Paper
1 June 2023 QR code anti-counterfeiting technique with lattice-based cryptography
Shuting Lou, Wuqiang Shen, Guiquan Shen, Lei Cui, Fan Yang, Jiarui Deng, Shanxiang Lyu
Author Affiliations +
Proceedings Volume 12718, International Conference on Cyber Security, Artificial Intelligence, and Digital Economy (CSAIDE 2023); 1271808 (2023) https://doi.org/10.1117/12.2681559
Event: International Conference on Cyber Security, Artificial Intelligence, and Digital Economy (CSAIDE 2023), 2023, Nanjing, China
Abstract
QR code is widely used in many scenarios including online transactions, warehousing, manufacturing and authentication. However, in the era of continuous development of quantum technology, the traditional QR code encryption method has low security in front of quantum technology, and information is easy to be stolen and forged. In response to the above problems, we consider combining post-quantum cryptography with QR code. In this work, we propose a quantum-safe, anti-counterfeiting and tamper-proof QR code based on lattice-based cryptography. The proposed QR code technique features two advantages: (a) it can be easily deployed on mobile phone apps and the verification is computationally efficient; (b) it is safe under quantum attacks and impossible to be forged and imitated in plausible quantum future.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Shuting Lou, Wuqiang Shen, Guiquan Shen, Lei Cui, Fan Yang, Jiarui Deng, and Shanxiang Lyu "QR code anti-counterfeiting technique with lattice-based cryptography", Proc. SPIE 12718, International Conference on Cyber Security, Artificial Intelligence, and Digital Economy (CSAIDE 2023), 1271808 (1 June 2023); https://doi.org/10.1117/12.2681559
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Quantum encryption

Quantum cryptography

Quantum security

Quantum digital signatures

Information security

Quantum reading

Quantum computing

Back to Top