Yi-Hua Zhou
Beijing University of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Yi-Hua Zhou.
Information Sciences | 2016
Yu-Guang Yang; Ju Tian; He Lei; Yi-Hua Zhou; Wei-Min Shi
We investigate the application of quantum cellular automata in image encryption and propose a novel quantum gray-scale image encryption algorithm based on one-dimensional quantum cellular automata. The quantum image encryption algorithm can be realized by subtly constructing the evolution rules of one-dimensional quantum cellular automata. Because all quantum operations are invertible, the quantum image decryption algorithm is the inverse of the encryption algorithm. The proposed quantum image encryption algorithm has an algorithm complexity of ?(n), lower than the algorithm complexity, ?(n2) of existing quantum image encryption schemes based on quantum Fourier transform. Supported by detailed numerical simulation and theoretical analysis, our proposal has outperformed its classical counterpart and other image encryption schemes in terms of the security, computational complexity, and robustness. And it also provides a clue of introducing quantum cellular automata into image encryption.
Quantum Information Processing | 2014
Yi-Hua Zhou; Wei-Min Shi; Yu-Guang Yang
In this paper, protocols of quantum private comparison of equality (QPCE) are investigated. We study the security of previous QPCE protocols with a semi-honest third party (TP) from the viewpoint of secure multiparty computation and show that QPCE protocol (Chen et al. Quantum Inf Process 2012) has an obvious security flaw. A vicious inside attacker impersonating TP or the compromised TP colluding with a dishonest inside player can steal other player’s secret successfully. An improved efficient and feasible QPCE protocol is proposed. In our improved scheme, only the two players can deduce the results of comparisons based on their shared key, and others will learn no information of the comparison results, even the length of secrets. The cost of communication is also be optimized. Our scheme can resist various kinds of attacks from both the outside eavesdroppers and the inside players, even the TP.
Scientific Reports | 2016
Yu-Guang Yang; Peng Xu; Rui Yang; Yi-Hua Zhou; Wei-Min Shi
Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information.
Quantum Information Processing | 2014
Wei-Min Shi; Yi-Hua Zhou; Yu-Guang Yang
The proposed quantum identity authentication schemes only involved authentication between two communicators, but communications with deniability capability are often desired in electronic applications such as online negotiation and electronic voting. In this paper, we proposed a quantum deniable authentication protocol. According to the property of unitary transformation and quantum one-way function, this protocol can provide that only the specified receiver can identify the true source of a given message and the specified receiver cannot prove the source of the message to a third party by a transcript simulation algorithm. Moreover, the quantum key distribution and quantum encryption algorithm guarantee the unconditional security of this scheme. Security analysis results show that this protocol satisfies the basic security requirements of deniable authentication protocol such as completeness and deniability and can withstand the forgery attack, impersonation attack, inter-resend attack.
Quantum Information Processing | 2015
Wei-Min Shi; Jian-Biao Zhang; Yi-Hua Zhou; Yu-Guang Yang
A novel quantum deniable authentication protocol based on single photons is proposed. In this scheme, the message sender and the specified receiver will first agree a new shared secret key by key update phases with the help of a third center, where only they can encrypt and decrypt the message by using the new shared secret key. Hence, this scheme can guarantee that only the specified receiver can identify the true source of a given message and the specified receiver cannot prove the source of the message to a third party by a transcript simulation algorithm. Compared with our previous scheme (Shi et al. in Quantum Inf Process 13:1501–1510, 2014), this scheme has the remarkable advantages of the higher qubit efficiency and consuming fewer quantum resources. Finally, security analysis results show that this scheme satisfies known key security and the basic security requirements of deniable authentication protocol such as completeness and deniability, and can withstand forgery attack, impersonation attack and inter-resend attack.
Quantum Information Processing | 2016
Yu-Guang Yang; Zhi-Chao Liu; Xiu-Bo Chen; Wei-Feng Cao; Yi-Hua Zhou; Wei-Min Shi
Existing classical post-processing (CPP) schemes for quantum key distribution (QKD)-based quantum private queries (QPQs) including the
Scientific Reports | 2016
Jian Li; Yu-Guang Yang; Xiu-Bo Chen; Yi-Hua Zhou; Wei-Min Shi
Quantum Information Processing | 2015
Wei-Min Shi; Jian-Biao Zhang; Yi-Hua Zhou; Yu-Guang Yang
kN\rightarrow N
Quantum Information Processing | 2015
Yu-Guang Yang; Rui Yang; He Lei; Wei-Min Shi; Yi-Hua Zhou
Quantum Information Processing | 2017
Yu-Guang Yang; Zhi-Chao Liu; Jian Li; Xiu-Bo Chen; Hui-Juan Zuo; Yi-Hua Zhou; Wei-Min Shi
kN→N,