Chinese Journal of Quantum Electronics, Volume. 41, Issue 6, 956(2024)
Image encryption based on one⁃dimensional quantum walks on a circle
[1] Palattella M R, Dohler M, Grieco A et al. Internet of Things in the 5G era: Enablers, architecture, and business models[J]. IEEE Journal on Selected Areas in Communications, 34, 510-527(2016).
[2] Abd El-Latif A A, Abd-El-Atty B, Venegas-Andraca S E et al. Efficient quantum-based security protocols for information sharing and data protection in 5G networks[J]. Future Generation Computer Systems, 100, 893-906(2019).
[3] Huang J G, Zhou X C. Image encryption algorithm based on cross control and multi-direction different diffusion[J]. Chinese Journal of Quantum Electronics, 35, 23-30(2018).
[4] Hong Y, Xu N, Tu X H. Image real-value encryption based on Logistic chaos[J]. Chinese Journal of Quantum Electronics, 35, 149-155(2018).
[5] Amin M, Faragallah O S, Abd El-Latif A A. Chaos-based hash function (CBHF) for cryptographic applications[J]. Chaos, 42, 767-772(2009).
[6] Tsurumaru T, Hayashi M. Dual universality of Hash functions and its applications to quantum cryptography[J]. IEEE Transactions on Information Theory, 59, 4700-4717(2013).
[7] Nikolopoulos G M. Applications of single-qubit rotations in quantum public-key cryptography[J]. Physical Review A, 77, 032348(2008).
[8] Li D, Zhang J, Guo F Z et al. Discrete-time interacting quantum walks and quantum Hash schemes[J]. Quantum Information Processing, 12, 1501-1513(2013).
[9] Kiktenko E O, Pozhar N O, Anufriev M N et al. Quantum-secured blockchain[J]. Quantum Science and Technology, 3, 035004(2018).
[10] Bennett C H, Brassard G. An update on quantum cryptography[C], 1984(83).
[11] Vlachou C, Rodrigues J, Mateus P et al. Quantum walk public-key cryptographic system[J]. International Journal of Quantum Information, 13, 1550050(2015).
[12] Luo H, Hu X L, Xue P. Two-dimensional quantum random walk and its physical realization[J]. Acta Sinica Quantum Optica, 17, 198-203, 218(2011).
[13] Venegas-Andraca S E. Quantum walks: A comprehensive review[J]. Quantum Information Processing, 11, 1015-1106(2012).
[14] Yang Y G, Pan Q X, Sun S J et al. Novel image encryption based on quantum walks[J]. Scientific Reports, 5, 7784(2015).
[15] Li D, Yang Y G, Bi J L et al. Controlled alternate quantum walks based quantum Hash function[J]. Scientific Reports, 8, 225(2018).
[16] Yang Y G, Bi J L, Chen X B et al. Simple hash function using discrete-time quantum walks[J]. Quantum Information Processing, 17, 189(2018).
[17] Abd El-Latif A A, Abd-El-Atty B, Venegas-Andraca S E. A novel image steganography technique based on quantum substitution boxes[J]. Optics Laser Technology, 116, 92-102(2019).
[18] Abd El-Latif A A, Abd-El-Atty B, Mazurczyk W et al. Secure data encryption based on quantum walks for 5G Internet of Things scenario[J]. IEEE Transactions on Network and Service Management, 17, 118-131(2020).
[19] Abd El-Latif A A, Abd-El-Atty B, Amin M et al. Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications[J]. Scientific Reports, 10, 1930(2020).
[20] Abd El-Latif A A, Abd-El-Atty B, Abou-Nassar E M et al. Controlled alternate quantum walks based privacy preserving healthcare images in internet of things[J]. Optics & Laser Technology, 124, 105942(2020).
[21] Abd-El-Atty B, Abd El-Latif A A, Venegas-Andraca S E. An encryption protocol for NEQR images based on one-particle quantum walks on a circle[J]. Quantum Information Processing, 18, 272(2019).
[22] Wang Y N, Song Z Y, Ma Y L et al. Color image encryption algorithm based on DNA code and alternating quantum random walk[J]. Acta Physica Sinica, 70, 115-124(2021).
[23] Abd El-Latif A A, Abd-El-Atty B, Venegas-Andraca S E et al. Providing end-to-end security using quantum walks in IoT networks[J]. IEEE Access, 8, 92687-92696(2020).
[24] Abd El-Latif A A, Abd-El-Atty B, Venegas-Andraca S E. Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption[J]. Physica A Statistical Mechanics and Its Applications, 547, 123869(2020).
Get Citation
Copy Citation Text
Wenjing LIU, Jun LIU, Yuan CAO, Pengyue WANG, Rong ZHANG. Image encryption based on one⁃dimensional quantum walks on a circle[J]. Chinese Journal of Quantum Electronics, 2024, 41(6): 956
Category:
Received: Dec. 23, 2022
Accepted: --
Published Online: Jan. 8, 2025
The Author Email: