Schnorr Digital Signature to Improve Security Using Quantum Cryptography

  • Prity KumariEmail author
  • Upendra Kumar
  • Shyam Krishna Singh
Conference paper


Nowadays, security is the primary concern for organizations. In computer network security, quantum theory has very high importance in the twentieth century. It is the science of exploring quantum mechanical properties to perform cryptographic tasks. The principle of quantum mechanics has been implemented in a cryptographic system. This paper is based on the fundamental concepts of quantum cryptography, in which secured cryptographic encrypted data will be transferred using the quantum key distribution. It is a prominent technology through which two remote parties can communicate with the help of arbitrary string ID-based quantum encryption. Encrypted data is accessible in the form of a random string of bits. Photons are polarized using their quantized properties to encode the message. This is represented in the form of qubits. After converting message into qubits, receiver identity ID as a public key and system parameter for that qubits to generate ciphertext. Further quantum hash function and Schnorr digital signature are implemented on that qubit message to generate the signature.


Classical cryptography Quantum cryptography Quantum key distribution Hash function Schnorr digital signature 


  1. 1.
    Mayers, D. (2001). “Unconditional security in quantum cryptography”. Journal of the ACM (JACM), 48(3), 351–406. Retrieved from Scholar
  2. 2.
    P. Shor. “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer.” SIAM Journal on Computing, 26(5):1484{1509, 1997}.Google Scholar
  3. 3.
    L. Grover. “A fast quantum mechanical algorithm for database search.” In Proceedings of the 28th ACM Symposium on the Theory of Computing, pages 212{219. ACM, New York, 1996.Google Scholar
  4. 4.
    Bennett, C.H., F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum cryptography”, Journal of Cryptology 5(1), 328 (1992).Google Scholar
  5. 5.
    Brassard, G. (1993). “A Bibliography of Quantum Cryptography”. ACM SIGACT News, pp. 16–20.Google Scholar
  6. 6.
    Yu-Guang Yang1,2,3,4, Peng Xu1, Rui Yang1, Yi-Hua Zhou1 & Wei-Min Shi1. “Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption.”,Published: 29 January 2016.
  7. 7.
    The Golden Bough, Sir James George Frazer. Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.Google Scholar
  8. 8.
    P. Eronen, et. al., “Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)”, RFC4279, December 2005.Google Scholar
  9. 9.
    Tim Dierks, Eric Rescorla, “ The Transport Layer Security (TLS) Protocol, Version 1.2”, RFC5246, August 2008.Google Scholar
  10. 10.
    C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” in Proc. IEEE Int. Conf. Computers, Systems and Signal Processing, New York, Bangalore, India, 1984, pp. 175–179.Google Scholar
  11. 11.
    Ammar Odeh, Khaled Elleithy, Muneer Alshowkan, Eman Abdelfattah. “Quantum Key Distribution by Using Public Key Algorithm(RSA)” (PDF Download Available). Available from: [accessed Oct 21 2017].
  12. 12.
    S. Ranganathan, N. Ramasamy, S. K. K. Arumugam, B. Dhanasekaran, P. Ramalingam, V. Radhakrishnan, and R. Karpuppiah, “A Three Party Authentication for Key Distributed Protocol Using Classical and Quantum Cryptography,” International Journal of Computer Science Issues(IJCSI), vol. 7, 2010.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Prity Kumari
    • 1
    Email author
  • Upendra Kumar
    • 2
  • Shyam Krishna Singh
    • 3
  1. 1.Magadh UniversityBodh GayaIndia
  2. 2.Birla Institute of TechnologyPatnaIndia
  3. 3.A. N. CollegePatnaIndia

Personalised recommendations