Quantum Cryptography Based on An Algorithm of Determining All The Mappings of A Function

  IJPTT-book-cover
 
International Journal of P2P Network Trends and Technology (IJPTT)          
 
© 2019 by IJPTT Journal
Volume-9 Issue-6
Year of Publication : 2019
Authors : Koji Nagata, Do Ngoc Diep, Tadao Nakamura
DOI :  10.14445/22492615/IJPTT-V9I6P401

Citation

MLA Style:Koji Nagata, Do Ngoc Diep, Tadao Nakamura "Quantum Cryptography Based on An Algorithm of Determining All The Mappings of A Function" International Journal of P2P Network Trends and Technology 9.6 (2019): 1-4.

APA Style:Koji Nagata, Do Ngoc Diep, Tadao Nakamura(2019). Quantum Cryptography Based on An Algorithm of Determining All The Mappings of A Function. International Journal of P2P Network Trends and Technology, 9(6),1-4.

Abstract

We propose quantum cryptography based on an algorithm of determining a function.The security of our cryptography is based on the Ekert 1991 protocol, that is, we use anentangled state.Eve must destroy the entangled state.Consider a function.Alice knows all the mappings concerning the function.Bob knows none of them. His aim is of obtaining all of them without Eve`s attack.In classical case, Bob needs some queries.In quantum case, Bob needs just a query.By measuring thesingle entangled state, which is sent by Alice, Bob can obtainall the mappings concerning the function, simultaneously.This is faster than classical cryptography.

References

[1] E. Bernstein and U. Vazirani,Proceedings of 25th Annual ACM Symposium on Theory of Computing (STOC `93), p. 11 (1993), https://doi.org/10.1145/167088.167097.
[2] E. Bernstein and U. Vazirani,SIAM J. Comput.26, 1411 (1997).
[3] D. Deutsch, Proc. R. Soc. Lond. A 400, 97(1985).
[4] D. Deutsch and R. Jozsa, Proc. R. Soc. Lond. A 439, 553(1992).
[5] R. Cleve, A. Ekert, C. Macchiavello, and M. Mosca, Proc. R. Soc. Lond. A 454, 339(1998).
[6] D. R. Simon, Proceedings of 35th IEEE Annual Symposium on Foundations of Computer Science, p.116 (1994).
[7] P. W. Shor,Proceedings of 35th IEEE Annual Symposium on Foundations of Computer Science, p. 124(1994).
[8] L. K. Grover,Proceedings of 28th Annual ACM Symposium on Theory of Computing,p. 212(1996).
[9] K. Ekert, Phys. Rev. Lett. 67, 661 (1991).

Keywords
Quantum cryptography and communication security,Quantum communication, Quantum algorithms, Quantum computation, Formalism