implements Authentication of Quantum Messages
This protocol provides a non-interactive scheme with classical keys for the sender to encrypt as well as authenticate quantum messages. This was to achieve the task of authentication for quantum states, i.e. it gives the guarantee that the message sent by a party (suppliant) over a communication line is received by a party on the other end (authenticator) without having been tampered with or modified by the dishonest party (eavesdropper).
The polynomial code consists of three steps: preprocessing, encryption and encoding, and decoding and decryption. Within the preprocessing, sender and receiver agree on a stabilizer purity testing code and three private, random binary keys. Within the encryption and encoding step, the sender uses one of these keys to encrypt the original message. Consequently, a second key is used to choose a specific quantum error correction code out of the stabilizer purity testing code. The chosen quantum error correction code is then used, together with the last key, to encode the encrypted quantum message. Within the last step, the decoding and decryption step, the respective keys are used by the receiver to decide whether to abort or not, and if not, to decode and decrypt the received quantum message.
No content has been added to this section, yet!
acheck
Input: $\\\rho$ owned by $\\\mathcal{S}$; $k$, $x$, $y$ shared among $\\\mathcal{S}$ and $\\\mathcal{A}$.
Output: Receiver accepts or aborts the quantum state $\\\rho^{\\\prime}$.
Encryption and encoding:
Decoding and decryption:
No content has been added to this section, yet!
Some relevent papers for further reading:
implements Authentication of Quantum Messages
This protocol provides a non-interactive scheme with classical keys for the sender to encrypt as well as authenticate quantum messages. This was to achieve the task of authentication for quantum states, i.e. it gives the guarantee that the message sent by a party (suppliant) over a communication line is received by a party on the other end (authenticator) without having been tampered with or modified by the dishonest party (eavesdropper).
The polynomial code consists of three steps: preprocessing, encryption and encoding, and decoding and decryption. Within the preprocessing, sender and receiver agree on a stabilizer purity testing code and three private, random binary keys. Within the encryption and encoding step, the sender uses one of these keys to encrypt the original message. Consequently, a second key is used to choose a specific quantum error correction code out of the stabilizer purity testing code. The chosen quantum error correction code is then used, together with the last key, to encode the encrypted quantum message. Within the last step, the decoding and decryption step, the respective keys are used by the receiver to decide whether to abort or not, and if not, to decode and decrypt the received quantum message.
No content has been added to this section, yet!
acheck
Input: $\\\rho$ owned by $\\\mathcal{S}$; $k$, $x$, $y$ shared among $\\\mathcal{S}$ and $\\\mathcal{A}$.
Output: Receiver accepts or aborts the quantum state $\\\rho^{\\\prime}$.
Encryption and encoding:
Decoding and decryption:
No content has been added to this section, yet!
Some relevent papers for further reading:
implements Authentication of Quantum Messages
This protocol provides a non-interactive scheme with classical keys for the sender to encrypt as well as authenticate quantum messages. This was to achieve the task of authentication for quantum states, i.e. it gives the guarantee that the message sent by a party (suppliant) over a communication line is received by a party on the other end (authenticator) without having been tampered with or modified by the dishonest party (eavesdropper).
The polynomial code consists of three steps: preprocessing, encryption and encoding, and decoding and decryption. Within the preprocessing, sender and receiver agree on a stabilizer purity testing code and three private, random binary keys. Within the encryption and encoding step, the sender uses one of these keys to encrypt the original message. Consequently, a second key is used to choose a specific quantum error correction code out of the stabilizer purity testing code. The chosen quantum error correction code is then used, together with the last key, to encode the encrypted quantum message. Within the last step, the decoding and decryption step, the respective keys are used by the receiver to decide whether to abort or not, and if not, to decode and decrypt the received quantum message.
No content has been added to this section, yet!
acheck
Input: $\\\rho$ owned by $\\\mathcal{S}$; $k$, $x$, $y$ shared among $\\\mathcal{S}$ and $\\\mathcal{A}$.
Output: Receiver accepts or aborts the quantum state $\\\rho^{\\\prime}$.
Encryption and encoding:
Decoding and decryption:
No content has been added to this section, yet!
Some relevent papers for further reading: