Limar I. The cryptographic protection of the electronic voting system with using of quantum cryptography protocols

Українська версія

Thesis for the degree of Candidate of Sciences (CSc)

State registration number

0418U002918

Applicant for

Specialization

  • 05.13.21 - Системи захисту інформації

04-07-2018

Specialized Academic Board

Д 41.816.02

O.S. Popov Odessa National Academy of Telecommunications

Essay

The object of research is the process of information security in the electronic voting system by means of quantum cryptography. Subject of research - methods and ways of increasing the safety of cryptographic protection of electronic voting systems using quantum cryptography techniques. Methods of research. The research was carried out using mathematical methods of non-relativistic quantum mechanics, quantum information theory, quantum cryptography, mathematical methods: methods of linear algebra and others, methods of classical cryptography: gamma, reversible transformations. Theoretical and practical results: for the first time a new protocol of quantum secret sharing using qubits was developed, which can be implemented on a modern technological basis; Unlike earlier analogues, the protocol does not require the use of large volumes of quantum memory; For the first time a new protocol of quantum secret sharing using qutrits was developed, which provides increased information capacity compared to schemes based on qubits; this protocol is oriented on a promising technological base; unlike the earlier known also does not require the use of large volumes of quantum memory; the protocol for cryptographic protection of the electronic voting system was developed for the first time with the common use of quantum bit commitment protocol and quantum secret sharing protocol, which differs from known circuits for protecting electronic voting systems using of a quantum bit commitment primitive, which ensures that information is concealed till the end of voting without the possibility of changing it by voter and stability protocol for attacks using quantum algorithms; the classification of attacks on a quantum cryptosystem is improved, which, unlike the earlier ones, takes into account some relatively new types of attacks, mainly those relating to quantum hacking; received a further development of a method of protection against the leakage of confidential data of quantum cryptography protocols based on the multiplication of data blocks on triple random inverse matrices and differs from the known absence of the need to use encryption keys, using triple matrices instead of binary and expressions for calculating the length of a block; received a further development of a method of protection against the leakage of confidential data of quantum cryptography protocols based on triple gamma data blocks and differs from the known lack of need to use encryption keys, using triple gamut instead of binary and expression to calculate block length.

Files

Similar theses