Volume 7 , Issue 1 , PP: 05-12, 2021 | Cite this article as | XML | Html | PDF | Review Article
Manav Sohal 1 , Mandeep Kaur Sandhu 2 * , Rupinder kaur 3
Doi: https://doi.org/10.54216/JCIM.070101
In the field of cryptography, new tasks are generated when advancement has taken place from conventional computing to quantum computing. In the case of computer security, cryptography had always been a valuable and essential tool. When quantum mechanics principles are applied to cryptography, it gives rise to a new system that will secure communication and also assures that no spying can take place. The work below presents the review on quantum cryptography, which includes the concept of quantum cryptography and what can be its evaluation measures. Articles of quantum cryptography from various databases have been studied. In this SLR various research questions are identified and on the basis of the results of their answers have been formulated for this review along with that various performance measures are also discussed.
cryptography , quantum , image encryption
1. A. Abd EL-Latif, B. Abd-El-Atty, E. M. Abou-Nassar, and S. E. Venegas-Andraca, “Controlled alternate quantum walks based privacy preserving healthcare images in Internet of Things,” Opt. LASER Technol., vol. 124, Apr. 2020.
2. H. M. Waseem and M. Khan, “A new approach to digital content privacy using quantum spin and finite-state machine,” Appl. Phys. B-LASERS Opt., vol. 125, no. 2, Feb. 2019.
3. M. Khan and H. M. Waseem, “A novel image encryption scheme based on quantum dynamical spinning and rotations,” PLoS One, vol. 13, no. 11, Nov. 2018.
4. Q. Ran, L. Wang, J. Ma, L. Tan, and S. Yu, “A quantum color image encryption scheme based on coupled hyper-chaotic Lorenz system with three impulse injections,” QUANTUM Inf. Process., vol. 17, no. 8, Aug. 2018.
5. B. Wang, J. Xu, and H. Song, “Research on the improved algorithm for image quantum encryption in multimedia networks,” Comput. Electr. Eng., vol. 62, pp. 414–428, Aug. 2017.
6. H. A. Elsayed, Y. K. Jadaan, and S. K. Guirguis, “Image security using quantum Rivest-Shamir-Adleman cryptosystem algorithm and digital watermarking,” in 2016 Progress in Electromagnetic Research Symposium (PIERS), 2016, pp. 3978–3982.
7. X. Liu, H. Xiao, P. Li, and Y. Zhao, “Design and Implementation of Color Image Encryption Based on Qubit Rotation About Axis,” Chinese J. Electron., vol. 27, no. 4, pp. 799–807, 2018.
8. J. Li, X. Di, X. Liu, and X. Chen, “Image encryption based on quantum-CNN hyperchaos system and Anamorphic Fractional Fourier Transform,” in 2017 10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), 2017, pp. 1–6.
9. J. Xu, P. Li, F. Yang, and H. Yan, “High Intensity Image Encryption Scheme Based on Quantum Logistic Chaotic Map and Complex Hyperchaotic System,” IEEE Access, vol. 7, pp. 167904–167918, 2019.
10. Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Mohamed Amin, Abdullah M. Iliyasu, “Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications,” Sci Rep. 2020; 10: 1930. Published online, Feb, 2020.
11. Yu-Guang Yang, Peng Xu, Rui Yang, Yi-Hua Zhou, Wei-Min Shi, “Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption,” Sci Rep. 2016; 6: 19788. Published online, Jan, 2016.
12. El-Latif, A. A. A., Abd-El-Atty, B. & Talha, M. Robust encryption of quantum medical images. IEEE Access. 6, 1073–1081, 2017.
13. Abd-El-Atty, B., EL-Latif, A. A. A. & Venegas-Andraca, S. E. An encryption protocol for NEQR images based on one-particle quantum walks on a circle. Quantum Inf. Process. 18, 272 (2019).
14. EL-Latif, A. A. A., Abd-El-Atty, B. & Venegas-Andraca, S. E. Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption. Physica A: Statistical Mechanics and its Applications, 2019.
15. EL-Latif, A. A. A., Abd-El-Atty, B. & Venegas-Andraca, S. E. A novel image steganography technique based on quantum substitution boxes. Opt. Laser Technol. 116, 92–102, 2019.
16. El-Latif, A. A. A. et al. Secret images transfer in cloud system based on investigating quantum walks in steganography approaches. Physica A: Statistical Mechanics and its Applications 123687,2019.
17. Goyal A, Aggarwal S, Jain A. Quantum Cryptography & its Comparison with Classical Cryptography: A Review Paper. In5th IEEE International Conference on Advanced Computing & Communication Technologies [ICACCT-2011] 2011.
18. Hughes, R. J., Alde, D. M., Dyer, P., Luther, G. G., Morgan, G. L., & Schauer, M. (1995). Quantum cryptography. Contemporary Physics, 36(3), 149–163.
19. D. Mayers and A. Yao, "Quantum cryptography with imperfect apparatus," Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280), Palo Alto, CA, USA, 1998, pp. 503-509.
20. Bennett, C.H., Bessette, F., Brassard, G. et al. Experimental quantum cryptography. J. Cryptology 5, 3–28 ,1992
21. C. H. Bennett, G. Brassard and A. K. Ekert, “Quantum Cryptography,” Scientific American, Vol. 267, No. 4, 1992, pp. 50-57.
22. S.M. Barnett and S. J. D. Phoenix , “Philosophical Transactions: Mathematical, Physical and Engineering Sciences ,” Nonlinear Optics for Information Processing and Communication,Vol. 354, No. 1708, pp. 793-803.
23. J. Breguet, A. Muller & N. Gisin, “Quantum Cryptography with Polarized Photons in Optical Fibres”, Journal of Modern Optics, 41:12, 2405-2412, 1994