메뉴 건너뛰기




Volumn 12, Issue 3-4, 2012, Pages 181-202

Quantum mceliece public-key cryptosystem

Author keywords

McEliece encryption; Public key cryptosystem; Quantum information

Indexed keywords


EID: 84858035503     PISSN: 15337146     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (17)

References (45)
  • 1
    • 4243059985 scopus 로고
    • Tele-porting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels
    • C. H. Bennett, G. Brassard, C. Cŕepeau, R. Jozsa, A. Peres, and W. K. Wootters (1993), Tele-porting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels, Phys. Rev. Lett., vol. 70, no. 13, pp. 1895-1899.
    • (1993) Phys. Rev. Lett , vol.70 , Issue.13 , pp. 1895-1899
    • Bennett, C.H.1    Brassard, G.2    Cŕepeau, C.3    Jozsa, R.4    Peres, A.5    Wootters, W.K.6
  • 3
    • 17444433364 scopus 로고    scopus 로고
    • Optimal encryption of quantum bits
    • P. O. Boykin and V. Roychowdhury (2003), Optimal encryption of quantum bits, Phys. Rev. A, vol. 67, 042317.
    • (2003) Phys. Rev. A , vol.67 , pp. 042317
    • Boykin, P.O.1    Roychowdhury, V.2
  • 4
    • 33646411010 scopus 로고
    • Quantum cryptography: Public key distribution and coin tossing
    • C. H. Bennett and G. Brassard (1984), Quantum cryptography: public key distribution and coin tossing, in Proc. IEEE International Conference on Computers, Systems, and Signal Processing, pp. 175-179.
    • (1984) , pp. 175-179
    • Bennett, C.H.1    Brassard, G.2
  • 5
    • 0347090658 scopus 로고    scopus 로고
    • Simple proof of security of the BB84 quantum key distribution protocol
    • P. W. Shor and J. Preskill (2000), Simple proof of security of the BB84 quantum key distribution protocol, Phys. Rev. Lett., vol. 85, no. 2, pp. 441-444.
    • (2000) Phys. Rev. Lett , vol.85 , Issue.2 , pp. 441-444
    • Shor, P.W.1    Preskill, J.2
  • 7
    • 24944548357 scopus 로고    scopus 로고
    • Computational indistinguisha-bility between quantum states and its cryptographic application, in Advances
    • (LNCS 3494)
    • A. Kawachi, T. Koshiba, H. Nishimura, and T. Yamakami (2005), Computational indistinguisha-bility between quantum states and its cryptographic application, in Advances in Cryptology-EUROCRYPT 2005 (LNCS 3494), pp. 268-284.
    • (2005) Cryptology-EUROCRYPT 2005 , pp. 268-284
    • Kawachi, A.1    Koshiba, T.2    Nishimura, H.3    Yamakami, T.4
  • 8
    • 41549130702 scopus 로고    scopus 로고
    • Applications of single-qubit rotations in quantum public-key cryptog-raphy
    • G. M. Nikolopoulos (2008), Applications of single-qubit rotations in quantum public-key cryptog-raphy, Phys. Rev. A, vol. 77, 032348.
    • (2008) Phys. Rev. A , vol.77 , pp. 032348
    • Nikolopoulos, G.M.1
  • 11
    • 4243807288 scopus 로고    scopus 로고
    • Quantum mechanics helps in searching for a needle in a haystack
    • L. K. Grover (1997), Quantum mechanics helps in searching for a needle in a haystack, Phys. Rev. Lett., vol. 79, no. 2, pp. 325-328.
    • (1997) Phys. Rev. Lett , vol.79 , Issue.2 , pp. 325-328
    • Grover, L.K.1
  • 13
    • 0022582790 scopus 로고
    • Knapsack-type cryptosystems and algebraic coding theory
    • H. Niederreiter (1986), Knapsack-type cryptosystems and algebraic coding theory, Problems of Control and Information Theory, vol. 15, no. 2, pp. 159-166.
    • (1986) Problems of Control and Information Theory , vol.15 , Issue.2 , pp. 159-166
    • Niederreiter, H.1
  • 14
    • 84858691417 scopus 로고    scopus 로고
    • A summary of McEliece-type cryptosystems and their security
    • D. Engelbert, R. Overbeck, and A. Schmidt (2007), A summary of McEliece-type cryptosystems and their security, J. Math. Crypt., vol. 1, pp. 151-199.
    • (2007) J. Math. Crypt , vol.1 , pp. 151-199
    • Engelbert, D.1    Overbeck, R.2    Schmidt, A.3
  • 15
    • 77954400700 scopus 로고    scopus 로고
    • Code-based cryptography
    • in [41]
    • R. Overbeck and N. Sendrier (2009), Code-based cryptography, in [41].
    • (2009)
    • Overbeck, R.1    Sendrier, N.2
  • 17
    • 0028294826 scopus 로고
    • On the equivalence of McEliece's and Niederreiter's public-key cryptosytems
    • Y. X. Li, R. H. Deng, and X. M. Wang (1994), On the equivalence of McEliece's and Niederreiter's public-key cryptosytems, IEEE Transactions on Information Theory, vol. 40, no. 1, pp. 271-273.
    • (1994) IEEE Transactions on Information Theory , vol.40 , Issue.1 , pp. 271-273
    • Li, Y.X.1    Deng, R.H.2    Wang, X.M.3
  • 18
    • 0003932204 scopus 로고    scopus 로고
    • Stabilizer codes and quantum error correction
    • Ph.D. thesis, Caltech. Available at
    • D. Gottesman (1997), Stabilizer Codes and Quantum Error Correction, Ph.D. thesis, Caltech. Available at http://arxiv.org/abs/quant-ph/9705052.
    • (1997)
    • Gottesman, D.1
  • 21
    • 0010154970 scopus 로고    scopus 로고
    • Efficient computations of encodings for quantum error correction
    • R. Cleve and D. Gottesman (1997), Efficient computations of encodings for quantum error correction, Phys. Rev. A, vol. 56, 76-82.
    • (1997) Phys. Rev. A , vol.56 , pp. 76-82
    • Cleve, R.1    Gottesman, D.2
  • 22
    • 79961063895 scopus 로고    scopus 로고
    • NP-hardness of decoding quantum error correction codes
    • Min-Hsiu Hsieh and Francois Le Gall (2011), NP-hardness of decoding quantum error correction codes, Phys. Rev. A, vol. 83, 052331.
    • (2011) Phys. Rev. A , vol.83 , pp. 052331
    • Hsieh, M.-H.1    le Gall, F.2
  • 23
    • 0001398327 scopus 로고    scopus 로고
    • Good quantum error-correcting codes exist
    • A. R. Calderbank and P. W. Shor (1996), Good quantum error-correcting codes exist, Phys. Rev. A, vol. 54, no. 2, pp. 1098-1105.
    • (1996) Phys. Rev. A , vol.54 , Issue.2 , pp. 1098-1105
    • Calderbank, A.R.1    Shor, P.W.2
  • 24
    • 0007244732 scopus 로고    scopus 로고
    • Multiple particle interference and quantum error correction
    • A. M. Steane (1996), Multiple particle interference and quantum error correction, Proc. Roy. Soc. Lond. A, vol. 452, pp. 2551-2577.
    • (1996) Proc. Roy. Soc. Lond. A , vol.452 , pp. 2551-2577
    • Steane, A.M.1
  • 27
    • 84937740421 scopus 로고
    • Shift-register synthesis and BCH decoding
    • J. L. Massey (1969), Shift-register synthesis and BCH decoding, IEEE Transactions on Information Theory, vol. 15, no. 1, pp. 122-127.
    • (1969) IEEE Transactions on Information Theory , vol.15 , Issue.1 , pp. 122-127
    • Massey, J.L.1
  • 28
    • 84929257781 scopus 로고
    • On insecurity of cryptosystems based on generalized Reed-Solomon codes
    • V. M. Sidelnikov and S. O. Shestakov (1992), On insecurity of cryptosystems based on generalized Reed-Solomon codes, Discrete Mathematics and Applications, vol. 2, no. 4, pp. 439-444.
    • (1992) Discrete Mathematics and Applications , vol.2 , Issue.4 , pp. 439-444
    • Sidelnikov, V.M.1    Shestakov, S.O.2
  • 29
    • 84958666890 scopus 로고    scopus 로고
    • Failure of the McEliece public-key cryptosystem under message-resend and related-message attack
    • T. Berson (1997), Failure of the McEliece public-key cryptosystem under message-resend and related-message attack, in Advances in Cryptology-CRYPTO '97 (LNCS 1294), pp. 213-220.
    • (1997) Advances in Cryptology-CRYPTO '97 (LNCS 1294) , pp. 213-220
    • Berson, T.1
  • 31
    • 80052017185 scopus 로고
    • Security-related comments regarding McEliece's public-key cryptosystem
    • C. M. Adams and H. Meijer (1988), Security-related comments regarding McEliece's public-key cryptosystem, in Advances in Cryptology-CRYPTO '87 (LNCS 293), pp. 224-228.
    • (1988) Advances in Cryptology-CRYPTO '87 (LNCS 293) , pp. 224-228
    • Adams, C.M.1    Meijer, H.2
  • 33
    • 0024078914 scopus 로고
    • A probabilistic algorithm for computing minimum weights of large error-correcting codes
    • J. S. Leon (1988), A probabilistic algorithm for computing minimum weights of large error-correcting codes, IEEE Transactions on Information Theory, vol. 34, pp. 1354-1359.
    • (1988) IEEE Transactions on Information Theory , vol.34 , pp. 1354-1359
    • Leon, J.S.1
  • 34
  • 35
    • 84948963042 scopus 로고
    • On the security of some cryptosystems based on error-correcting codes
    • F. Chabaud (1995), on the security of some cryptosystems based on error-correcting codes, in Advances in Cryptology-EUROCRYPT '94 (LNCS 950), pp. 131-139.
    • (1995) Advances in Cryptology-EUROCRYPT '94 (LNCS 950) , pp. 131-139
    • Chabaud, F.1
  • 36
    • 0031675932 scopus 로고    scopus 로고
    • A new algorithm for finding minimum-weight words in a linear code: Application to primitive narrow-sense BCH-codes of length 511
    • A. Canteaut and F. Chabaut (1998), A new algorithm for finding minimum-weight words in a linear code: Application to primitive narrow-sense BCH-codes of length 511, IEEE Transactions on Information Theory, vol. 44, no. 1, pp. 367-378.
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.1 , pp. 367-378
    • Canteaut, A.1    Chabaut, F.2
  • 40
    • 0142051871 scopus 로고    scopus 로고
    • Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
    • Peter W. Shor (1997), Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM Journal on Computing, vol. 26, pp. 1484-1509.
    • (1997) SIAM Journal on Computing , vol.26 , pp. 1484-1509
    • Shor, P.W.1
  • 44
    • 19844363007 scopus 로고    scopus 로고
    • A public-key cryptosystem for quantum message transmission
    • and see also e-print arXiv:quant-ph/0310076
    • L. Yang (2005), A public-key cryptosystem for quantum message transmission, Proceedings of the SPIE 5631(1), pp. 233-236 and see also e-print arXiv:quant-ph/0310076.
    • (2005) Proceedings of the SPIE , vol.5631 , Issue.1 , pp. 233-236
    • Yang, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.