Quantum cryptography based on an algorithm for determining simultaneously all the mappings of a Boolean function

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 81
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorNagata, Kojiko
dc.contributor.authorWong, Renatako
dc.contributor.authorDiep, Do Ngocko
dc.contributor.authorNakamura, Tadaoko
dc.date.accessioned2023-04-16T01:00:10Z-
dc.date.available2023-04-16T01:00:10Z-
dc.date.created2023-03-21-
dc.date.created2023-03-21-
dc.date.issued2023-05-
dc.identifier.citationQUANTUM STUDIES-MATHEMATICS AND FOUNDATIONS, v.10, no.2, pp.279 - 291-
dc.identifier.issn2196-5609-
dc.identifier.urihttp://hdl.handle.net/10203/306286-
dc.description.abstractWe study a quantum cryptography based on an algorithm for determining simultaneously all the mappings of a Boolean function using an entangled state. The security of our cryptography is based on the Ekert 1991 protocol, which uses an entangled state. Eavesdropping destroys the entanglement. Alice selects a secret function from the number of possible function types. Bob's aim is then to determine the selected function (a key) without an eavesdropper learning it. In order for both Alice and Bob to be able to select the same function classically, in the worst case, Bob requires multiple queries to Alice. In the quantum case, however, Bob requires just a single query. By measuring the single entangled state, which is sent to him by Alice, Bob can obtain the function that Alice selected. This quantum key distribution method is faster compared to the multiple queries that would be required in the classical case.-
dc.languageEnglish-
dc.publisherSPRINGER-
dc.titleQuantum cryptography based on an algorithm for determining simultaneously all the mappings of a Boolean function-
dc.typeArticle-
dc.identifier.scopusid2-s2.0-85147754154-
dc.type.rimsART-
dc.citation.volume10-
dc.citation.issue2-
dc.citation.beginningpage279-
dc.citation.endingpage291-
dc.citation.publicationnameQUANTUM STUDIES-MATHEMATICS AND FOUNDATIONS-
dc.identifier.doi10.1007/s40509-023-00294-4-
dc.contributor.nonIdAuthorWong, Renata-
dc.contributor.nonIdAuthorDiep, Do Ngoc-
dc.contributor.nonIdAuthorNakamura, Tadao-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle; Early Access-
dc.subject.keywordAuthorQuantum cryptography-
dc.subject.keywordAuthorQuantum communication-
dc.subject.keywordAuthorQuantum computation-
dc.subject.keywordAuthorQuantum algorithms-
dc.subject.keywordAuthorBoolean algebra-
dc.subject.keywordPlusKEY DISTRIBUTION-
dc.subject.keywordPlusUNCONDITIONAL SECURITY-
Appears in Collection
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0