Chinese Journal of Quantum Electronics, Volume. 41, Issue 6, 956(2024)

Image encryption based on one⁃dimensional quantum walks on a circle

LIU Wenjing... LIU Jun, CAO Yuan, WANG Pengyue and ZHANG Rong |Show fewer author(s)
Author Affiliations
  • College of Electronic and Optical Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
  • show less
    References(24)

    [1] Palattella M R, Dohler M, Grieco A et al. Internet of Things in the 5G era: Enablers, architecture, and business models[J]. IEEE Journal on Selected Areas in Communications, 34, 510-527(2016).

    [2] Abd El-Latif A A, Abd-El-Atty B, Venegas-Andraca S E et al. Efficient quantum-based security protocols for information sharing and data protection in 5G networks[J]. Future Generation Computer Systems, 100, 893-906(2019).

    [3] Huang J G, Zhou X C. Image encryption algorithm based on cross control and multi-direction different diffusion[J]. Chinese Journal of Quantum Electronics, 35, 23-30(2018).

    [4] Hong Y, Xu N, Tu X H. Image real-value encryption based on Logistic chaos[J]. Chinese Journal of Quantum Electronics, 35, 149-155(2018).

    [5] Amin M, Faragallah O S, Abd El-Latif A A. Chaos-based hash function (CBHF) for cryptographic applications[J]. Chaos, 42, 767-772(2009).

    [6] Tsurumaru T, Hayashi M. Dual universality of Hash functions and its applications to quantum cryptography[J]. IEEE Transactions on Information Theory, 59, 4700-4717(2013).

    [7] Nikolopoulos G M. Applications of single-qubit rotations in quantum public-key cryptography[J]. Physical Review A, 77, 032348(2008).

    [8] Li D, Zhang J, Guo F Z et al. Discrete-time interacting quantum walks and quantum Hash schemes[J]. Quantum Information Processing, 12, 1501-1513(2013).

    [9] Kiktenko E O, Pozhar N O, Anufriev M N et al. Quantum-secured blockchain[J]. Quantum Science and Technology, 3, 035004(2018).

    [10] Bennett C H, Brassard G. An update on quantum cryptography[C], 1984(83).

    [11] Vlachou C, Rodrigues J, Mateus P et al. Quantum walk public-key cryptographic system[J]. International Journal of Quantum Information, 13, 1550050(2015).

    [12] Luo H, Hu X L, Xue P. Two-dimensional quantum random walk and its physical realization[J]. Acta Sinica Quantum Optica, 17, 198-203, 218(2011).

    [13] Venegas-Andraca S E. Quantum walks: A comprehensive review[J]. Quantum Information Processing, 11, 1015-1106(2012).

    [14] Yang Y G, Pan Q X, Sun S J et al. Novel image encryption based on quantum walks[J]. Scientific Reports, 5, 7784(2015).

    [15] Li D, Yang Y G, Bi J L et al. Controlled alternate quantum walks based quantum Hash function[J]. Scientific Reports, 8, 225(2018).

    [16] Yang Y G, Bi J L, Chen X B et al. Simple hash function using discrete-time quantum walks[J]. Quantum Information Processing, 17, 189(2018).

    [17] Abd El-Latif A A, Abd-El-Atty B, Venegas-Andraca S E. A novel image steganography technique based on quantum substitution boxes[J]. Optics Laser Technology, 116, 92-102(2019).

    [18] Abd El-Latif A A, Abd-El-Atty B, Mazurczyk W et al. Secure data encryption based on quantum walks for 5G Internet of Things scenario[J]. IEEE Transactions on Network and Service Management, 17, 118-131(2020).

    [19] Abd El-Latif A A, Abd-El-Atty B, Amin M et al. Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications[J]. Scientific Reports, 10, 1930(2020).

    [20] Abd El-Latif A A, Abd-El-Atty B, Abou-Nassar E M et al. Controlled alternate quantum walks based privacy preserving healthcare images in internet of things[J]. Optics & Laser Technology, 124, 105942(2020).

    [21] Abd-El-Atty B, Abd El-Latif A A, Venegas-Andraca S E. An encryption protocol for NEQR images based on one-particle quantum walks on a circle[J]. Quantum Information Processing, 18, 272(2019).

    [22] Wang Y N, Song Z Y, Ma Y L et al. Color image encryption algorithm based on DNA code and alternating quantum random walk[J]. Acta Physica Sinica, 70, 115-124(2021).

    [23] Abd El-Latif A A, Abd-El-Atty B, Venegas-Andraca S E et al. Providing end-to-end security using quantum walks in IoT networks[J]. IEEE Access, 8, 92687-92696(2020).

    [24] Abd El-Latif A A, Abd-El-Atty B, Venegas-Andraca S E. Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption[J]. Physica A Statistical Mechanics and Its Applications, 547, 123869(2020).

    Tools

    Get Citation

    Copy Citation Text

    Wenjing LIU, Jun LIU, Yuan CAO, Pengyue WANG, Rong ZHANG. Image encryption based on one⁃dimensional quantum walks on a circle[J]. Chinese Journal of Quantum Electronics, 2024, 41(6): 956

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category:

    Received: Dec. 23, 2022

    Accepted: --

    Published Online: Jan. 8, 2025

    The Author Email:

    DOI:10.3969/j.issn.1007-5461.2024.06.012

    Topics