Skip to main content
Log in

Quantum Spin Half Algebra and Generalized Megrelishvili Protocol for Confidentiality of Digital Images

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

Most of the enciphering structures are based on the transformation of mediums by describing the strict criteria. The presented article is based on Megrelishvili’s design and quantum spin states structure to offer privacy to digital contents. We have replicated the pixels of the image with the spin half states sequence for definite phase distributed with Megrelishvili protocol to create confusion in the anticipated mechanism. The choice of the offered work rotates around the improvement of a cryptosystem based on the notion of spin half algebra and Megrelishvili protocol. Moreover, we have tested the anticipated information confidentiality scheme by utilizing security analyses.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Khan, M., Hussain, I., Jamal, S.S., Amin, M.: A privacy scheme for digital images based on quantum particles. Int. J. Theor. Phys. 58(12), 4293–4310 (2019)

    Article  Google Scholar 

  2. Waqas, U.A., Khan, M., Batool, S.I., 2019. A new watermarking scheme based on Daubechies wavelet and chaotic map for quick response code images. Multimedia tools and applications, pp.1-24

  3. Belovs, A., Brassard, G., Hoyer, P., Kaplan, M., Laplante, S., Salvail, L., 2017. Provably secure key establishment against quantum adversaries. arXiv preprint arXiv:1704.08182

  4. Yu, N., Lai, C.Y. and Zhou, L., 2019. Protocols for packet quantum network intercommunication. arXiv preprint arXiv:1903.10685

  5. Faugere, J.C., Horan, K., Kahrobaei, D., Kaplan, M., Kashefi, E. and Perret, L., 2017. Fast quantum algorithm for solving multivariate quadratic equations. arXiv preprint arXiv:1712.07211

  6. Unruh, D.: Quantum proofs of knowledge. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 135–152. Springer, Berlin (2012)

    Google Scholar 

  7. Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Breaking symmetric cryptosystems using quantum period finding. In: Annual International Cryptology Conference, pp. 207–237. Springer, Berlin (2016)

    Google Scholar 

  8. Gagliardoni, T., Hülsing, A., Schaffner, C.: Semantic security and indistinguishability in the quantum world. In: Annual International Cryptology Conference, pp. 60–89. Springer, Berlin (2016, August)

    Google Scholar 

  9. Boneh, D., Dagdelen, Ö., Fischlin, M., Lehmann, A., Schaffner, C., Zhandry, M.: Random oracles in a quantum world. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 41–69. Springer, Berlin (2011)

    Google Scholar 

  10. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560(12), 7–11 (2014)

    Article  MathSciNet  Google Scholar 

  11. Boneh, D.: Twenty years of attacks on the RSA cryptosystem. Notices of the AMS. 46(2), 203–213 (1999)

    ADS  MathSciNet  MATH  Google Scholar 

  12. Khan, M., Masood, F., Alghafis, A., 2019. Secure image encryption scheme based on fractals key with Fibonacci series and discrete dynamical system. Neural Computing and Applications, pp.1-21

  13. Khan, M., Masood, F., Alghafis, A., Amin, M., Batool Naqvi, S.I.: A novel image encryption technique using hybrid method of discrete dynamical chaotic maps and Brownian motion. PLoS One. 14(12), e0225031 (2019)

    Article  Google Scholar 

  14. Fick, A.: V. On liquid diffusion. London Edinburgh Dublin Philos. Mag. J. Sci. 10(63), 30–39 (1855)

    Article  Google Scholar 

  15. Kashefi, E., Music, L. and Wallden, P., 2017. The quantum cut-and-choose technique and quantum two-party computation. arXiv preprint arXiv:1703.03754

  16. Lydersen, L., Wiechers, C., Wittmann, C., Elser, D., Skaar, J., Makarov, V.: Hacking commercial quantum cryptography systems by tailored bright illumination. Nature Photonics. 4(10), 686 (2010)

    Article  ADS  Google Scholar 

  17. Boneh, D., Zhandry, M.: Secure signatures and chosen ciphertext security in a quantum computing world. In: Annual Cryptology Conference, pp. 361–379. Springer, Berlin (2013, August)

    Google Scholar 

  18. Gheorghiu, A., Kapourniotis, T., Kashefi, E.: Verification of quantum computation: an overview of existing approaches. Theory Comput. Syst. 63(4), 715–808 (2019)

    Article  MathSciNet  Google Scholar 

  19. Xu, F., Arrazola, J.M., Wei, K., Wang, W., Palacios-Avila, P., Feng, C., Sajeed, S., Lütkenhaus, N., Lo, H.K.: Experimental quantum fingerprinting with weak coherent pulses. Nat. Commun. 6, 8735 (2015)

    Article  ADS  Google Scholar 

  20. Buhrman, H., Chandran, N., Fehr, S., Gelles, R., Goyal, V., Ostrovsky, R., Schaffner, C.: Position-based quantum cryptography: impossibility and constructions. SIAM J. Comput. 43(1), 150–178 (2014)

    Article  MathSciNet  Google Scholar 

  21. Braunstein, S.L., Pirandola, S.: Side-channel-free quantum key distribution. Phys. Rev. Lett. 108(13), 130502 (2012)

    Article  ADS  Google Scholar 

  22. Alghafis, A., Waseem, H.M., Khan, M., 2019. A hybrid cryptosystem for digital contents confidentiality based on rotation of quantum spin states. Physica a: statistical mechanics and its applications, p.123908

  23. Munir, N. and Khan, M., 2018. A generalization of algebraic expression for nonlinear component of symmetric key algorithms of any characteristic p. in 2018 international conference on applied and engineering mathematics (ICAEM) (pp. 48-52). IEEE

  24. Arzaki, M., Wahyudi, B.A., 2017. Extending Megrelishvili protocol for multi-party key agreement. In 2017 5th international conference on information and communication technology (ICoIC7) (pp. 1-8). IEEE

  25. Arzaki, M., Wahyudi, B.A., 2016. On the construction of secure public parameters for Megrelishvili protocol. In 2016 4th international conference on information and communication technology (ICoICT) (pp. 1-5). IEEE

  26. Wheeler, N.: Spin Matrices for Arbitrary Spin. Reed College Physics Department, Portland (2000)

    Google Scholar 

  27. Altunbulak, M., Klyachko, A.: The Pauli principle revisited. Commun. Math. Phys. 282(2), 287–322 (2008)

    Article  ADS  MathSciNet  Google Scholar 

  28. Waseem, H.M., Khan, M.: Information confidentiality using quantum spinning, rotation and finite state machine. Int. J. Theor. Phys. 57(11), 3584–3594 (2018)

    Article  Google Scholar 

  29. Branson, J.. 2013-04-22, Quantum physics, derive the expression for rotation operator (2013)

  30. Khan, M., Waseem, H.M.: A novel image encryption scheme based on quantum dynamical spinning and rotations. PloS One. 13(11), e0206460 (2018)

    Article  Google Scholar 

  31. Weber, A.G.: The USC-SIPI image database version 5. USC-SIPI Report. 315, 1–24 (1997)

    Google Scholar 

  32. Ali, K.M., Khan, M.: Application based construction and optimization of substitution boxes over 2D mixed chaotic maps. Int. J. Theor. Phys. 58(9), 3091–3117 (2019)

    Article  MathSciNet  Google Scholar 

  33. Ali, K.M., Khan, M.: A new construction of confusion component of block ciphers. Multimed. Tools Appl. 78(22), 32585–32604 (2019)

    Article  Google Scholar 

  34. Arshad, U., Khan, M., Shaukat, S., Amin, M. and Shah, T., 2019. An efficient image privacy scheme based on nonlinear chaotic system and linear canonical transformation. Physica a: statistical mechanics and its applications

  35. Khan, M., Shah, T.: An efficient chaotic image encryption scheme. Neural Comput. & Applic. 26(5), 1137–1148 (2015)

    Article  Google Scholar 

  36. Younas, I., Khan, M.: A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy. 20(12), 913 (2018)

    Article  ADS  Google Scholar 

  37. Khan, M. and Munir, N., 2019. A novel image encryption technique based on generalized advanced encryption standard based on field of any characteristic. Wireless personal communications, pp.1-19

  38. Khan, M. and Waseem, H.M., 2019. A novel digital contents privacy scheme based on Kramer’s arbitrary spin. International journal of theoretical physics, pp.1-24

  39. Batool, S.I. and Waseem, H.M., 2019. A novel image encryption scheme based on Arnold scrambling and Lucas series. Multimedia tools and applications, pp.1-27

  40. Waseem, H.M., Khan, M., Shah, T.: Image privacy scheme using quantum spinning and rotation. J. Electron. Imaging. 27(6), 063022 (2018)

    Article  Google Scholar 

  41. Arshad, U., Batool, S.I., Amin, M.: A novel image encryption scheme based on Walsh compressed quantum spinning chaotic Lorenz system. Int. J. Theor. Phys. 58(10), 3565–3588 (2019)

    Article  MathSciNet  Google Scholar 

  42. Waseem, H.M., Khan, M.: A new approach to digital content privacy using quantum spin and finite-state machine. Appl. Phys. B. 125(2), 27 (2019)

    Article  ADS  Google Scholar 

  43. Khan, M., Shah, T., Batool, S.I.: Texture analysis of chaotic coupled map lattices based image encryption algorithm. 3D Res. 5(3), 19 (2014)

    Article  Google Scholar 

  44. Khan, M., Masood, F., 2019. A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimedia Tools and Applications, pp.1-20

  45. Khan, M., Shah, T.: A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dynamics. 76(1), 377–382 (2014)

    Article  MathSciNet  Google Scholar 

  46. Khan, M., Shah, T., Batool, S.I.: A new implementation of chaotic S-boxes in CAPTCHA. SIViP. 10(2), 293–300 (2016)

    Article  Google Scholar 

  47. Khan, M., Asghar, Z.: A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S 8 permutation. Neural Comput. & Applic. 29(4), 993–999 (2018)

    Article  Google Scholar 

  48. Batool, S.I., Amin, M., Waseem, H.M.: Public key digital contents confidentiality scheme based on quantum spin and finite state automation. Phys. A: Statistic. Mechan. Appl. 537, 122677 (2020)

    Article  Google Scholar 

Download references

Acknowledgements

The first author acknowledges Ajman University for supporting the research, Internal Research Grant No: [DGSR Ref. 2020-IRG-HBS-01].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Majid Khan.

Ethics declarations

Conflict of Interest

It is declared that authors have no conflict regarding the publication of this article.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ismail, A.H., Waseem, H.M., Ishtiaq, M. et al. Quantum Spin Half Algebra and Generalized Megrelishvili Protocol for Confidentiality of Digital Images. Int J Theor Phys 60, 1720–1741 (2021). https://doi.org/10.1007/s10773-021-04794-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-021-04794-0

Keywords

Navigation