Hash Function Based on Controlled Alternate Quantum Walks With Memory (September 2021)

We propose a Quantum inspired Hash Function using controlled alternate quantum walks with Memory on cycles (QHFM), where the j th message bit decides whether to run quantum walk with one-step memory or to run quantum walk with two-step memory at the j th time step, and the hash value is calculated from the resulting probability distribution of the […]

Long-Term Secure Distributed Storage Using Quantum Key Distribution Network With Third-Party Verification

The quantum key distribution (QKD) network with Vernam’s one-time pad encryption and secret sharing are powerful security tools to realize an information theoretically secure (ITS) distributed storage system. In the work of Fujiwara et al., a single-password-authenticated secret sharing (SPSS) scheme based on the QKD network and Shamirs secret sharing was experimentally demonstrated; it confirmed ITS […]

Decentralization Using Quantum Blockchain: A Theoretical Analysis

Blockchain technology has been prominent recently due to its applications in cryptocurrency. Numerous decentralized blockchain applications have been possible due to blockchains’ nature of distributed, secured, and peer-to-peer storage. One of its technical pillars is using public-key cryptography and hash functions, which promise a secure, pseudoanonymous, and distributed storage with nonrepudiation. This security is believed […]

Long-Term Secure Distributed Storage Using Quantum Key Distribution Network With Third-Party Verification

The quantum key distribution (QKD) network with Vernam’s one-time pad encryption and secret sharing are powerful security tools to realize an information theoretically secure (ITS) distributed storage system. In the work of Fujiwara et al., a single-password-authenticated secret sharing (SPSS) scheme based on the QKD network and Shamirs secret sharing was experimentally demonstrated; it confirmed ITS […]