Schematic diagram for the QDS about “The 120th anniversary of Nanjing University”. (IMAGE)
Caption
(a) Compared with classical schemes, Charlie plays the role of a certificate authority. Alice’s key can be viewed as a quantum private key, while Bob’s key is a quantum public key; in our protocol, they are asymmetric. The information-theoretically secure OTUH replaces the fixed one-way hash function. Here, we omit the pre-distribution stage for information-theoretically secure asymmetric quantum key generation, which replaces the classical private and public key generation process. (b) As an example, we sign a document of “The 120th anniversary of Nanjing University.” The details of the document, digest, signature, irreducible polynomial, and key bit strings are shown in hexadecimal.
Credit
©Science China Press
Usage Restrictions
Use with credit.
License
Original content