Skip to main content

Advertisement

Log in

Masking property of quantum random cipher with phase mask encryption

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

The security analysis of physical encryption protocol based on coherent pulse position modulation (CPPM) originated by Yuen is one of the most interesting topics in the study of cryptosystem with a security level beyond the Shannon limit. Although the implementation of CPPM scheme has certain difficulty, several methods have been proposed recently. This paper deals with the CPPM encryption in terms of symplectic transformation, which includes a phase mask encryption as a special example, and formulates a unified security analysis for such encryption schemes. Specifically, we give a lower bound of Eve’s symbol error probability using reliability function theory to ensure that our proposed system exceeds the Shannon limit. Then we assume the secret key is given to Eve after her heterodyne measurement. Since this assumption means that Eve has a great advantage in the sense of the conventional cryptography, the lower bound of her error indeed ensures the security level beyond the Shannon limit. In addition, we show some numerical examples of the security performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Explore related subjects

Discover the latest articles and news from researchers in related subjects, suggested using machine learning.

References

  1. Hirota, O., Sohma, M., Fuse, M., Kato, K.: Quantum stream cipher by Yuen 2000 protocol: design and experiment by intensity modulation scheme. Phys. Rev. A 72, 022335 (2005)

    Article  ADS  Google Scholar 

  2. Hirota, O.: Practical security analysis of quantum stream cipher by Yuen 2000 protocol. Phys. Rev. A 76, 032307 (2007)

    Article  MathSciNet  ADS  Google Scholar 

  3. Sohma, M., Hirota, O.: Coherent pulse position modulation quantum cipher supported by secret key. Tamagawa Univ. Quantum ICT Bull. 1(1), 15–19 (2011)

    Google Scholar 

  4. Hirota, O.: Everlasting Security by cipher exceeding the Shannon limit of cryptography. In: The 29th Symposium on Cryptography and Information, Security (2012)

  5. Borbosa, G.A., Corndorf, E., Kanter, G.S., Kumar, P., Yuen, H.P.: Secure communication using mesoscopic coherent states. Phys. Rev. Lett. 90, 227901 (2003)

    Article  ADS  Google Scholar 

  6. Yuen, H.P.: Key generation: foundation and a new quantum approach. IEEE J. Sel. Top. Quantum Electron. 15(6), 1630–1645 (2009)

    Article  Google Scholar 

  7. Yuen, H.P., Nair, R., Corndorf, E., Kanter, G.S., Kumar, P.: Quantum noise randomized ciphers. Quantum Inf. Comput. 8, 561 (2006)

    MathSciNet  Google Scholar 

  8. Yuen, H.P., Shapiro, J.H.: Optical communication with two-photon coherent states-Part III: quantum measurements realizable with photoemissive detectors. IEEE Trans. Inf. Theory IT–26(1), 78–92 (1980)

    Article  MathSciNet  ADS  Google Scholar 

  9. Yuen, H.P.: Quantum cryptography QKD and KCQ. Presented at Tamagawa University, Japan, 15 June 2011

  10. Yuen, H.P., Kennedy, R.S., Lax, M.: Optimum testing of multiple hypotheses in quantum detection theory. IEEE Trans. Inf. Theory IT–21, 125–134 (1975)

    Article  MathSciNet  Google Scholar 

  11. Yuen, H.P., Shapiro, J.H.: Optical communication with two-photon coherent states-PartI: quantum-state propagation and quantum-noise reduction. IEEE Trans. Inf. Theory IT–24(6), 657–668 (1978)

    Article  MathSciNet  ADS  Google Scholar 

  12. Holevo, A.S.: Probabilistic and Statistical Aspect of Quantum Theory. Springer, North-Holland (1982)

    Google Scholar 

  13. Holevo, A.S.: Coding Theorems for Quantum Channels. Tamagawa University Research Review, vol. 4 (1998)

  14. Feller, W.: An Introduction to Probability Theory and Its Applications, Vol. 1 (V. II1). Wiley, London (1968)

    Google Scholar 

  15. Gallager, R.G.: Information Theory and Reliable Communication. Wiley, London (1968)

    MATH  Google Scholar 

  16. Helstrom, C.W.: Quantum Detection and Estimation Theory. Academic Press, New York (1976)

    MATH  Google Scholar 

  17. Helstrom, C.W.: Capacity of the pure-state quantum channel. Proc. IEEE 62, 139–140 (1974)

    Article  Google Scholar 

  18. Segal, E.E.: Mathematical Problems of Relativistic Physics. AMS, Providence (1963)

    MATH  Google Scholar 

Download references

Acknowledgments

The authors would like to thank F. Futami for his valuable discussions. This work was supported by JSPS KAKENHI Grant Number 24656245.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Masaki Sohma.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Sohma, M., Hirota, O. Masking property of quantum random cipher with phase mask encryption. Quantum Inf Process 13, 2221–2239 (2014). https://doi.org/10.1007/s11128-014-0748-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11128-014-0748-4

Keywords