Continuous-Variable Quantum Computing and its Applications to Cryptography

Do Ngoc Diep, Koji Nagata*, Renata Wong

*Corresponding author for this work

Research output: Contribution to journalJournal Article peer-review

7 Scopus citations

Abstract

We propose a quantum cryptography based on an algorithm for determining a function using continuous-variable entangled states. The security of our cryptography is based on the Ekert 1991 protocol, which uses an entangled state. Eavesdropping destroys the entangled state. Alice selects a secret function from the very large number of possible function types. Bob’s aim is to determine the selected function (a key) without an eavesdropper learning it. In order for both Alice and Bob to be able to select the same function classically, in the worst case Bob requires a very large number of queries to Alice. In the quantum case however, Bob requires just a single query. By measuring the single entangled state, which is sent to him by Alice, Bob can obtain the function that Alice has selected. This quantum key distribution method is faster than the very large number of classical queries that would be required in the classical case.

Original languageEnglish
Pages (from-to)3184-3188
Number of pages5
JournalInternational Journal of Theoretical Physics
Volume59
Issue number10
DOIs
StatePublished - 01 10 2020
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2020, Springer Science+Business Media, LLC, part of Springer Nature.

Keywords

  • Formalism
  • Quantum algorithms
  • Quantum communication
  • Quantum computation
  • Quantum cryptography and communication security

Fingerprint

Dive into the research topics of 'Continuous-Variable Quantum Computing and its Applications to Cryptography'. Together they form a unique fingerprint.

Cite this