Use of small-scale quantum computers in cryptography with many-qubit entangled states

被引:0
|
作者
K. V. Bayandin
G. B. Lesovik
机构
[1] Russian Academy of Sciences,Landau Institute for Theoretical Physics
来源
Journal of Experimental and Theoretical Physics Letters | 2005年 / 81卷
关键词
03.67.−a;
D O I
暂无
中图分类号
学科分类号
摘要
We propose a new cryptographic protocol. It is suggested to encode information in ordinary binary form into many-qubit entangled states with the help of a quantum computer. A state of qubits (realized, e.g., with photons) is transmitted through a quantum channel to the addressee, who applies a quantum computer tuned to realize the inverse unitary-transformation decoding of the message. Different ways of eavesdropping are considered, and an estimate of the time needed for determining the secret unitary transformation is given. It is shown that using even small quantum computers can serve as a basis for very efficient cryptographic protocols. For a suggested cryptographic protocol, the time scale on which communication can be considered secure is exponential in the number of qubits in the entangled states and in the number of gates used to construct the quantum network.
引用
收藏
页码:351 / 355
页数:4
相关论文
共 50 条
  • [31] Entangled Qubit States and Linear Entropy in the Probability Representation of Quantum Mechanics
    Chernega, Vladimir N.
    Man'ko, Olga, V
    Man'ko, Vladimir, I
    ENTROPY, 2022, 24 (04)
  • [33] Cyclic quantum teleportation of two-qubit entangled states by using six-qubit cluster state and six-qubit entangled state
    Slaoui, A.
    El Kirdi, M.
    Ahl Laamara, R.
    Alabdulhafith, M.
    Chelloug, S. A.
    Abd El-Latif, A. A.
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [34] Preparing quantum many-body scar states on quantum computers
    Gustafson, Erik J.
    Li, Andy C. Y.
    Khan, Abid
    Kim, Joonho
    Kurkcuoglu, Doga Murat
    Alam, M. Sohaib
    Orth, Peter P.
    Rahmani, Armin
    Iadecola, Thomas
    QUANTUM, 2023, 7 : 1 - 34
  • [35] Hardware Implementation of Public Key Cryptography for Small-Scale Devices
    Pillai, Rohan
    Patel, Usha
    INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 1, 2019, 55 : 9 - 15
  • [36] Qubit Mapping Algorithm for Noisy Intermediate-Scale Quantum Computers
    Huang, Hongkai
    Zhang, Xuesong
    Computer Engineering and Applications, 2024, 60 (24) : 110 - 118
  • [37] Security of two quantum cryptography protocols using the same four qubit states
    Branciard, C
    Gisin, N
    Kraus, B
    Scarani, V
    PHYSICAL REVIEW A, 2005, 72 (03):
  • [38] Bidirectional Quantum Teleportation of a Class of n-Qubit States by Using (2n+2)-Qubit Entangled States as Quantum Channel
    Zadeh, Mohammad Sadegh Sadeghi
    Houshmand, Monireh
    Aghababa, Hossein
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2018, 57 (01) : 175 - 183
  • [39] Protocol of Quantum Blind Signature Based on Two - Qubit and Three- Qubit Maximally Entangled States
    Wang Junhui
    Li Yunxia
    Meng Wen
    Wei Jiahua
    Tang Jie
    Wu Tianxiong
    LASER & OPTOELECTRONICS PROGRESS, 2021, 58 (07)
  • [40] Bidirectional Quantum Teleportation of a Class of n-Qubit States by Using (2n + 2)-Qubit Entangled States as Quantum Channel
    Mohammad Sadegh Sadeghi Zadeh
    Monireh Houshmand
    Hossein Aghababa
    International Journal of Theoretical Physics, 2018, 57 : 175 - 183