verify the signature with Pk(BT) to derive hA.

rA,hB, and|S m,PK( AT) are redundant parameters derived from m, hA,andP K(BT), and an adversary needs to predict the output of QPk (AT)1andQ Pk (AT)2 with an insignificant probability of 1/2 2n.

• After predicting the output, he needs to estimate m from the transformed unclonable states with a probability of 1 /22× 3n to predict hA.

Arbitrary states enable distinct sequences for the same input data while preventing information leakage that may compromise the key. As a result, the probability of estimating m to break the key is negligible.

Forgery attack

There are two possibilities to forge the signature by a malicious user.

1. Forge a legitimate signature with an arbitrarily generated signature on the same message: Given the unique states for message m and private key PK(AT), the accompanying signature, |Sm,PK( AT)= i=1n Hr i|mi , will be unique. Therefore, it is impossible to replace a valid signature with a fake signature ( |m ,hA,|S m,PK( AT) ) on the same message.

2. Forge with arbitrarily produced signature on a new message: A malicious user needs to set pair (m ,h B) and share it with Trent to announce its validity publicly. Although he expects to receive hB=hB, without knowledge of QPk( BT)1, QPk( BT)2, hA, and rA, he will try to guess hB =hB with an insignificant probability of 1/2 n. Hence, this forgery is also not viable for adversary.

Disavowal attack

In the proposed scheme, Alice and Trent will not share hA with Bob. He has to derive it from signature |Sm, PK(AT) by measuring the received states. He can confirm the validity of the signature (m,hA,| Sm,PK(AT ) ) with the assistance of Trent by sharing the derived h A. As a result, neither Alice nor Bob can deny the authenticity of a particular signature (m,h A,|Sm,PK(AT)).

4.3 Characteristics comparison

In modern signature schemes, both the signer and the verifier need to perform QKD [62, 63] or BQC [40] to share an n-bit secret key before signing a message. The distribution of quantum particles among companions, before establishing a signature by the signer or arbitrator, can reduce the efficiency of signature schemes [64, 65]. Furthermore, entangled-state-based signature schemes are promising, but the effectiveness of their implementation is too complex with the existing technology. Tab.3 contains a few analyses of the proposed approach in contrast to existing methodologies.

Most existing authentication methods, irrespective of plaintext, key, or signature space, need entanglement or the quantum channel, which are not compatible with today’s technology. The schemes proposed in Refs. [36] and [39] employ BQC to establish entangled states between end users under perfect security constraints, but an adversary can disrupt the states during formation of a secure connection using BQC, rendering the path unavailable for communication. As a result, end users would be unable to establish a secure connection. The signature space between Alice-Bob and Alice-Trent in the proposed model is quantum, to prevent forgery and manipulation, whereas the key and plaintext are classical, making it feasible with existing technology.

5 Applications

The developed probabilistic model has a wide range of potential applications, including satellite and drone imagery, conventional, medical, and RGB content, quantum-assisted classical internet, internet of things security, and so on. We summarize a few segments related to real-time applications below.

Satellite imagery: At the time of writing, the Defense Advanced Research Projects Agency (DARPA) was preparing to launch the Blackjack LEO satellite for surveillance imaging, secure data transfer, navigation, and satellite phones [66, 67]. Hancom, on the other hand, recently launched Sejong-1 (South Korea’s first private commercial earth observation satellite) for integrated image analysis, with plans to launch five more LEO spacecraft by 2025 [68]. However, satellite data transmission may pose certain threats, such as cyberattacks. Radiometric, spectral, spatial, and temporal resolutions of imagery can benefit from the proposed probabilistic model in real-time secure transmissions for decision-making.

Quantum internet: The objective of the quantum internet is to deliver new technologies by enabling quantum communications among numerous locations around the globe [69]. The proposed model can transform quantum information into classical data, and offers interaction between the quantum internet and current technologies.

Internet of things security: To work effectively, IoT applications collect a large amount of personal data. IoT devices employ conventional hashing algorithms to encrypt passwords to secure user data, but they may be cracked using a rainbow table. In the development of IoT devices, developers must include a digital signature while developing software in order to prevent hackers from replacing it with malicious firmware [70]. The proposed AQS algorithm can be used in IoT devices with slight modifications for device constraints. In general, hackers bypass a secure boot by replicating the authentic signature using a Dyn or Mirai botnet, a baby monitor, and TRENDnet attacks [70, 71]. For the proposed AQS, there is a need to measure perfect states in which digital signatures are generated and placed, with infinite computational resources to bypass the secure boot.

6 Conclusion

In this paper, we demonstrated the arbitrated quantum signature and unclonable spin states, in both theory and experimentation, for secure transmission and reception of classical data. The experiment is comprehended without assumptions of computational hardness and entanglement exertion, and the findings verified that quantum physics countenances improved security tradeoffs for certain computing tasks in classical communications. We observed that the outcomes produced by the proposed methodology are in good accord with the readily available technology, and we believe that the provided work insinuates the rich domain of quantum practices to enhance the security of classical computations. Future advancements would allow for quantum state verification and non-separable measurement on the client side, which might be the intention of, and an improvement to, the anticipated model.

References

[1]

R. S. Bennink. Efficient verification of anticoncentrated quantum states. npj Quantum Inf., 2021, 7(1): 127

[2]

H. Y. Huang, M. Broughton, J. Cotler, S. Chen, J. Li, M. Mohseni, H. Neven, R. Babbush, R. Kueng, J. Preskill, J. R. McClean. Quantum advantage in learning from experiments. Science, 2022, 376(6598): 1182

[3]

N. N. Zhang, M. J. Tao, W. T. He, X. Y. Chen, X. Y. Kong, F. G. Deng, N. Lambert, Q. Ai. Efficient quantum simulation of open quantum dynamics at various Hamiltonians and spectral densities. Front. Phys., 2021, 16(5): 51501

[4]

F. Arute, K. Arya, R. Babbush, D. Bacon, J. C. Bardin. . Quantum supremacy using a programmable superconducting processor. Nature, 2019, 574(7779): 505

[5]

J.ChowO. DialJ.Gambetta, IBM Quantum breaks the 100-qubit processor barrier, IBM Research Blog, 2021

[6]

P.W. Shor, Algorithms for quantum computation: Discrete logarithms and factoring, in: Proceedings 35th Annual Symposium on Foundations of Computer Science, IEEE, 1994

[7]

L.K. Grover, A fast quantum mechanical algorithm for database search: in: Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing, 1996, pp 212–219

[8]

M. W. Hafiz, W. K. Lee, S. O. Hwang, M. Khan, A. Latif. Discrete logarithmic factorial problem and Einstein crystal model based public-key cryptosystem for digital content confidentiality. IEEE Access, 2022, 10: 102119

[9]

C.PaarJ. Pelzl, Introduction to public-key cryptography, in: Understanding Cryptography, Berlin, Heidelberg: Springer, 2010

[10]

P. W. Shor. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev., 1999, 41(2): 303

[11]

Z.KirschM. Chow, Quantum computing: The risk to existing encryption methods, URL:

[12]

M.I. BhatK. J. Giri, Impact of computational power on cryptography, in: Multimedia Security, Singapore: Springer, 2021 pp 45–88

[13]

J.ProosC. Zalka, Shor’s discrete logarithm quantum algorithm for elliptic curves. arXiv: quant-ph/0301141 (2003)

[14]

F.BoudotP. GaudryA.GuillevicN.HeningerE.ThoméP.Zimmermann, Comparing the difficulty of factorization and discrete logarithm: A 240-digit experiment, in: Annual International Cryptology Conference, 2020, pp 62–91

[15]

S.BoneM. Castro, A brief history of quantum computing, Imperial College in London, 1997

[16]

S. Joshi, D. Gupta. Grover’s algorithm in a 4-qubit search space. Journal of Quantum Computing., 2021, 3(4): 137

[17]

M. E. Smid. Development of the advanced encryption standard. J. Res. Natl. Inst. Stand. Technol., 2021, 126: 126024

[18]

NSA/CSS, Commercial national security algorithm suite and quantum computing FAQ, Information assurance directorate, 2016

[19]

G. BrassardP. Høyer , A. Tapp., Quantum cryptanalysis of hash and claw-free functions, in: Latin American Symposium on Theoretical Informatics, Berlin, Heidelberg: Springer, 1998, pp 163–169

[20]

X. Q. Cai, T. Y. Wang, C. Y. Wei, F. Gao. Cryptanalysis of quantum digital signature for the access control of sensitive data. Physica A, 2022, 593: 126949

[21]

G.BenentiG. CasatiD.RossiniG.Strini, Principles of quantum computation and information: A comprehensive textbook, 2019

[22]

C. Portmann, R. Renner. Security in quantum cryptography. Rev. Mod. Phys., 2022, 94(2): 025008

[23]

N. Shettell, E. Kashefi, D. Markham. Cryptographic approach to quantum metrology. Phys. Rev. A, 2022, 105(1): L010401

[24]

F. Xu, X. Ma, Q. Zhang, H. K. Lo, J. W. Pan. Secure quantum key distribution with realistic devices. Rev. Mod. Phys., 2020, 92(2): 025002

[25]

S. K. Liao, W. Q. Cai, W. Y. Liu, L. Zhang, Y. Li. . Satellite-to-ground quantum key distribution. Nature, 2017, 549(7670): 43

[26]

H. Takenaka, A. Carrasco-Casado, M. Fujiwara, M. Kitamura, M. Sasaki, M. Toyoshima. Satellite-to-ground quantum-limited communication using a 50-kg-class microsatellite. Nat. Photonics, 2017, 11(8): 502

[27]

Y. F. Yan, L. Zhou, W. Zhong, Y. B. Sheng. Measurement-device-independent quantum key distribution of multiple degrees of freedom of a single photon. Front. Phys., 2021, 16(1): 11501

[28]

Z.G. WangS. J. WeiG.L. Long, A quantum circuit design of AES requiring fewer quantum qubits and gate operations, Front. Phys. 17(4), 41501 (2022)

[29]

H. M. Waseem, S. O. Hwang. Design of highly nonlinear confusion component based on entangled points of quantum spin states. Sci. Rep., 2023, 13(1): 1099

[30]

M. C. Roehsner, J. A. Kettlewell, J. Fitzsimons, P. Walther. Probabilistic one-time programs using quantum entanglement. npj Quantum Inf., 2021, 7: 98

[31]

M. C. Roehsner, J. A. Kettlewell, T. B. Batalhão, J. F. Fitzsimons, P. Walther. Quantum advantage for probabilistic one-time programs. Nat. Commun., 2018, 9(1): 5225

[32]

K.HanA. RazaS.O. Hwang, CAPTCHA-based secret-key sharing using quantum communication, IT Prof. 23(6), 46 (2021)

[33]

J. L. Pachuau, A. K. Saha. Generic conversion method for various spatial domain filters in quantum image processing. Physica A, 2022, 596: 127196

[34]

Y. Wei, S. Wang, Y. Zhu, T. Li. Sender-controlled measurement-device-independent multiparty quantum communication. Front. Phys., 2022, 17(2): 21503

[35]

Z. Ji, P. Fan, H. Zhang. Entanglement swapping for Bell states and Greenberger–Horne–Zeilinger states in qubit systems. Physica A, 2022, 585: 126400

[36]

O. M. Sotnikov, I. A. Iakovlev, A. A. Iliasov, M. I. Katsnelson, A. A. Bagrov, V. V. Mazurenko. Certification of quantum states with hidden structure of their bitstrings. npj Quantum Inf., 2022, 8: 41

[37]

J. Xiao, J. Wen, S. Wei, G. Long. Reconstructing unknown quantum states using variational layerwise method. Front. Phys., 2022, 17(5): 51501

[38]

C. Luo, F. Guo, W. Wan, Y. Fang, P. Wang, X. Huang. Demonstration of ghost communication with an encrypted speckle. Opt. Laser Technol., 2022, 149: 107926

[39]

Z. Qu, K. Wang, M. Zheng. Secure quantum fog computing model based on blind quantum computation. J. Ambient Intell. Humaniz. Comput., 2022, 13(8): 3807

[40]

Q. Li, Z. Li, W. H. Chan, S. Zhang, C. Liu. Blind quantum computation with identity authentication. Phys. Lett. A, 2018, 382(14): 938

[41]

S. Barz, E. Kashefi, A. Broadbent, J. F. Fitzsimons, A. Zeilinger, P. Walther. Demonstration of blind quantum computing. Science, 2012, 335(6066): 303

[42]

Q. Li, C. Liu, Y. Peng, F. Yu, C. Zhang. Blind quantum computation where a user only performs single-qubit gates. Opt. Laser Technol., 2021, 142: 107190

[43]

N.Wheeler, Spin matrices for arbitrary spin, Reed College Physics Department, Portland, 2000

[44]

H. M. Waseem, M. Khan. Information confidentiality using quantum spinning, rotation and finite state machine. Int. J. Theor. Phys., 2018, 57(11): 3584

[45]

J.Branson, Quantum physics, derive the expression for rotation operator, 2013

[46]

A.AlghafisH. M. WaseemM.KhanS.S. Jamal, A hybrid cryptosystem for digital contents confidentiality based on rotation of quantum spin states, Physica A 554, 123908 (2020)

[47]

F. Tacchino, A. Chiesa, S. Carretta, D. Gerace. Quantum computers as universal quantum Simulators: State‐of‐the‐art and perspectives. Adv. Quantum Technol., 2020, 3(3): 1900052

[48]

H.M. WaseemM. Khan, A new approach to digital content privacy using quantum spin and finite-state machine, Appl. Phys. B 125(2), 27 (2019)

[49]

R. E. Kastner. Unitary-only quantum theory cannot consistently describe the use of itself: On the frauchiger–renner paradox. Found. Phys., 2020, 50(5): 441

[50]

S. Wiesner. Conjugate coding. ACM Sigact News., 1983, 15(1): 78

[51]

A.Nayak, Optimal lower bounds for quantum automata and random access codes, in: 40th Annual Symposium on Foundations of Computer Science (Cat. No. 99CB37039), IEEE, 1999, pp 369–376

[52]

H. M. Waseem, A. Alghafis, M. Khan. An efficient public key cryptosystem based on dihedral group and quantum spin states. IEEE Access, 2020, 8: 71821

[53]

S. I. Batool, M. Amin, H. M. Waseem. Public key digital contents confidentiality scheme based on quantum spin and finite state automation. Physica A, 2020, 537: 122677

[54]

A.AlghafisH. M. WaseemM.KhanS.S. JamalM.Amin S.I. Batool, A novel digital contents privacy scheme based on quantum harmonic oscillator and schrodinger paradox, Wirel. Netw., (2020)

[55]

A. H. Ismail, H. M. Waseem, M. Ishtiaq, S. S. Jamal, M. Khan. Quantum spin half algebra and generalized megrelishvili protocol for confidentiality of digital images. Int. J. Theor. Phys., 2021, 60(5): 1720

[56]

W.K. WoottersW.H. Zurek, A single quantum cannot be cloned, Nature 299(5886), 802 (1982)

[57]

K. D. Wu, T. Theurer, G. Y. Xiang, C. F. Li, G. C. Guo, M. B. Plenio, A. Streltsov. Quantum coherence and state conversion: Theory and experiment. npj Quantum Inf., 2020, 6: 22

[58]

Z. D. Ye, D. Pan, Z. Sun, C. G. Du, L. G. Yin, G. L. Long. Generic security analysis framework for quantum secure direct communication. Front. Phys., 2021, 16(2): 21503

[59]

B. Regula, K. Fang, X. Wang, G. Adesso. One-shot coherence distillation. Phys. Rev. Lett., 2018, 121(1): 010401

[60]

R. Kuang, M. Barbeau. Quantum permutation pad for universal quantum-safe cryptography. Quantum Inform. Process., 2022, 21(6): 211

[61]

S. Foulds, V. Kendon, T. Spiller. The controlled SWAP test for determining quantum entanglement. Quantum Sci. Technol., 2021, 6(3): 035002

[62]

D. H. Jiang, Y. L. Xu, G. B. Xu. Arbitrary quantum signature based on local indistinguishability of orthogonal product states. Int. J. Theor. Phys., 2019, 58(3): 1036

[63]

L. Zhang, H. W. Sun, K. J. Zhang, H. Y. Jia. An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption. Quantum Inform. Process., 2017, 16(3): 70

[64]

M. Q. Wang, X. Wang, T. Zhan. An efficient quantum digital signature for classical messages. Quantum Inform. Process., 2018, 17(10): 275

[65]

S. Akleylek, M. Soysaldı, W. K. Lee, S. O. Hwang, D. C. Wong. Novel Postquantum MQ-based signature scheme for Internet of things with parallel implementation. IEEE Internet Things J., 2021, 8(8): 6983

[66]

S.Erwin, Parsons to Develop Ground Operations Center for DARPA’s Blackjack Satellites, Space News, 2021

[67]

M.Borowitz, The military use of small satellites in orbit, Briefings de l’Ifri, Ifri, 2022

[68]

Korea-EUResearch CentreSejong-1, Hancom to launch S. Korea’s first private satellite for integrated image analysis service, 2022

[69]

S. Wehner, D. Elkouss, R. Hanson. Quantum internet: A vision for the road ahead. Science, 2018, 362(6412): eaam9288

[70]

A. P. Bhatt, A. Sharma. Quantum cryptography for internet of things security. J. Electron. Sci. Technol., 2019, 17(3): 213

[71]

J.LinW. YuN.ZhangX.YangH.Zhang W.Zhao, A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications, IEEE Internet Things J. 4(5), 1125 (2017)

RIGHTS & PERMISSIONS

Higher Education Press

AI Summary AI Mindmap
PDF (6376KB)

Supplementary files

fop-21293-OF-SeongOunHwang_suppl_1

838

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/