1
|
Cao XY, Li BH, Wang Y, Fu Y, Yin HL, Chen ZB. Experimental quantum e-commerce. SCIENCE ADVANCES 2024; 10:eadk3258. [PMID: 38215202 DOI: 10.1126/sciadv.adk3258] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/15/2023] [Accepted: 12/15/2023] [Indexed: 01/14/2024]
Abstract
E-commerce, a type of trading that occurs at a high frequency on the internet, requires guaranteeing the integrity, authentication, and nonrepudiation of messages through long distance. As current e-commerce schemes are vulnerable to computational attacks, quantum cryptography, ensuring information-theoretic security against adversary's repudiation and forgery, provides a solution to this problem. However, quantum solutions generally have much lower performance compared to classical ones. Besides, when considering imperfect devices, the performance of quantum schemes exhibits a notable decline. Here, we demonstrate the whole e-commerce process of involving the signing of a contract and payment among three parties by proposing a quantum e-commerce scheme, which shows resistance of attacks from imperfect devices. Results show that with a maximum attenuation of 25 dB among participants, our scheme can achieve a signature rate of 0.82 times per second for an agreement size of approximately 0.428 megabit. This proposed scheme presents a promising solution for providing information-theoretic security for e-commerce.
Collapse
Affiliation(s)
- Xiao-Yu Cao
- National Laboratory of Solid State Microstructures and School of Physics, Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
- Department of Physics and Beijing Key Laboratory of Opto-electronic Functional Materials and Micro-nano Devices, Key Laboratory of Quantum State Construction and Manipulation (Ministry of Education), Renmin University of China, Beijing 100872, China
| | - Bing-Hong Li
- National Laboratory of Solid State Microstructures and School of Physics, Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
- Department of Physics and Beijing Key Laboratory of Opto-electronic Functional Materials and Micro-nano Devices, Key Laboratory of Quantum State Construction and Manipulation (Ministry of Education), Renmin University of China, Beijing 100872, China
| | - Yang Wang
- National Laboratory of Solid State Microstructures and School of Physics, Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
- Henan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou 450001, China
| | - Yao Fu
- Beijing National Laboratory for Condensed Matter Physics and Institute of Physics, Chinese Academy of Sciences, Beijing 100190, China
| | - Hua-Lei Yin
- National Laboratory of Solid State Microstructures and School of Physics, Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
- Department of Physics and Beijing Key Laboratory of Opto-electronic Functional Materials and Micro-nano Devices, Key Laboratory of Quantum State Construction and Manipulation (Ministry of Education), Renmin University of China, Beijing 100872, China
| | - Zeng-Bing Chen
- National Laboratory of Solid State Microstructures and School of Physics, Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
- MatricTime Digital Technology Co. Ltd., Nanjing 211899, China
| |
Collapse
|
2
|
Yoon CS, Hong CH, Kang MS, Choi JW, Yang HJ. Quantum asymmetric key crypto scheme using Grover iteration. Sci Rep 2023; 13:3810. [PMID: 36882516 PMCID: PMC9992374 DOI: 10.1038/s41598-023-30860-0] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/18/2022] [Accepted: 03/02/2023] [Indexed: 03/09/2023] Open
Abstract
Here, we propose a quantum asymmetric key cryptography scheme using Grover's quantum search algorithm. In the proposed scheme, Alice generates a pair of public and private keys, keeps the private keys safe, and only discloses public keys to the outside. Bob uses Alice's public key to send a secret message to Alice and Alice uses her private key to decrypt the secret message. Furthermore, we discuss the safety of quantum asymmetric key encryption techniques based on quantum mechanical properties.
Collapse
Affiliation(s)
- Chun Seok Yoon
- Department of Physics, Korea University, Sejong, 30019, South Korea
- Institute of Convergence Technology KT R&D Center, 151 Taebong-Ro, Seoul, 06763, Republic of Korea
| | - Chang Ho Hong
- The Affiliated Institute of Electronics and Telecommunications Research Institute, P.O. Box 1, Yuseong, Daejeon, 34188, Republic of Korea
| | - Min Sung Kang
- Korean Intellectual Property Office (KIPO), Government Complex Daejeon Building 4, 189, Cheongsa-Ro, Seogu, Daejeon, 35208, Republic of Korea
| | - Ji-Woong Choi
- Center for Quantum Information, Korea Institute of Science and Technology (KIST), Seoul, 02792, Republic of Korea
| | - Hyung Jin Yang
- Department of Physics, Korea University, Sejong, 30019, South Korea.
| |
Collapse
|