Submitted:
30 June 2025
Posted:
02 July 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Main Idea
3. Quantum Public-Key Cryptosystem with Resuable (Public Key, Private Key) Pair
4. Security of the Cryptosystem
5. Discussion
6. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Bennett, C.H.; Brassard, G. Quantum cryptography: Public-key distribution and tossing. In Proceedings of IEEE International conference on Computers, Systems and Signal Processing, Bangalore, India, December 1984; pp. 175–179.
- Ekert, A.K. Quantum cryptography based on Bell’s theorem. Physical Review Letters 1991, 67(6), 661–663. [Google Scholar] [CrossRef] [PubMed]
- Bennett, C.H.; Brassard, G.; Mermin, N.D. Quantum cryptography without Bell’s theorem. Physical Review Letters 1991, 68(5), 557–559. [Google Scholar] [CrossRef] [PubMed]
- Zhao, Y.; Qi, B.; Lo, H.K. Quantum key distribution with an unknown and untrusted source. Physical Review A 2008, 77(5), 052327. [Google Scholar] [CrossRef]
- Horodecki, K.; Horodecki, M.; Horodecki, P.; Leung, D.; Oppenheim, J. Quantum key distribution based on private states: unconditional security over untrusted channels with zero quantum capacity. IEEE Transaction on Information Theory 2008, 54(6), 2604. [Google Scholar] [CrossRef]
- Aguilar, E.A.; Ramanathan, R.; Kofler, J.; Pawlowski, M. Completely Device Independent Quantum Key Distribution. Physical Review A 2015, 94(2), 022305. [Google Scholar] [CrossRef]
- Zhen, Y.Z.; Mao, Y.; Sanders, X.B.C. Device-Independent Quantum Key Distribution Based on the Mermin-Peres Magic Square Game. Physical Review Letters 2023, 131, 090801. [Google Scholar] [CrossRef]
- Yang, H.; Liu, S.; Yang, S.; Lu, Z.; Li, Y. Li Y. High-efficiency rate-adaptive reconciliation in continuous-variable quantum key distribution. Physical Review A 2024, 109(1), 012604. [Google Scholar] [CrossRef]
- Zhang, C.M.; Wang, Z.; Wu. Y.D.; Zhu, J.R.; Wang, R.; Li, H.W. Discrete-phase-randomized twin-field quantum key distribution with advantage distillation. Physical Review A 2024, 109(5), 052432. [Google Scholar] [CrossRef]
- Zhang, Y.; Zhao, H.; Wu, T.; Gao, Z.; Ge, L.; Feng, L. High-Dimensional Quantum Key Distribution by a Spin-Orbit Microlaser. Physical Review X 2025, 15), 011024. [Google Scholar] [CrossRef]
- Sixto, X.; Navaerrete, A.; Pereira, M.; Curras-Lorenzo, G.; Tamaki, k.; Curty, M. Quantum key distribution with imperfectly isolated devices. Quantum Science and Technology 2025, 10(3), 035034. [Google Scholar] [CrossRef]
- Rivera-Dean, J.; Steffinlongo, A.; Parker-Sánchez, N.; Acín, A.; Tamaki, k.; Curty, M.; Oudot, E. Device-independent quantum key distribution beyond qubits. New Journal of Physics 2025, 27(5), 054512. [Google Scholar] [CrossRef]
- Bennett, C.H.; Bessette, F.; Brassard, G.; Salvail, L.; Smolin, J. Experimental quantum cryptography. Journal of Cryptology 1992, 5(1), 3–28. [Google Scholar] [CrossRef]
- Yin, H.L.; Chen, T.Y.; Yu, Z.W.; Liu, H.; You, L.X.; Zhou, H. Y,; et al. Measurement device independent quantum key distribution over 404 km optical fibre. Physical Review Letters 2016, 117, 190501. [Google Scholar] [CrossRef]
- Buttler, W.T.; Hughes, R.J.; Kwiat, P.G.; Lamoreaux, S.K.; Luther, G.G.; Morgan, G.L.; Nordholt, J.E.; et al. Practical Free-Space Quantum Key Distribution over 1 km. Physical Review Letters 1998, 81(15), 3283. [Google Scholar] [CrossRef]
- Liao, S.K.; Cai, W.Q.; Liu, W.Y.; Liang, Z.; Yang, L.; Ren, J.G.; et al. Satellite-to-ground quantum key distribution. Nature 2017, 549(7670), 43–47. [Google Scholar] [CrossRef]
- Rivest, R.; Sharmir, A.; Adleman, L. A Method for Obstaining Digital signature and Public-Key Cryptosystem. Communications of ACM 1978, 21(2), 120–126. [Google Scholar] [CrossRef]
- Shor, P.W. Algorithms for quantum computation: Discrete logarithm and Factoring. In Proceedings of 35th Annual IEEE Symposium on Foundations of Computer Science, Santa Fe, US. 1994; pp. 124-134.
- Gottesman D, Chuang I. A Method for Obstaining Digital signature and Public-Key Cryptosystem. arXiv:quant-ph, 2001, 0105032.
- Nikolopoulos, G. Applications of single-qubit rotations in quantum public-key cryptography. Physical Review A 2008, 77(3), 032348. [Google Scholar] [CrossRef]
- Nikolopoulos, G.; Ioannou, L. Deterministic quantum-public-key encryption: forward search attack and randomization. Physical Review A 2008, 77(3), 032348. [Google Scholar] [CrossRef]
- Ioannou, L.; Mosca, M. Public-key cryptography based on bounded quantum reference frames. In Proceedings of 6th Conference on the Theory of Quantum Computation, Communication and Cryptography, Madrid, Spain 2011; pp. 121-142.
- Luo, M.X.; Chen, X.B.; Yun, D.; Yang, Y.X. Quantum Public-Key Cryptosystem. International Journal of Theoretical Physics 2012, 51(3), 912–924. [Google Scholar] [CrossRef]
- Seyfarth, U.; Nikolopoulos, G.; Alber, G. Symmetries and security of a quantum-public-key encryption based on single-qubit rotations. Physical Review A 2012, 85(2), 022342. [Google Scholar] [CrossRef]
- Vlachou, C.; Rodrigues, J, Mateus, P. Quantum walk public-key cryptographic system. International Journal of Quantum Information 2015, 13(7), 1550050.
- Wu, W.Q.; Cai, Q.Y.; Zhang, H.G.; Liang, X.Y. Quantum Public Key Cryptosystem Based on Bell States. International Journal of Theoretical Physics 2017, 56(11), 3431–3440. [Google Scholar] [CrossRef]
- Yang, L.; Yang, B.Y.; Xiang, C. Quantum public-key encryption schemes based on conjugate coding. Quantum Information Processing 2020, 19(11), 415. [Google Scholar] [CrossRef]
- Liu, Z.X.; Xie, Q.L.; Zha, Y.F.; Dong, F.M. Quantum public key encryption scheme with four states key. Physica Scripta 2022, 97, 045102. [Google Scholar] [CrossRef]
- Zhang, D.X.; Li, X.Y. A Quantum Public-Key Cryptosystem without Quantum Channels between any Two Users Based on Quantum Teleportation. International Journal of Theoretical Physics 2022, 61(4), 101. [Google Scholar] [CrossRef]
- Li, X.Y.; Chen, L.J. QUANTUM PUBLIC-KEY CRYPTOSYSTEM WITHOUT QUANTUM. Romanian Journal of Physics 2022, 67, 118. [Google Scholar]
- Wang Y, Chen G, Jian L. Ternary quantum public-key cryptography based on qubit rotation. Quantum Information Processing 2022, 21(6), 197.
- Barooti K, Grilo AB, Huguenin-Dumittan L, Malavolta G, Sattath O, Vu Q, M Walter M. Public-Key Encryption with Quantum Keys. In 21st International Conference on Theory of Cryptography, Taipei, Taiwan, November, 2023; 198-227.
- Zhang, D.X.; Li, X.Y.; Zhao, Q.Y. Quantum Public-Key Cryptosystem Based on the Non-Locality in Unentangled Quantum System. Brazilian Journal of Physics 2024, 54(5), 158. [Google Scholar] [CrossRef]
- Kitagawa F, Morimae T, Nishimaki R, Yamakawa T. Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions. In 44th Annual International Cryptology Conference on Advances in Cryptology, August, Santa Barbara, US, 2024; 93-125.
- Malavolta G, Walter M. Robust Quantum Public-Key Encryption with Applications to Quantum Key Distribution. In 44th Annual International Cryptology Conference on Advances in Cryptology, August, Santa Barbara, US, 2024; 126-151.
- Fu, X.Q.; Li, H.W.; Shi, J.H.; Li, T.; Bao, W.S. Quantum public-key crypto via EPR pairs. Science China-Physics Mechanics & Astronomy 2025, 68(1), 210314.
- Li, X.Y.; Chen, Y.L. Quantum Public-Key Cryptosystem Using Orthogonal Product States with High Channel Capacity. Contemporary Mathematics 2025, 6(2), 1455–1467. [Google Scholar] [CrossRef]
- Hussain, S.M.S.; Aftab, M.A.; Farooq, S.M.; Latif, A.; Konstantinou, C.; Abido, M.A. A Public key Based Quantum Secure Digital Signature Scheme for Securing IEC 61850 R-GOOSE and R-SV Messages. IEEE Transactions on Industrial Applications 2025, 61(3), 5135–5147. [Google Scholar] [CrossRef]
| S | 0 | 0 | |||||
| S | 1 | 1 |
| state of the four-qubit system | Alice’s result | Eve’s result | |||
|---|---|---|---|---|---|
| SSS1 | 0 | or | 0 or 1 | ||
| SSS2 | 1 | or | 0 or 1 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).