Continuous-Variable Quantum Computing and its Applications to Cryptography

Cited 4 time in webofscience Cited 1 time in scopus
  • Hit : 472
  • Download : 212
We propose a quantum cryptography based on an algorithm for determining a function using continuous-variable entangled states. The security of our cryptography is based on the Ekert 1991 protocol, which uses an entangled state. Eavesdropping destroys the entangled state. Alice selects a secret function from the very large number of possible function types. Bob's aim is to determine the selected function (a key) without an eavesdropper learning it. In order for both Alice and Bob to be able to select the same function classically, in the worst case Bob requires a very large number of queries to Alice. In the quantum case however, Bob requires just a single query. By measuring the single entangled state, which is sent to him by Alice, Bob can obtain the function that Alice has selected. This quantum key distribution method is faster than the very large number of classical queries that would be required in the classical case.
Publisher
SPRINGER/PLENUM PUBLISHERS
Issue Date
2020-10
Language
English
Article Type
Article
Citation

INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, v.59, no.1, pp.3184 - 3188

ISSN
0020-7748
DOI
10.1007/s10773-020-04571-5
URI
http://hdl.handle.net/10203/277196
Appears in Collection
RIMS Journal Papers
Files in This Item
000561728700002.pdf(210.02 kB)Download
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 4 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0