Abstract
The security analysis of physical encryption protocol based on coherent pulse position modulation (CPPM) originated by Yuen is one of the most interesting topics in the study of cryptosystem with a security level beyond the Shannon limit. Although the implementation of CPPM scheme has certain difficulty, several methods have been proposed recently. This paper deals with the CPPM encryption in terms of symplectic transformation, which includes a phase mask encryption as a special example, and formulates a unified security analysis for such encryption schemes. Specifically, we give a lower bound of Eve’s symbol error probability using reliability function theory to ensure that our proposed system exceeds the Shannon limit. Then we assume the secret key is given to Eve after her heterodyne measurement. Since this assumption means that Eve has a great advantage in the sense of the conventional cryptography, the lower bound of her error indeed ensures the security level beyond the Shannon limit. In addition, we show some numerical examples of the security performance.




Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
Hirota, O., Sohma, M., Fuse, M., Kato, K.: Quantum stream cipher by Yuen 2000 protocol: design and experiment by intensity modulation scheme. Phys. Rev. A 72, 022335 (2005)
Hirota, O.: Practical security analysis of quantum stream cipher by Yuen 2000 protocol. Phys. Rev. A 76, 032307 (2007)
Sohma, M., Hirota, O.: Coherent pulse position modulation quantum cipher supported by secret key. Tamagawa Univ. Quantum ICT Bull. 1(1), 15–19 (2011)
Hirota, O.: Everlasting Security by cipher exceeding the Shannon limit of cryptography. In: The 29th Symposium on Cryptography and Information, Security (2012)
Borbosa, G.A., Corndorf, E., Kanter, G.S., Kumar, P., Yuen, H.P.: Secure communication using mesoscopic coherent states. Phys. Rev. Lett. 90, 227901 (2003)
Yuen, H.P.: Key generation: foundation and a new quantum approach. IEEE J. Sel. Top. Quantum Electron. 15(6), 1630–1645 (2009)
Yuen, H.P., Nair, R., Corndorf, E., Kanter, G.S., Kumar, P.: Quantum noise randomized ciphers. Quantum Inf. Comput. 8, 561 (2006)
Yuen, H.P., Shapiro, J.H.: Optical communication with two-photon coherent states-Part III: quantum measurements realizable with photoemissive detectors. IEEE Trans. Inf. Theory IT–26(1), 78–92 (1980)
Yuen, H.P.: Quantum cryptography QKD and KCQ. Presented at Tamagawa University, Japan, 15 June 2011
Yuen, H.P., Kennedy, R.S., Lax, M.: Optimum testing of multiple hypotheses in quantum detection theory. IEEE Trans. Inf. Theory IT–21, 125–134 (1975)
Yuen, H.P., Shapiro, J.H.: Optical communication with two-photon coherent states-PartI: quantum-state propagation and quantum-noise reduction. IEEE Trans. Inf. Theory IT–24(6), 657–668 (1978)
Holevo, A.S.: Probabilistic and Statistical Aspect of Quantum Theory. Springer, North-Holland (1982)
Holevo, A.S.: Coding Theorems for Quantum Channels. Tamagawa University Research Review, vol. 4 (1998)
Feller, W.: An Introduction to Probability Theory and Its Applications, Vol. 1 (V. II1). Wiley, London (1968)
Gallager, R.G.: Information Theory and Reliable Communication. Wiley, London (1968)
Helstrom, C.W.: Quantum Detection and Estimation Theory. Academic Press, New York (1976)
Helstrom, C.W.: Capacity of the pure-state quantum channel. Proc. IEEE 62, 139–140 (1974)
Segal, E.E.: Mathematical Problems of Relativistic Physics. AMS, Providence (1963)
Acknowledgments
The authors would like to thank F. Futami for his valuable discussions. This work was supported by JSPS KAKENHI Grant Number 24656245.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sohma, M., Hirota, O. Masking property of quantum random cipher with phase mask encryption. Quantum Inf Process 13, 2221–2239 (2014). https://doi.org/10.1007/s11128-014-0748-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11128-014-0748-4