Abstract
Most of the enciphering structures are based on the transformation of mediums by describing the strict criteria. The presented article is based on Megrelishvili’s design and quantum spin states structure to offer privacy to digital contents. We have replicated the pixels of the image with the spin half states sequence for definite phase distributed with Megrelishvili protocol to create confusion in the anticipated mechanism. The choice of the offered work rotates around the improvement of a cryptosystem based on the notion of spin half algebra and Megrelishvili protocol. Moreover, we have tested the anticipated information confidentiality scheme by utilizing security analyses.
Similar content being viewed by others
References
Khan, M., Hussain, I., Jamal, S.S., Amin, M.: A privacy scheme for digital images based on quantum particles. Int. J. Theor. Phys. 58(12), 4293–4310 (2019)
Waqas, U.A., Khan, M., Batool, S.I., 2019. A new watermarking scheme based on Daubechies wavelet and chaotic map for quick response code images. Multimedia tools and applications, pp.1-24
Belovs, A., Brassard, G., Hoyer, P., Kaplan, M., Laplante, S., Salvail, L., 2017. Provably secure key establishment against quantum adversaries. arXiv preprint arXiv:1704.08182
Yu, N., Lai, C.Y. and Zhou, L., 2019. Protocols for packet quantum network intercommunication. arXiv preprint arXiv:1903.10685
Faugere, J.C., Horan, K., Kahrobaei, D., Kaplan, M., Kashefi, E. and Perret, L., 2017. Fast quantum algorithm for solving multivariate quadratic equations. arXiv preprint arXiv:1712.07211
Unruh, D.: Quantum proofs of knowledge. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 135–152. Springer, Berlin (2012)
Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Breaking symmetric cryptosystems using quantum period finding. In: Annual International Cryptology Conference, pp. 207–237. Springer, Berlin (2016)
Gagliardoni, T., Hülsing, A., Schaffner, C.: Semantic security and indistinguishability in the quantum world. In: Annual International Cryptology Conference, pp. 60–89. Springer, Berlin (2016, August)
Boneh, D., Dagdelen, Ö., Fischlin, M., Lehmann, A., Schaffner, C., Zhandry, M.: Random oracles in a quantum world. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 41–69. Springer, Berlin (2011)
Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560(12), 7–11 (2014)
Boneh, D.: Twenty years of attacks on the RSA cryptosystem. Notices of the AMS. 46(2), 203–213 (1999)
Khan, M., Masood, F., Alghafis, A., 2019. Secure image encryption scheme based on fractals key with Fibonacci series and discrete dynamical system. Neural Computing and Applications, pp.1-21
Khan, M., Masood, F., Alghafis, A., Amin, M., Batool Naqvi, S.I.: A novel image encryption technique using hybrid method of discrete dynamical chaotic maps and Brownian motion. PLoS One. 14(12), e0225031 (2019)
Fick, A.: V. On liquid diffusion. London Edinburgh Dublin Philos. Mag. J. Sci. 10(63), 30–39 (1855)
Kashefi, E., Music, L. and Wallden, P., 2017. The quantum cut-and-choose technique and quantum two-party computation. arXiv preprint arXiv:1703.03754
Lydersen, L., Wiechers, C., Wittmann, C., Elser, D., Skaar, J., Makarov, V.: Hacking commercial quantum cryptography systems by tailored bright illumination. Nature Photonics. 4(10), 686 (2010)
Boneh, D., Zhandry, M.: Secure signatures and chosen ciphertext security in a quantum computing world. In: Annual Cryptology Conference, pp. 361–379. Springer, Berlin (2013, August)
Gheorghiu, A., Kapourniotis, T., Kashefi, E.: Verification of quantum computation: an overview of existing approaches. Theory Comput. Syst. 63(4), 715–808 (2019)
Xu, F., Arrazola, J.M., Wei, K., Wang, W., Palacios-Avila, P., Feng, C., Sajeed, S., Lütkenhaus, N., Lo, H.K.: Experimental quantum fingerprinting with weak coherent pulses. Nat. Commun. 6, 8735 (2015)
Buhrman, H., Chandran, N., Fehr, S., Gelles, R., Goyal, V., Ostrovsky, R., Schaffner, C.: Position-based quantum cryptography: impossibility and constructions. SIAM J. Comput. 43(1), 150–178 (2014)
Braunstein, S.L., Pirandola, S.: Side-channel-free quantum key distribution. Phys. Rev. Lett. 108(13), 130502 (2012)
Alghafis, A., Waseem, H.M., Khan, M., 2019. A hybrid cryptosystem for digital contents confidentiality based on rotation of quantum spin states. Physica a: statistical mechanics and its applications, p.123908
Munir, N. and Khan, M., 2018. A generalization of algebraic expression for nonlinear component of symmetric key algorithms of any characteristic p. in 2018 international conference on applied and engineering mathematics (ICAEM) (pp. 48-52). IEEE
Arzaki, M., Wahyudi, B.A., 2017. Extending Megrelishvili protocol for multi-party key agreement. In 2017 5th international conference on information and communication technology (ICoIC7) (pp. 1-8). IEEE
Arzaki, M., Wahyudi, B.A., 2016. On the construction of secure public parameters for Megrelishvili protocol. In 2016 4th international conference on information and communication technology (ICoICT) (pp. 1-5). IEEE
Wheeler, N.: Spin Matrices for Arbitrary Spin. Reed College Physics Department, Portland (2000)
Altunbulak, M., Klyachko, A.: The Pauli principle revisited. Commun. Math. Phys. 282(2), 287–322 (2008)
Waseem, H.M., Khan, M.: Information confidentiality using quantum spinning, rotation and finite state machine. Int. J. Theor. Phys. 57(11), 3584–3594 (2018)
Branson, J.. 2013-04-22, Quantum physics, derive the expression for rotation operator (2013)
Khan, M., Waseem, H.M.: A novel image encryption scheme based on quantum dynamical spinning and rotations. PloS One. 13(11), e0206460 (2018)
Weber, A.G.: The USC-SIPI image database version 5. USC-SIPI Report. 315, 1–24 (1997)
Ali, K.M., Khan, M.: Application based construction and optimization of substitution boxes over 2D mixed chaotic maps. Int. J. Theor. Phys. 58(9), 3091–3117 (2019)
Ali, K.M., Khan, M.: A new construction of confusion component of block ciphers. Multimed. Tools Appl. 78(22), 32585–32604 (2019)
Arshad, U., Khan, M., Shaukat, S., Amin, M. and Shah, T., 2019. An efficient image privacy scheme based on nonlinear chaotic system and linear canonical transformation. Physica a: statistical mechanics and its applications
Khan, M., Shah, T.: An efficient chaotic image encryption scheme. Neural Comput. & Applic. 26(5), 1137–1148 (2015)
Younas, I., Khan, M.: A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy. 20(12), 913 (2018)
Khan, M. and Munir, N., 2019. A novel image encryption technique based on generalized advanced encryption standard based on field of any characteristic. Wireless personal communications, pp.1-19
Khan, M. and Waseem, H.M., 2019. A novel digital contents privacy scheme based on Kramer’s arbitrary spin. International journal of theoretical physics, pp.1-24
Batool, S.I. and Waseem, H.M., 2019. A novel image encryption scheme based on Arnold scrambling and Lucas series. Multimedia tools and applications, pp.1-27
Waseem, H.M., Khan, M., Shah, T.: Image privacy scheme using quantum spinning and rotation. J. Electron. Imaging. 27(6), 063022 (2018)
Arshad, U., Batool, S.I., Amin, M.: A novel image encryption scheme based on Walsh compressed quantum spinning chaotic Lorenz system. Int. J. Theor. Phys. 58(10), 3565–3588 (2019)
Waseem, H.M., Khan, M.: A new approach to digital content privacy using quantum spin and finite-state machine. Appl. Phys. B. 125(2), 27 (2019)
Khan, M., Shah, T., Batool, S.I.: Texture analysis of chaotic coupled map lattices based image encryption algorithm. 3D Res. 5(3), 19 (2014)
Khan, M., Masood, F., 2019. A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimedia Tools and Applications, pp.1-20
Khan, M., Shah, T.: A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dynamics. 76(1), 377–382 (2014)
Khan, M., Shah, T., Batool, S.I.: A new implementation of chaotic S-boxes in CAPTCHA. SIViP. 10(2), 293–300 (2016)
Khan, M., Asghar, Z.: A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S 8 permutation. Neural Comput. & Applic. 29(4), 993–999 (2018)
Batool, S.I., Amin, M., Waseem, H.M.: Public key digital contents confidentiality scheme based on quantum spin and finite state automation. Phys. A: Statistic. Mechan. Appl. 537, 122677 (2020)
Acknowledgements
The first author acknowledges Ajman University for supporting the research, Internal Research Grant No: [DGSR Ref. 2020-IRG-HBS-01].
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
It is declared that authors have no conflict regarding the publication of this article.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ismail, A.H., Waseem, H.M., Ishtiaq, M. et al. Quantum Spin Half Algebra and Generalized Megrelishvili Protocol for Confidentiality of Digital Images. Int J Theor Phys 60, 1720–1741 (2021). https://doi.org/10.1007/s10773-021-04794-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-021-04794-0