Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000. 10.1109/TQE.2020.DOI
This work was supported in part by the National Natural Science Foundation of China under Grant 62101197, in part by the China Postdoctoral Science Foundation under Grant 2021M691148.
Corresponding author: Xueming Tang (email: [email protected]).
Quantum-inspired Hash Function Based on Parity-dependent Quantum Walks with Memory (August 2023)
Abstract
In this paper, we develop a generic controlled alternate quantum walk model (called CQWM-P) by combining parity-dependent quantum walks with distinct arbitrary memory lengths and then construct a quantum-inspired hash function (called QHFM-P) based on this model. Numerical simulation shows that QHFM-P has near-ideal statistical performance and is on a par with the state-of-the-art hash functions based on discrete quantum walks in terms of sensitivity of hash value to message, diffusion and confusion properties, uniform distribution property, and collision resistance property. Stability test illustrates that the statistical properties of the proposed hash function are robust with respect to the coin parameters, and theoretical analysis indicates that QHFM-P has the same computational complexity as that of its peers.
Index Terms:
Controlled alternate quantum walks, quantum-inspired hash function, quantum walks with memory, statistical properties, stability analysis=-15pt
I Introduction
Cryptographic hash function acts as a key component of identification, message authentication, digital signatures, and pseudorandom number generation. From a security perspective, cryptographic hash functions can be divided into two broad categories: provably secure hash functions based on hard mathematical problems and dedicated hash functions based on ad-hoc constructions, especially iterative constructions of one-way compression functions. The former only satisfy computational security and are inefficient to be used in practice; the latter are efficiently computable, but the security of which is not built on a firm foundation.
To develop a secure and efficient hash function, more and more researchers have shown interests in hash functions based on quantum computing [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12], especially on discrete quantum walks [1, 2, 5, 6, 7, 8, 9, 10, 11, 12] (hereafter, simply DQW-based hash functions). The security of this kind of hash functions is based on quantum mechanics; more precisely, it is ensured by the theoretically infinite possibilities of the initial state and the irreversibility of modulo operation [7]. The output results of DQW-based hash functions are more attainable by classical simulation of the quantum walk process, where the final amplitudes can be calculated with linear overhead with respect to the number of steps. For this reason, a DQW-based hash function can be considered as a “quantum inspired” algorithm, where everything is calculated classically using some desired properties of a quantum system and its dynamics. In what follows, hash schemes constructed by simulating discrete quantum walks and then calculating hash values from the resulting probability distributions are called DQW-based hash functions or quantum inspired hash functions interchangeably.
Quantum inspired hash functions was first explored by Li et al. in [12], and further intensively discussed by Cao et al. in [10], Yang et al. in [5, 6, 7, 8, 11], and zhou et al. in [1]. Until Zhou et al.’s scheme (called QHFM) [1], all quantum inspired hash functions simply use quantum walks with different coin parameters, where only the coin operator is controlled by the message bit. QHFM is based on quantum walks with memory, where an additional changeable transform—the direction-determine operator is also controlled by the message bit. More recently, Hou et al. [2] has proposed a hash function QHFL based on lively quantum walks, where the shift operator contains a liveliness parameter, whose value (one out of two) is determined by the message bit. The good statistical performance of QHFM and QHFL suggests that combining quantum walks differing in component operators other than coin transform is a promising way to construct good hash functions.
Quantum walks with memory (QWM) [13, 14, 15, 16, 17, 18, 19, 20, 21, 22] are types of modified quantum walks where the next direction of the walking particle is governed by the direction-determine operator, which specifies how the latest path together with the coin state affects the movement direction of the particle; different QWM models have different direction-determine operators. Unlike usual quantum walks without memory [23] or lively quantum walks [2], where the changeable operator (the coin or shift operator) can be characterized by a single parameter, the direction-determine operator of QWM is highly flexible. It is influenced by two factors: the memory length and the movement rule, the latter can be an arbitrary relation between the movement direction and the recorded shifts of the walker, which cannot simply be dictated by a few parameters. Hence, QWM have great potential to be used to construct various quantum-inspired hash functions.
Here, we present an alternative QWM-based hash function QHFM-P, which is inspired by quantum walks with memory provided by parity of memory [15]. The proposed hash function is on a par with the state-of-the-art DQW-based hash functions in terms of sensitivity of hash value to message, diffusion and confusion properties, uniform distribution property, collision resistance property, and computational complexity. Furthermore, it can preserve near-ideal statistical performance when changing the values of its coin parameters, indicating that QHFM-P has nice stability with respect to different coin angles.
II Controlled quantum walk with memory depending on the parity of memory
One-dimensional quantum walks with -step memory depending on the parity of memory (QWM-P), or parity-dependent quantum walks with -step memory on the line [15], is a quantum system living in a Hilbert space spanned by orthogonal basis states , where is the coin state, (0 stands for left and 1 stands for right) records the shift of the walker steps before ( is the direction of the most recent step, and is the earliest direction that is memorized), and is the current position of the walker. If the walker moves on a cycle with nodes, then . The one-step evolution of QWM-P may be decomposed into three parts: the first is a coin operator on subspace , here is parameterized by an angle , i.e.,
(1) |
the second is the direction-determine transform on , whose action can be written as
(2) |
where equals 1 (respectively, 0) if the number of zeros in the memorized directions is even (respectively, odd); and the third is the shift operator on , whose action can be expressed as
(3) |
If the walker moves on a cycle with nodes, then the shift operator becomes .
A controlled one-dimensional quantum walks with memory depending on the parity of memory (CQWM-P) can be obtained by alternately applying QWM-P with different memory lengths (as well as different coin parameters). More precisely, CQWM-P evolves according to a -bit binary string : at the th time step, if (), then the walker performs QWM-P with step memory (denoted by QWM-P) and with coin parameter ; if , then the walker performs QWM-P with () step memory (denoted by QWM-P) and with coin parameter .
To enable QWM-P and QWM-P to be performed alternately, redundant qubits can be added to the walk process with less memory length, so that two walks live in the same Hilbert space. For instance, if , then redundant qubits are added to QWMP. In this case, the basis states of QWMP becomes , wherein the first qubits are invariant under the transforms of QWMP, and the transform becomes
(4) |
In this work ,we focus on CQWM-P with one- and two-step memory, whose evolution operator controlled by is the product of unitary transforms
(5) |
where is the one-step transform defined as
(6) |
In Eq. (6), and are coin operators parameterized by and , respectively; and are and identity operators, respectively; is the conditional shift operator controlled by the next direction , such a direction is determined by an unitary operator . If , then is the direction-determine transform of QW1M-P, i.e., ; and if , then is the direction-determine transform of QW2M-P, i.e., . By appending a redundant qubit to the state of QW1M-P and letting determines the next direction if the controlling bit equals 0, the walk process can switch freely between QW1M-P and QW2M-P.
III Hash Function Using Quantum Walks with One- and Two-step Memory on Cycles
The proposed hash function is constructed by numerically simulating CQWM-P with one- and two-step memory on cycles under the control of the input message, and then calculating the hash value from the resulting probability distribution of this walk.
Specifically, our hashing algorithm is parameterized by three positive integers and three angles , where specifies the total number of nodes in the cycle that the walker moves along, is the number of hash bits that are contributed by each node, is the number of digits in the probability value (associated with each node) that are used to calculate the hash result, (respectively, ) is the coin parameter of QW1M-P (respectively, QW2M-P), and is the parameter of the initial state of the walker. Given the input message , the -bit hash value is calculated as follows.
-
1)
Initialize the walker in the state ;
-
2)
Apply to and generate the resulting probability distribution , where is the probability that the walker locates at node when the walk is finished.
-
3)
The hash value of is a sequence of blocks , where each block is the -bit binary representation of ( denotes the floor of a number), and denotes the concatenation of and .
IV Statistical Performance Analysis
The proposed scheme is a kind of dedicated hash function, the security of which is hard to prove, and it is commonly evaluated by means of statistical analysis. To facilitate comparison and discussion, we consider two typical instances QHFM-P-264 and QHFM-P-296 of the proposed scheme, where QHFM-P- produces -bit hash values and will be compared with the existing DQW-based hash functions with -bit output length. The values of , and for the two instances are the same, which are taken to be , and , respectively; the only distinction between QHFM-P-296 and QHFM-P-264 lies in the value of , which are taken to be 37 for the 296-bit output length and 33 for the 26-bit output length.
Our statistical tests considers four kinds of properties: sensitivity of hash value to message, diffusion and confusion properties, uniform distribution property, and collision resistance property, the latter three are assessed by analyzing the same collection of hash values, whose input messages come from the public arXiv dataset (see https://www.kaggle.com/Cornell-University/arxiv).
IV-A Sensitivity of Hash Value to Message
Let be an original message and () the slightly modified result of , the sensitivity of hash value to message is assessed by comparing the hash value of with the hash result of . Specifically, the original and modified messages are obtained under the following four conditions.
-
Condition 0: Randomly select a record from the dataset, take the texts of the abstract field within this record as ;
-
Condition 1: Invert a bit of at a random position and then get the modified message ;
-
Condition 2: Insert a random bit into at a random position and then obtain ;
-
Condition 3: Delete a bit from at a random position and then obtain .
Corresponding to the above conditions, we list, as an example, four hash values in hexadecimal format produced by QWM-P-296 as follows.
-
“D8 CD B4 F1 A9 A8 E4 F8 60 F7 6F 74 B8 A7 C9 60 E8 7F 53 7F 10 F9 B0 1D 9D D6 37 A5 F1 8E F3 D5 71 5A 28 7B B1”;
-
“EB C6 F0 5F 74 5B B2 14 72 5F B7 29 CF 7F C6 96 E8 8B 87 8C 9A E9 50 51 8A D5 5D 62 0E ED F8 7B CE 15 D1 7F A7”;
-
“90 7E 3E 3F 8A D5 D5 6B 70 41 BD F9 37 B2 55 22 2B F1 76 C0 D3 09 E4 6C B5 88 CA C8 07 6D 7B 3F 22 6A 28 BF 21”;
-
“65 19 6A A5 EE AC 65 A9 52 FA E5 30 B7 22 56 67 51 F2 8F 8E CD B0 6E 6F 04 25 9F 2B 8D E0 97 CE 49 82 66 7A A8”.
The plots of , , , and in binary format are shown in Fig. IV-A, where each asterisk (*) in the th subgraph () marks a different bit between and . It indicates that a slight modification in the input message can lead to a significant change in the hash result, and the positions of changed bits are evenly distributed over the entire interval [1,296] of position numbers. A similar result can be obtained using QHFM-P with other output lengths, thus the output result of the proposed hash scheme is highly sensitive to its input message. \Figure[ht](topskip=0pt, botskip=0pt, midskip=0pt)fig1.epsPlots of the hash values produced by QHFM-P-296 under the four conditions, where stands for Condition ().
IV-B Diffusion and Confusion Properties
To test the diffusion and confusion properties of the proposed hash function, the statistical experiment getting and are independently repeated times, then the hash values of those pairs of messages are analyzed. Let () be the Hamming distance between and obtained in the th experiment, the diffusion and confusion properties are assessed based on the following four indicators:
-
1)
mean changed bit number ;
-
2)
mean changed probability ;
-
3)
standard deviation of the changed bit number ;
-
4)
standard deviation of the changed probability .
The ideal value of is , and smaller and are more desirable. Following Ref. [1], we take and use as a composite indicator for the diffusion and confusion properties. The test results of the diffusion and confusion properties for the proposed hash functions are presented in Table I. For comparison, the reported results for the existing DQW-based hash schemes with 296- or 264-bit output length are also listed in Table I, where Yang21-296 is the second instance (with ) in Ref. [5].
Hash Instances or Schemes | |||||
QHFM-P-296 | 147.9320 | 49.9770 | 8.5517 | 2.8891 | 1.4560 |
QHFM-P-264 | 132.1286 | 50.0487 | 8.1938 | 3.1037 | 1.5762 |
QHFL-296 [2] | 148.1900 | 50.0600 | 8.5500 | 2.8900 | 1.4750 |
QHFL-264 [2] | 132.0300 | 50.0100 | 8.1100 | 3.0700 | 1.5400 |
QHFM-296 [1] | 147.9101 | 49.9696 | 8.5997 | 2.9053 | 1.4679 |
QHFM-264 [1] | 131.8667 | 49.9495 | 8.1378 | 3.0825 | 1.5665 |
Yang21-296 [5] | 147.8640 | 49.9541 | 8.6141 | 2.9102 | 1.4781 |
Yang19-264 [6] | 131.6803 | 49.8789 | 8.8877 | 3.3666 | 1.7439 |
Yang18-264 [7] | 132.1108 | 50.0420 | 8.0405 | 3.0457 | 1.5439 |
It can be seen that the test results for QHFM-P are very close to those for its peers, thus the diffusion and confusion properties of the proposed scheme are on a par with those of existing schemes with output length 296 or 264.
IV-C Uniform Distribution Analysis
The uniform distribution property of the proposed hash function is assessed by analyzing the pairs of hash values used in the diffusion and confusion test in a different way. Let () be the number of experiments in which the th bit of is different from the th bit of , then the uniform distribution analysis considers the following two indicators:
-
1)
mean number of experiments with flipped hash bit over bit-positions ;
-
2)
standard deviation of the number of experiments with flipped bit .
The ideal value of is , and smaller suggests better uniform distribution property. As shown in Table II, the values of and for the two instances of QHFM-P are close to the corresponding values for the recent DQW-based hash functions111The values of and for QHFL are both not available, so we only compare QHFM with the remaining four recent schemes. with the same output length. Since the reported value of (which is equivalent to theoretically, see [1]) for Yang21-296 is 4995.41, the value of for Yang21-296 may be considered between (or close to) 1.90 and 4.59, so the value of QHFM-P-296 is on the same level as that of Yang21-296.
Hash Instances or Schemes | |||
QHFM-P-296 | 4997.70 | 2.30 | 51.9772 |
QHFM-P-264 | 5004.87 | 4.87 | 49.8667 |
QHFM-296 [1] | 4996.96 | 3.04 | 48.4334 |
QHFM-264 [1] | 4994.95 | 5.05 | 48.9253 |
Yang21-296 [5] | 4998.10 | 1.90 | N/A |
Yang19-264 [6] | 4996.60 | 3.40 | N/A |
Yang18-264 [7] | 5003.90 | 3.90 | N/A |
To provide an intuitive description, we plot the number of experiments with flipped hash bit on every bit position of QHFM-P-296 in Fig. 1, where the number of experiments with flipped hash bit on every bit-position is very close to , suggesting that the proposed scheme has good uniform distribution property.

IV-D Collision Resistance
The collision resistance test is carried out by counting the number of experiments in which the hash values of the original and modified messages collide at a certain number of bytes, and then comparing the counting result with its theoretical value.
For ease of exposition, we use to denote the original and modified messages obtained under Condition 0 and Condition 1 in the th experiment, to denote the hash values of , and to denote the number of bytes that a hash result produced by the proposed hash function can be divided into222If is not divisible by 8, then add a prefix of zeros to the hash value.. The collision resistance test counts the numbers of experiments in which and have identical bytes ( is also called the number of hits). For instance, if the first, third, and fourth bytes of are respectively the same as the first, third, and fourth bytes of in the 25th experiment , then makes an incremental contribution of 1 to .
The theoretical value of is calculated using the binomial distribution formula
(7) |
where denotes rounding a real number to its nearest integer, and is the theoretical probability that hits occur in . Substituting and N=10000 into Eq. (7), one can get for hash functions with 296-bit output length. Similarly, the values of with for 264-bit hash functions are 8788, 1137, 71, and 3, respectively. For both 296- and 264-bit hash functions, the value of with is 0.
Let be the experimental probability that and have identical bytes, the collision resistance property of the proposed hash function can be assessed by the Kullback-Leibler divergence (referred to as KL divergence for short) of from
(8) |
The smaller the value of is, the closer is to . Note that there exist some values of such that and , hence we cannot use to indicate the distance between and .
In addition to the KL divergence, the mean of the absolute difference per byte between and over independent experiment can also be used to assess the collision resistance property. Let and be the decimal value of the th byte of and , respectively; the mean of the absolute difference per byte is given by
(9) |
and the theoretical value of is [5].
The test results of the collision resistance property for the proposed hash function are shown in Table III, where denotes the number of experiments in which at least 4 hits occur in . The values of and for the two instances of QHFM-P is smaller than or close to those for the existing hash instances with the same output length excepting QHFL, meaning that the collision resistance property of QHFM-P is better than or on a par with that of its peers excepting QHFL. For QHFL-296, the experimental value of is slightly smaller than that for QHFM-P-296, while the value of is greater than that for QHFM-P-296; in similar, the value of for QHFL-264 is smaller than that for QHFM-P-264, while the value of for QHFL-264 is slightly greater than that for QHFM-P-264. Taking into account the fluctuation of the experimental results, the collision resistance property of QHFM-P can be regarded as being on the same level as that of QHFL.
Hash Instances or Schemes | ||||
QHFM-P-296 | 0.0001461 | 85.30 | 0.03 | |
QHFM-P-264 | 0.0001513 | 85.40 | 0.07 | |
QHFL-296[2] | 0.0000998 | N/A | 0.15 | |
QHFL-264[2] | 0.0002427 | N/A | 0.02 | |
QHFM-296[1] | 0.0003610 | 85.36 | 0.03 | |
QHFM-264[1] | 0.0001457 | 85.27 | 0.06 | |
Yang21-296 [5] | 0.0086163 | 85.22 | 0.11 | |
Yang19-264 [6] | 0.0056472 | 89.76 | 4.43 | |
Yang18-264 [7] | 0.0009686 | 83.64 | 1.69 |
V Stability with respect to coin parameters
Recall from section III that the proposed hash function is parameterized by three integers and three angles, among which the two coin angles are crucial components of the underlying controlled alternate quantum walks and may affect the four statistical properties considered in section IV.
To explore how robust the hashing properties of QHFM-P are with respect to different coin angles, we uniformly divide into subintervals, take the endpoints (except 0 and ) of those subintervals as the candidate values of each coin parameter, and then conduct experiments for each pair of values. During the experiments for each angle pair, primary indicators of each type of statistical property are calculated. Specifically, we take together with , together with , and together with to be the primary indicators of the diffusion and confusion properties, the uniform distribution property, and the collision resistance property, respectively. Following Ref. [2], we take the mean Jensen-Shannon divergence [24] (over random experiments) between the resulting probability distributions corresponding to the original and modified messages to be the quantitative indicator of the sensitivity of hash value to message. Suppose, in an experiment, the probability distribution produced by the underlying controlled alternate quantum walks controlled by () is , the Jensen-Shannon divergence (referred to as JS divergence for short) between and is
(10) |
where , and is the KL divergence of from (see Eq. (8)).
The results of the stability test for the four kinds of properties of QHFM-P-296 are illustrated in Figs. 2 to 5, where () in Fig. 2 denotes the average value of over experiments. One may notice that the shape of Fig. 3(a) is identical to that of Fig. 4(a), this is because is directly proportional to when the pairs of original and modified messages used in the diffusion and confusion test are re-used in the uniform distribution test.
It can be seen from Fig. 2(a) that the average JS divergences between and for different values of coin parameters fall within a narrow range, indicating that the value of is quite stable with respect to and . Similarly, the maximum and minimum values of (or ) are very close to each other, suggesting that the sensitivity of hash value to message of the proposed hash function is stable with respect to the coin parameters. In Fig. 3, the mean changed probability fluctuates around ; meanwhile, the value of the standard deviation is small and does not vary significantly for different values of and . Hence, the diffusion and confusion properties of QHFM-P is robust with regard to different coin angles. Likewise, the experimental values of for different coin angles are close to the theoretical value , and the results of , , and displayed in Figs. 4 and 5 are relatively small, which suggests that the uniform distribution property and the collision resistance property of the proposed hash function are also stable with respect to coin parameters.




VI Time and Space Complexity
Similar to existing DQW-based hash schemes, the proposed hash algorithm can be efficiently computed using classical computer. Thus, it is more appropriate to consider QHFM-P as a classical algorithm and to concentrate on classical complexity.
By rewriting the 4-term basis state of QWHF-P in as a 2-term basis state in , where is the 8-dimensional Hilbert space, the quantum state of the walker performing parity-dependent quantum walks with one- and two-step memory on a cycle of length after time steps can be expressed as
(11) |
The results of sequentially performing the coin operator, the direction-determine transform, and the shift operator of QW2M-P on the computational states are tabularized in Table 4. For ease of notation, we denote by and write shortly as . In the first three columns of Table IV, the second terms of the basis states and the transformed results are written in binary format, for the binary representation of indicates the values of , , and in a natural way.
Combining Eq. (11) with the first and last columns of Table IV, one can obtain the relation between and (hereafter, simply and , respectively) after one step of QW2M-P as follows:
(12) | |||
Relation (12) shows that the eight amplitudes of being at position at time can be calculated from the amplitudes of being at positions at time using 16 multiplications and 8 additions, meaning that the amplitudes of being at locations can be calculated using basic arithmetic operations. Similarly, one can obtain the relation between and for QW1M-P, where the amplitudes can also be updated using basic operations at each time step.
If one wants to obtain an -bit hash value ( is a multiple of ) of an -bit message, then the walker moves steps on a cycle with nodes, here is constant with respect to . The assignment of the initial amplitudes can be carried out with time and memory space, the values of can be calculated from using basic operations with space, and the hash value can be computed from using multiplications and modulo operations with space. As a result, the time and space complexity of QHFM- are and , respectively, which are the same as those of the state-of-the-art hash functions [1, 2, 5, 6, 7] based on discrete quantum walks.
VII Conclusion
In this article, a new QWM-based hash function QHFM-P is proposed and analyzed. Similar to the existing QWM-based hash function [1], the proposed scheme is also constructed by using quantum walks with one- and two-step memory; the major distinction lies in that the underlying walks with two-step memory of QHFM and QHFM-P are different extensions of Mc Gettrick’s QW1M model [13]. The proposed hash function has the same time and space complexity as those of QHFM, and it also has near-ideal statistical properties. It is noteworthy that the four kinds of statistical properties of QHFM-P are quite stable with respect to the coin angles, which suggests the robustness of the hashing properties of the proposed scheme.
In the future, we will try to identify the region of stability in the plane of coin and other parameters, examine the stability with respect to various direction-determine transforms, and establish the conditions for constructing good QWM-based hash functions.
References
- [1] Q. Zhou and S. F. Lu, “Hash function based on controlled alternate quantum walks with memory,” IEEE Transactions on Quantum Engineering, vol. 3, art. no. 3100310, Nov. 2021, doi: 10.1109/TQE.2021.3130256.
- [2] P. Hou, T. Shang, Y. Zhang, Y. Tang, and J. Liu, “Quantum hash function based on controlled alternate lively quantum walks,” Sci. Rep., vol. 13, no. 1, art. no. 5887. Apr. 2023, doi: 10.1038/s41598-023-33119-w.
- [3] W. M. Shi, S. Wang, T. Pan, Y. G. Yang, and Y. H. Zhou, “Continuous-time quantum hash function based on one-dimensional cycle lattice,” Mod. Phys. Lett. B, vol. 36, no. 19, art. no. 2150241. 2022, doi: 10.1142/S0217984921502419.
- [4] J. J. Shi, Y. h. Lu, Y. y. Feng, D. Huang, X. P. Lou, Q. Li, and R. H. Shi, “A quantum hash function with grouped coarse-grained boson sampling,” Quantum Inf. Process., vol. 21, no. 2, art. no. 73. Jan. 2022, doi: 10.1007/s11128-022-03416-w.
- [5] Y. G. Yang, J. R. Dong, Y. L. Yang, Y. H. Zhou, and W. M. Shi, “Usefulness of decoherence in quantum-walk-based hash function,” Int. J. Theor. Phys., vol. 60, pp. 1025–1037, Jan. 2021, doi: 10.1007/s10773-021-04724-0.
- [6] Y. G. Yang, J. L. Bi, D. Li, Y. H. Zhou, and W. M. Shi, “Hash function based on quantum walks,” Int. J. Theor. Phys., vol. 58, no. 6, pp. 1861–1873, Mar. 2019, doi: 10.1007/s10773-019-04081-z.
- [7] Y. G. Yang, J. L. Bi, X. B. Chen, Z. Yuan, Y. H. Zhou, and W. M. Shi, “Simple hash function using discrete-time quantum walks,” Quantum Inf. Process., vol. 17, no. 8, art. no. 189, Jun. 2018, doi: 10.1007/s11128-018-1954-2.
- [8] Y. G. Yang, Y. C. Zhang, G. Xu, X. B. Chen, Y. H. Zhou, and W. M. Shi, “Improving the efficiency of quantum Hash function by dense coding of coin operators in discrete-time quantum walk,” Sci. China-Phys. Mech. Astron., vol. 61, no. 3, art. no. 030312, Jan. 2018, doi: 10.1007/s11433-017-9132-y.
- [9] D. Li, Y. G. Yang, J. L. Bi, J. B. Yuan, and J. Xu, “Controlled alternate quantum walks based quantum hash function,” Sci. Rep., vol. 8, no. 1, art. no. 225, Jan. 2018, doi: 10.1038/s41598-017-18566-6.
- [10] W. F. Cao, Y. C. Zhang, Y. G. Yang, D. Li, Y. H. Zhou, and W. M. Shi, “Constructing quantum Hash functions based on quantum walks on Johnson graphs,” Quantum Inf. Process., vol. 17, no. 7, art. no. 156, May 2018, doi: 10.1007/s11128-018-1923-9.
- [11] Y. G. Yang, P. Xu, R. Yang, Y. H. Zhou, and W. M. Shi, “Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption,” Sci. Rep., vol. 6, art. no. 19788, Jan. 2016, doi: 10.1038/srep19788.
- [12] D. Li, J. Zhang, F. Z. Guo, W. Huang, Q. Y. Wen, and H. Chen, “Discrete-time interacting quantum walks and quantum Hash schemes,” Quantum Inf. Process., vol. 12, no. 3, pp. 1501–1513, Mar. 2013, doi: 10.1007/s11128-012-0421-8.
- [13] M. Mc Gettrick, “One dimensional quantum walks with memory,” Quantum Inf. Comput., vol. 10, no. 5, pp. 509–524, May 2010, doi: 10.5555/2011362.2011371.
- [14] Q. Zhou and S. F. Lu, “One-dimensional quantum walks with two-step memory,” Quantum Inf. Process., vol. 18, no. 12, art. no. 359, Oct. 2019, doi: 10.1007/s11128-019-2475-3.
- [15] D. Li, M. Mc Gettrick, Y. G. Yang, J. Xu, and Y. Wang, “Quantum walks with memory provided by parity of memory,” Int. J. Theor. Phys., vol. 59, no. 6, pp. 1934–1943, Jun. 2020, doi: 10.1007/s10773-020-04466-5.
- [16] D. Li, Y. Liu, Y. G. Yang, J. Xu, and J. B. Yuan, “Szegedy quantum walks with memory on regular graphs,” Quantum Inf. Process., vol. 19, art. no. 32. 2020, doi: 10.1007/s11128-019-2534-9.
- [17] W. Dai, J. Yuan, and D. Li, “Discrete-Time Quantum walk with memory on the cayley graph of the dihedral group,” Int. J. Theor. Phys., vol. 59, no. 1, pp. 10–28, Jan. 2020, doi: 10.1007/s10773-019-04257-7.
- [18] W. J. Dai, J. B. Yuan, and D. Li, “Discrete-time quantum walk on the Cayley graph of the dihedral group,” Quantum Inf. Process., vol. 17, pp. 1–21. 2018, doi: 10.1007/s11128-018-2101-9.
- [19] G. D. Molfetta, D. O. Soares-Pinto, and S. M. Duarte Queiros, “Elephant quantum walk,” Phys. Rev. A, vol. 97, no. 6, art. no. 062112. Jun. 2018, doi: 10.1103/PhysRevA.97.062112.
- [20] D. Li, M. Mc Gettrick, F. Gao, J. Xu, and Q. Y. Wen, “Generic quantum walks with memory on regular graphs,” Phys. Rev. A, vol. 93, no. 4, art. no. 042323, Apr. 2016, doi: 10.1103/PhysRevA.93.042323.
- [21] M. Mc Gettrick, and J. A. Miszczak, “Quantum walks with memory on cycles,” Phys. A, vol. 399, pp. 163–170, Apr. 2014, doi: 10.1016/j.physa.2014.01.002.
- [22] N. Konno, and T. Machida, “Limit theorems for quantum walks with memory,” Quantum Inf. Comput., vol. 10, no. 11, pp. 1004–1017, Nov. 2010.
- [23] A. Ambainis, E. Bach, A. Nayak, A. Vishwanath, and J. Watrous, “One-dimensional quantum walks,” presented at the Annual ACM Symposium on Theory of Computing, pp. 37–49, Jul. 2001, doi: 10.1145/380752.380757.
- [24] B. Fuglede, and F. Topsøe, “Jensen-Shannon divergence and Hilbert space embedding,” presented at International symposium on Information theory, 2004. ISIT 2004. Proceedings, Jun. 2004, doi: 10.1109/ISIT.2004.1365067