Abstract
Here, we propose a quantum asymmetric key cryptography scheme using Grover’s quantum search algorithm. In the proposed scheme, Alice generates a pair of public and private keys, keeps the private keys safe, and only discloses public keys to the outside. Bob uses Alice's public key to send a secret message to Alice and Alice uses her private key to decrypt the secret message. Furthermore, we discuss the safety of quantum asymmetric key encryption techniques based on quantum mechanical properties.
Similar content being viewed by others
Introduction
One of the most important advancements in modern cryptographic systems is the development of asymmetric-key cryptography algorithms. These systems allow us to solve the problems of existing symmetric key cryptography algorithms, such as sharing of secure keys between users, management of keys that increase significantly with the number of participants, and problem of not being able to perform authentication. Asymmetric key cryptography systems have become extremely useful for implementing various cryptographic services such as authentication and signatures1,2,3.
In the field of quantum cryptography, which has recently been studied worldwide, various protocols such as quantum direct communication and quantum authentication/signature as well as quantum key distribution, which has entered the commercialization stage through a pilot network, are being developed4,5,6,7,8,9,10,11,12,13. However, most quantum authentication/signature protocols are being developed based on symmetric key encryption techniques owing to the absence of an efficient quantum asymmetric key crypto scheme. Hence, various tools were utilized to overcome the limitations of symmetry key techniques, which resulted in exposing the disadvantages of protocols being assisted by classical elements or via complex implementation14,15,16,17,18,19,20,21.
Furthermore, quantum asymmetric key crypto schemes are studied on a smaller scale when compared to other protocols; however, they have a number of similar shortcomings, such as being aided by classical elements, application of symmetric key techniques, or having a structure that makes it difficult to apply the actual public key concept using a quantum entanglement state22,23,24,25,26,27,28,29,30,31,32,33,34,35,36.
In this paper, an efficient quantum asymmetric key cryptography scheme based on Grover’s algorithm has been proposed37,38. The asymmetric key cryptography systems used in modern cryptographic systems are analyzed, and the basic structure of Grover’s algorithm is discussed in Section “Asymmetric cipher and Grover algorithm”. Subsequently, a quantum asymmetric key cryptography system using Grover’s algorithm is proposed in section "Quantum asymmetric key cipher scheme using Grover algorithm". Finally, the security of the system is analyzed in Section "Security analysis".
Asymmetric cipher and grover algorithm
Asymmetric cipher
The specific method of the asymmetric key cryptography system was first introduced in the study, “New directions in cryptography” by Whitfield Diffie and Martin Hellman at Stanford University in 1976. Subsequently, in 1978, Ronald L. Rivest, Adi Shamir, and Leonard Adleman (RSA) at MIT implemented a public key cryptographic system, which is known as the RSA public key cryptography algorithm that is used extensively at present39,40.
An asymmetric key cryptographic system is based on a trapdoor one-way function. Here, a one-way function refers to a problem in which the calculation in one direction is simple, whereas the calculation of an inverse function (e.g., a hash function) is impossible. A function with a trapdoor, which facilitates the calculation of an inverse function based on certain hints, is known as a trapdoor one-way function. A cryptographic system that allows only people who possess specific information to perform decryption easily based on this function is known as an asymmetric key cryptography system1,2,3.
As depicted in Fig. 1, Alice generates a public key P(A) and private key S(A) for herself. The public key is disclosed so that anyone can use it. Bob uses Alice’s public key to encrypt a message to be sent to Alice. The encrypted message can be decrypted using the private key that Alice possesses. Bob can securely send a message that can be viewed only by Alice, but he is not required to have a common key with Alice in advance. This is known as asymmetric key cryptographic system.
Grover iteration
Grover’s algorithm, also known as the quantum search algorithm, determines whether the information to be obtained exists in a database. In previous algorithms pertaining to information search schemes, the time complexity for obtaining the desired data in a database composed of N unsorted data is \(O\left(N\right)\). However, the quantum search algorithm proposed by Grover in 1997 uses the quantum entanglement phenomenon to obtain the desired data faster when compared to previous methods, and the time complexity is expressed as \(O\left(\sqrt{N}\right)\)7,37,38.
The operating principle of Grover’s algorithm is as follows:
A database consisting of unsorted data, which contain the desired data is expressed as follows:
The data that you want to find in a database composed of unsorted data is as follows:
The operators required to find the desired data in the database are as follows:
Extraction of the desired data from Eq. (2) by applying Eq. (3) into the database expressed in Eq. (1) is as follows:
Equation (4) shows that the desired data \(\left|K\right.\rangle\) can be obtained using Eqs. (1, 2, 3) in the database set \(\left|M\right.\rangle\). Here, database \(\left|M\right.\rangle\) exists in an entangled state. The attacker will be unaware of the exact state of the quantum bit in entangled state because of the singularity of measurement and collapse of quantum state.
In this study, we used the properties of quantum mechanics and the abovementioned advantage to propose a quantum asymmetric cryptography system using the major operation associated with Eq. (4), which is used in Grover’s algorithm.
Quantum asymmetric key cipher scheme using Grover algorithm
As depicted in Fig. 2, quantum asymmetric key cryptography scheme proposed herein consists of the following phases: a phase in which Alice creates a public key and private key, similar to the modern cryptographic system; a phase where Bob uses Alice’s public key to send a ciphertext; a phase in which the ciphertext is decrypted.
Preparation phase
P1.
Alice creates a state \(\left|M\right.\rangle\) that is only known to her.
(Here, \(\left|a\right.\rangle\) and \(\left|b\right.\rangle\) are selected arbitrarily from \(\left|+\right.\rangle\) and \(\left|-\right.\rangle\), respectively.)
P2.
Alice determines an arbitrary two-bit key \({K}_{AP}\), that is used as the material of the public key. Subsequently, the following operator is created:
P3.
Alice uses \(\left|M\right.\rangle\) and \({U}_{P}\) to create a public key \({U}_{P(A)}\) state and sends it to the public key management center. Here, information exposure can be prevented by randomly selecting whether the operator \({U}_{P}\) is applied.
Encryption phase
E1.
Bob creates the following operator using message \(\left|m\right.\rangle\) to be sent to Alice.
E2.
Bob creates the following quantum state using the operator of the message that he wishes to send using Alice’s public key, \({U}_{P(A)}\).
Equation (9) shows the encrypted state of message \(\left|m\right.\rangle\) that Bob wishes to send by using Alice’s public key. Bob sends an encrypted message qubit to Alice.
Decryption phase
D1.
In the message that Alice receives from Bob, if \(\left|{U}_{P}\right.\rangle\) exists in the public key that Alice created, then operator \(\left|{U}_{P}\right.\rangle\) is re-applied.
D2.
Alice uses \(\left|M\right.\rangle\) to create her own private key \({U}_{S(A)}\).
D3.
Alice applies her private key operator \({U}_{S(A)}\) to the quantum state created using Eq. (10) and obtains the message \(\left|m\right.\rangle\) that Bob wishes to send to her.
Security analysis
Confidentiality
The component that requires confidentiality in the proposed scheme is the message \(\left|m\right.\rangle\) that Bob wishes to send to Alice. This message must not be revealed to anyone except Bob, who sends the message, and Alice, who receives it. There is a possibility for Eve to attack once, while message \(\left|m\right.\rangle\) is sent from Bob to Alice.
First, the qubit that Eve uses is in an entangled quantum state based on Eq. (9). If Eve measures the qubit, the quantum state collapses and the state prior to the collapse is not known. Furthermore, it cannot be measured accurately without knowing \(\left|{U}_{P}\right.\rangle\) and \(\left|{U}_{S(A)}\right.\rangle\), that is, information required for decryption. In other words, Eve’s measurements cannot accurately determine the entangled quantum state.
Second, methods for attacking quantum cryptography include stealing information by creating an entangled state using a CNOT operator. However, in the entangled quantum state, as expressed by Eq. (9), the information that can be obtained based on the attack method using the CNOT operator is the quantum state, which is a component of the public key expressed in Eq. (7). If this is explained on the basis of the two-bit quantum state expressed in Eq. (5), only the state of \(\left|00\right.\rangle ,\left|01\right.\rangle ,\left|10\right.\rangle , \mathrm{and }\left|11\right.\rangle\) will be known, and the preceding phases will not be known. However, only when the phases are known, can Eve decipher message \(\left|m\right.\rangle\). In other words, if Eve steals the quantum state of the encrypted message being sent, then message \(\left|m\right.\rangle\) will not be known.
Kerchhoffs’ principle
A cryptographic algorithm must provide security even if all components excluding the keys used in the algorithm are disclosed.
Based on Kerchhoffs’ principle, the cryptographic algorithm should provide security even if all components excluding the private key used are exposed to the attacker. In the proposed algorithm, security is ensured, unless Alice’s key material \(\left|M\right.\rangle\) is exposed. Even if Eve steals Alice’s public keys \({U}_{P}\left|M\right.\rangle\) and \({U}_{m}{U}_{P}\left|M\right.\rangle\) which Bob sends to Alice, an accurate measurement cannot be performed. Therefore, Eve does not know the important key material \(\left|M\right.\rangle\) and message \(\left|m\right.\rangle\) that Bob wishes to send. In other words, even if Eve knows all the stages of the algorithm, it is impossible to obtain relevant information.
Shor’s algorithm
It has been reported that Shor’s algorithm41,42, which is a typical quantum algorithm, can effectively unravel modern public-key cryptographic algorithms. By effectively factoring integers, the possibility of performing critical attacks on modern cryptographic systems via quantum computers has been demonstrated. However, attacks by Shor’s algorithm are threats to modern cryptographic systems that rely on computational complexity; however, they do not pose a specific threat to quantum cryptographic systems that are based on the characteristics of quantum mechanics.
Because the proposed quantum public-key cryptographic scheme guarantees security based on the characteristics of quantum mechanics, it is no relevant to attacks by Shor’s algorithm. In other words, the proposed scheme is safe from attacks using Shor’s algorithm.
Comparison of protocol efficiencies
We can compare the efficiency of our scheme with that of existing schemes in terms of the required quantum sources and qubit efficiency.
The qubit efficiency can be defined as follows:
In this definition, c denotes the total number of classical message bits and q denotes the total number of qubits.
As listed in Table 1, our quantum asymmetric key cryptography scheme is more efficient when compared to other schemes.
Conclusion
Here, we proposed a quantum asymmetric key cryptographic scheme using Grover’s algorithm. In the proposed scheme, Alice uses the public and private keys that she created, and only the public key is disclosed to the outside. Furthermore, Bob can send private messages that are only viewable by Alice without sharing any key with Alice. Even if Eve knows everything about the algorithm and steals the qubit being transmitted, she will not know the content of the private message or Alice’s private key. Our proposed quantum asymmetric key cryptography scheme is safe from attacks because its security is based on entanglement, measurement, and collapse, which are the characteristics of quantum mechanics.
Future work:
Contrary to what we have proposed in this paper, if the message is encrypted with the private key and the encrypted message is decrypted with the public key, it is expected to be used as a quantum authentication/signature protocol with integrity and non-repudiation. Discussions on this topic are considered for future works.
Data availability
All data generated or analyzed during this study are included in this published article.
References
Menezes, A. J., Paul, C., Van, O., & Scott A. Vanstone. Handbook of Applied Cryptography. (CRC press, Boca Raton, 1996)
Forouzan, B. A., & Mukhopadhyay, D. Cryptography And Network Security (Sie). (McGraw-Hill Education, Noida, 2011).
Stallings, W. & Tahiliani, M. P. (2014). Cryptography and network security: principles and practice, vol 6. Editor: Pearson London.
Nielsen, M. A., & Chuang, I. Quantum Computation and Quantum Information. (American Association of Physics Teachers, College Park, 2002), pp. 558–559.
Bennett, C. H. & Brassard, G. Quantum cryptography: Public key distribution and coin tossing. In Proc. of IEEE International Conf. on Computers, Systems and Signal Processing, vol 175. p. 8. (NY, 1984).
Hong, C. H., Lim, J. I., Kim, J. I. & Yang, H. J. Two-way quantum direct communication protocol using entanglement swapping. J. Korean Phys. Soc. 56(6), 1733–1737 (2010).
Yoon, C. S., Kang, M. S., Lim, J. I. & Yang, H. J. Quantum signature scheme based on a quantum search algorithm. Phys. Scr. 90(1), 015103 (2014).
Kang, M. S., Hong, C. H., Heo, J., Lim, J. I. & Yang, H. J. Quantum signature scheme using a single qubit rotation operator. Int. J. Theor. Phys. 54(2), 614–629 (2015).
Heo, J., Hong, C. H., Lim, J. I. & Yang, H. J. A quantum communication protocol transferring unknown photons using path-polarization hybrid entanglement. Chin. Phys. Letters 30(4), 040301 (2013).
Zeng, G. & Keitel, C. H. Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002).
Zeng, G. Reply to comment on ‘arbitrated quantum-signature scheme’. Phys. Rev A 78(1), 16301 (2008).
Lee, H., Hong, C., Kim, H., Lim, J. & Yang, H. J. Arbitrated quantum signature scheme with message recovery. Phys. Letters A 321(5), 295–300 (2004).
Amiri, R., Wallden, P., Kent, A. & Andersson, E. Secure quantum signatures using insecure quantum channels. Phys. Rev. A 93(3), 032325 (2016).
Yin, H. L. et al. Experimental quantum digital signature over 102 km. Phys. Rev. A 95(3), 032334 (2017).
Yin, H. L. et al. Experimental measurement-device-independent quantum digital signatures over a metropolitan network. Phys. Rev. A 95(4), 042338 (2017).
Lu, Y. S. et al. Efficient quantum digital signatures without symmetrization step. Opt. Express 29(7), 10162–10171 (2021).
Weng, C. X. et al. Secure and practical multiparty quantum digital signatures. Opt. Express 29(17), 27661–27673 (2021).
Yin, H. L. et al. Experimental quantum secure network with digital signatures and encryption. Natl. Sci. Rev. 2022, nwac228 (2022).
Lucamarini, M., Yuan, Z. L., Dynes, J. F. & Shields, A. J. Overcoming the rate–distance limit of quantum key distribution without quantum repeaters. Nature 557(7705), 400–403 (2018).
Xie, Y. M. et al. Breaking the rate-loss bound of quantum key distribution with asynchronous two-photon interference. PRX Quantum 3(2), 020315 (2022).
Gu, J. et al. Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources. Sci. Bull. 67(21), 2167–2175 (2022).
Kawachi, A., & Portmann, C. (2007). Quantum asymmetric-key cryptosystems secure against computationally unbounded adversaries (theory of computer science and its applications). 数理解析研究所講究録. 1554, 117–124.
Okamoto, T., Keisuke T., & Shigenori U. Quantum public-key cryptosystems. Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology Conf. Santa Barbara, California, 2000 Proc. (Springer, Berlin, 2000).
Gottesman, D., & Isaac, C. Quantum digital signatures. arXiv preprint quant-ph/0105032 (2001).
Zeng, G., Saavedra, C., & Keitel, C. H. Asymmetrical quantum cryptographic algorithm. arXiv preprint quant-ph/0202021 (2002).
Kawachi, A., Koshiba, T., Nishimura, H. & Yamakami, T. Computational indistinguishability between quantum states and its cryptographic application. Eurocryption 3494, 2005 (2005).
Koshiba, T. Security notions for quantum public-key cryptography. arXiv preprint quant-ph/0702183 (2007).
Nikolopoulos, G. M. Applications of single-qubit rotations in quantum public-key cryptography. Phys. Rev. A 77(3), 032348 (2008).
Gao, F., Wen, Q., Qin, S. & Zhu, F. Quantum asymmetric cryptography with symmetric keys. Sci. China. Ser. G Phys Mech. Astron. 52(12), 1925–1931 (2009).
Liang, M. & Yang, L. Public-key encryption and authentication of quantum information. Sci. China Phys. Mech. Astron. 55, 1618–1629 (2012).
Luo, M. X., Chen, X. B., Yun, D. & Yang, Y. X. Quantum public-key cryptosystem. Int. J. Theor. Phys. 51(3), 912–924 (2012).
Yang, L., Yang, B., & Pan, J. Quantum public-key encryption protocols with information-theoretic security. Quantum Optics II, Vol 8440. (SPIE, Bellingham, 2012).
Li, X. & Zhang, D. Quantum public-key cryptosystem based on super dense coding technology. J. Comput. 8(12), 3168–3175 (2013).
Zheng, S., Gu, L. & Xiao, D. Bit-oriented quantum public key probabilistic encryption schemes. Int. J. Theor. Phys. 53, 116–124 (2014).
Wu, C., & Yang, L. A complete classification of quantum public-key encryption protocols. Electro-Optical and Infrared Systems: Technology and Applications XII; and Quantum Information Science and Technology, Vol. 9648. (SPIE, Bellingham, 2015).
Wu, W., Cai, Q., Zhang, H. & Liang, X. Quantum public key cryptosystem based on bell states. Int. J. Theor. Phys 56, 3431–3440 (2017).
Grover, L. K. Quantum mechanics helps in searching for a needle in a haystack. Phys. Rev. Letters 79(2), 325 (1997).
Grover, L. K. Quantum computers can search arbitrarily large databases by a single query. Phys. Rev. Letters 79(23), 4709 (1997).
Diffie, W. & Hellman, M. E. New directions in cryptography. IEEE Trans. Inform. Theory 22(6), 644–654 (2022).
Rivest, R. L., Adi, S. & Leonard, A. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978).
Shor, P. W. Algorithms for quantum computation: Discrete logarithms and factoring. Foundations of Computer Science, 1994 Proc., 35th Annual Symposium on. (IEEE, NY, 1994).
Shor, P. W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303–332 (1999).
Author information
Authors and Affiliations
Contributions
C.S.Y. conceived and designed the analysis the main idea. C.S.Y., J.W.C. and H.J.Y. wrote the manuscript. C.S.Y., C.H.H and M.S.K. calculated the main calculation. All authors analyzed the results and reviewed the manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Yoon, C.S., Hong, C.H., Kang, M.S. et al. Quantum asymmetric key crypto scheme using Grover iteration. Sci Rep 13, 3810 (2023). https://doi.org/10.1038/s41598-023-30860-0
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-023-30860-0
- Springer Nature Limited
This article is cited by
-
Grover’s search with learning oracle for constrained binary optimization problems
Quantum Machine Intelligence (2024)