Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2018 (2018), Article ID 8214619, 7 pages
https://doi.org/10.1155/2018/8214619
Research Article

Quantum Cryptography for the Future Internet and the Security Analysis

1Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, Nanjing, China
2State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
3Hunan University of Science and Technology, Xiangtan, China

Correspondence should be addressed to Jian Shen; moc.621@naijnehs_s

Received 28 December 2017; Accepted 29 January 2018; Published 21 February 2018

Academic Editor: Guojun Wang

Copyright © 2018 Tianqi Zhou et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. L. Strate, “The varieties of cyberspace: Problems in definition and delimitation,” Western Journal of Communication, vol. 63, no. 3, pp. 382–412, 1999. View at Publisher · View at Google Scholar · View at Scopus
  2. J. Shen, J. Shen, X. Chen, X. Huang, and W. Susilo, “An efficient public auditing protocol with novel dynamic structure for cloud data,” IEEE Transactions on Information Forensics and Security, vol. 12, pp. 2402–2415, 2017. View at Publisher · View at Google Scholar
  3. J. Li, Y. Zhang, X. Chen, and Y. Xiang, “Secure attribute-based data sharing for resource-limited users in cloud computing,” Computers & Security, 2017. View at Publisher · View at Google Scholar
  4. T. Zhou, L. Chen, and J. Shen, “Movie Recommendation System Employing the User-Based CF in Cloud Computing,” in Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), pp. 46–50, Guangzhou, China, July 2017. View at Publisher · View at Google Scholar
  5. R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  6. J. Shen, T. Zhou, X. Chen, J. Li, and W. Susilo, “Anonymous and Traceable Group Data Sharing in Cloud Computing,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 4, pp. 912–925, 2018. View at Publisher · View at Google Scholar
  7. T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Transactions on Information Theory, vol. 31, no. 4, pp. 469–472, 1985. View at Publisher · View at Google Scholar · View at MathSciNet
  8. Y.-M. Tseng, “An efficient two-party identity-based key exchange protocol,” Informatica, vol. 18, no. 1, pp. 125–136, 2007. View at Google Scholar · View at Scopus
  9. J. Shen, T. Miao, Q. Liu, S. Ji, C. Wang, and D. Liu, “S-SurF: An Enhanced Secure Bulk Data Dissemination in Wireless Sensor Networks,” in Security, Privacy, and Anonymity in Computation, Communication, and Storage, vol. 10656 of Lecture Notes in Computer Science, pp. 395–408, Springer International Publishing, Cham, 2017. View at Publisher · View at Google Scholar
  10. P. W. Shor, “Algorithms for quantum computation: discrete logarithms and factoring,” in Proceedings of the 35th Annual Symposium on Foundations of Computer Science (SFCS '94), pp. 124–134, IEEE, 1994. View at Publisher · View at Google Scholar
  11. J. Shen, T. Zhou, F. Wei, X. Sun, and Y. Xiang, “Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things,” IEEE Internet of Things Journal, pp. 1–1. View at Publisher · View at Google Scholar
  12. A. Peres, Quantum Theory: Concepts And Methods, Springer Science & Business Media, 2006.
  13. S. Wiesner, “Conjugate coding,” ACM SIGACT News, vol. 15, no. 1, pp. 78–88, 1983. View at Publisher · View at Google Scholar
  14. C. H. Bennett and G. Brassard, “WITHDRAWN: Quantum cryptography: Public key distribution and coin tossing,” Theoretical Computer Science, 2011. View at Publisher · View at Google Scholar
  15. A. K. Ekert, “Quantum cryptography based on Bellâs theorem,” Physical Review Letters, vol. 67, no. 6, pp. 661–663, 1991. View at Publisher · View at Google Scholar · View at Scopus
  16. C. H. Bennett, “Quantum cryptography using any two nonorthogonal states,” Physical Review Letters, vol. 68, no. 21, pp. 3121–3124, 1992. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  17. B. Huttner, N. Imoto, N. Gisin, and T. Mor, “Quantum cryptography with coherent states,” Physical Review A: Atomic, Molecular and Optical Physics, vol. 51, no. 3, pp. 1863–1869, 1995. View at Publisher · View at Google Scholar · View at Scopus
  18. D. Bruß, “Optimal eavesdropping in quantum cryptography with six states,” Physical Review Letters, vol. 81, no. 14, pp. 3018–3021, 1998. View at Publisher · View at Google Scholar · View at Scopus
  19. P. Li, J. Li, Z. Huang, C.-Z. Gao, W.-B. Chen, and K. Chen, “Privacy-preserving outsourced classification in cloud computing,” Cluster Computing, pp. 1–10, 2017. View at Publisher · View at Google Scholar · View at Scopus
  20. C. Crépeau, “Quantum oblivious transfer,” Journal of Modern Optics, vol. 41, no. 12, pp. 2445–2454, 1994. View at Publisher · View at Google Scholar · View at Scopus
  21. C. H. Bennett, G. Brassard, C. Crépeau, and M.-H. Skubiszewska, “Practical quantum oblivious transfer,” in Annual International Cryptology Conference, pp. 351–366, Springer.
  22. D. Mayers and L. Salvail, “Quantum oblivious transfer is secure against all individual measurements,” in Proceedings of the Workshop on Physics and Computation. PhysComp '94, pp. 69–77, Dallas, TX, USA. View at Publisher · View at Google Scholar
  23. D. Mayers, “On the security of the quantum oblivious transfer and key distribution protocols,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, vol. 963, pp. 124–135, 1995. View at Publisher · View at Google Scholar · View at Scopus
  24. S. Winkler and J. Wullschleger, “On the efficiency of classical and quantum oblivious transfer reductions,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, vol. 6223, pp. 707–723, 2010. View at Publisher · View at Google Scholar · View at Scopus
  25. A. Chailloux, I. Kerenidis, and J. Sikora, “Lower bounds for quantum oblivious transfer,” Quantum Information & Computation, vol. 13, no. 1-2, pp. 0158–0177, 2013. View at Google Scholar · View at Scopus
  26. M. Curty and D. J. Santos, “Quantum authentication of classical messages,” Physical Review A: Atomic, Molecular and Optical Physics, vol. 64, no. 6, 2001. View at Publisher · View at Google Scholar
  27. B.-S. Shi, J. Li, J.-M. Liu, X.-F. Fan, and G.-C. Guo, “Quantum key distribution and quantum authentication based on entangled state,” Physics Letters A, vol. 281, no. 2-3, pp. 83–87, 2001. View at Publisher · View at Google Scholar · View at Scopus
  28. D. Zhang and X. Li, “Quantum authentication using orthogonal product states,” in Proceedings of the 3rd International Conference on Natural Computation, ICNC 2007, pp. 608–612, China, August 2007. View at Publisher · View at Google Scholar · View at Scopus
  29. G. Brassard and C. Crépeau, “Quantum bit commitment and coin tossing protocols in,” in Proceedings of the Conference on the Theory and Application of Cryptography, pp. 49–61, Springer.
  30. N. K. Langford, R. B. Dalton, M. D. Harvey et al., “Measuring entangled qutrits and their use for quantum bit commitment,” Physical Review Letters, vol. 93, no. 5, Article ID 053601, pp. 1–53601, 2004. View at Publisher · View at Google Scholar · View at Scopus
  31. G. Zeng and C. H. Keitel, “Arbitrated quantum-signature scheme,” Physical Review A: Atomic, Molecular and Optical Physics, vol. 65, no. 4, 2002. View at Publisher · View at Google Scholar
  32. X. Lü and D. Feng, “An Arbitrated Quantum Message Signature Scheme,” in Computational and Information Science, vol. 3314 of Lecture Notes in Computer Science, pp. 1054–1060, Springer Berlin Heidelberg, Berlin, Heidelberg, 2004. View at Publisher · View at Google Scholar
  33. J. Shen, T. Zhou, D. He, Y. Zhang, X. Sun, and Y. Xiang, “Block design-based key agreement for group data sharing in cloud computing,” IEEE Transactions on Dependable and Secure Computing, vol. PP, no. 99, 2017. View at Publisher · View at Google Scholar
  34. W. Heisenberg, “Über den anschaulichen inhalt der quantentheoretischen kinematik und mechanik,” in Original Scientific Papers Wissenschaftliche Originalarbeiten, pp. 478–504, Springer, 1985. View at Google Scholar
  35. A. Peres and L. E. Ballentine, “Quantum Theory: Concepts and Methods,” American Journal of Physics, vol. 63, no. 3, pp. 285-286, 1995. View at Publisher · View at Google Scholar
  36. A. K. Pati and S. L. Braunstein, “Impossibility of deleting an unknown quantum state,” Nature, vol. 404, no. 6774, pp. 164-165, 2000. View at Publisher · View at Google Scholar · View at Scopus
  37. C. H. Bennett, G. Brassard, C. Crépeau, R. Jozsa, A. Peres, and W. K. Wootters, “Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels,” Physical Review Letters, vol. 70, no. 13, pp. 1895–1899, 1993. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  38. B. M. Terhal, D. P. DiVincenzo, and D. W. Leung, “Hiding bits in bell states,” Physical Review Letters, vol. 86, no. 25, pp. 5807–5810, 2001. View at Publisher · View at Google Scholar · View at Scopus
  39. C. E. Shannon, “Communication theory of secrecy systems,” Bell Labs Technical Journal, vol. 28, no. 4, pp. 656–715, 1949. View at Publisher · View at Google Scholar · View at MathSciNet
  40. J. Shen, D. Liu, J. Shen, Q. Liu, and X. Sun, “A secure cloud-assisted urban data sharing framework for ubiquitous-cities,” Pervasive and Mobile Computing, vol. 41, pp. 219–230, 2017. View at Publisher · View at Google Scholar