WorldWideScience

Sample records for quantum cryptography system

  1. Quantum cryptography

    CERN Document Server

    Hughes, R J; Dyer, P L; Luther, G G; Morgan, G L; Schauer, M M; Hughes, Richard J; Dyer, P; Luther, G G; Morgan, G L; Schauer, M

    1995-01-01

    Quantum cryptography is a new method for secret communications offering the ultimate security assurance of the inviolability of a Law of Nature. In this paper we shall describe the theory of quantum cryptography, its potential relevance and the development of a prototype system at Los Alamos, which utilises the phenomenon of single-photon interference to perform quantum cryptography over an optical fiber communications link.

  2. Quantum cryptography

    CERN Document Server

    Gilbert, Gerald; Hamrick, Michael

    2013-01-01

    This book provides a detailed account of the theory and practice of quantum cryptography. Suitable as the basis for a course in the subject at the graduate level, it crosses the disciplines of physics, mathematics, computer science and engineering. The theoretical and experimental aspects of the subject are derived from first principles, and attention is devoted to the practical development of realistic quantum communications systems. The book also includes a comprehensive analysis of practical quantum cryptography systems implemented in actual physical environments via either free-space or fiber-optic cable quantum channels. This book will be a valuable resource for graduate students, as well as professional scientists and engineers, who desire an introduction to the field that will enable them to undertake research in quantum cryptography. It will also be a useful reference for researchers who are already active in the field, and for academic faculty members who are teaching courses in quantum information s...

  3. Quantum cryptography

    NARCIS (Netherlands)

    Fehr, S.

    2010-01-01

    Quantum cryptography makes use of the quantum-mechanical behavior of nature for the design and analysis of cryptographic schemes. Optimally (but not always), quantum cryptography allows for the design of cryptographic schemes whose security is guaranteed solely by the laws of nature. This is in shar

  4. Quantum cryptography in free space.

    Science.gov (United States)

    Jacobs, B C; Franson, J D

    1996-11-15

    The range of quantum cryptography systems using optical fibers is limited to roughly 30 km because amplifiers cannot be used. A fully operational system for quantum cryptography based on the transmission of single photons in free space under daylight conditions has been demonstrated. The feasibility of a global system for quantum cryptography based on a network of ground stations and satellites is discussed.

  5. Quantum cryptography communication technology

    Energy Technology Data Exchange (ETDEWEB)

    Cho, Jai Wan; Choi, Young Soo; Lee, Jae Chul; Choi, Yu Rak; Jung, Gwang Il; Jung, Jong Eun; Hong, Seok Boong; Koo, In Soo

    2007-09-15

    Quantum cryptography communication based on quantum mechanics provides and unconditional security between two users. Even though huge advance has been done since the 1984, having a complete system is still far away. In the case of real quantum cryptography communication systems, an unconditional security level is lowered by the imperfection of the communication unit. It is important to investigate the unconditional security of quantum communication protocols based on these experimental results and implementation examples for the advanced spread all over the world. The Japanese report, titled, 'Investigation report on the worldwide trends of quantum cryptography communications systems' was translated and summarized in this report. An unconditional security theory of the quantum cryptography and real implementation examples in the domestic area are investigated also. The goal of the report is to make quantum cryptography communication more useful and reliable alternative telecommunication infrastructure as the one of the cyber security program of the class 1-E communication system of nuclear power plant. Also another goal of this report is to provide the quantitative decision basis on the quantum cryptography communication when this secure communication system will be used in class 1-E communication channel of the nuclear power plant.

  6. Phase-modulation transmission system for quantum cryptography.

    Science.gov (United States)

    Mérolla, J M; Mazurenko, Y; Goedgebuer, J P; Porte, H; Rhodes, W T

    1999-01-15

    We describe a new method for quantum key distribution that utilizes phase modulation of sidebands of modulation by use of integrated electro-optic modulators at the transmitting and receiving modules. The system is shown to produce constructive or destructive interference with unity visibility, which should allow quantum cryptography to be carried out with high flexibility by use of conventional devices.

  7. Broadband Quantum Cryptography

    CERN Document Server

    Rogers, Daniel

    2010-01-01

    Quantum cryptography is a rapidly developing field that draws from a number of disciplines, from quantum optics to information theory to electrical engineering. By combining some fundamental quantum mechanical principles of single photons with various aspects of information theory, quantum cryptography represents a fundamental shift in the basis for security from numerical complexity to the fundamental physical nature of the communications channel. As such, it promises the holy grail of data security: theoretically unbreakable encryption. Of course, implementing quantum cryptography in real br

  8. An Online Banking System Based on Quantum Cryptography Communication

    Science.gov (United States)

    Zhou, Ri-gui; Li, Wei; Huan, Tian-tian; Shen, Chen-yi; Li, Hai-sheng

    2014-07-01

    In this paper, an online banking system has been built. Based on quantum cryptography communication, this system is proved unconditional secure. Two sets of GHZ states are applied, which can ensure the safety of purchase and payment, respectively. In another word, three trading participants in each triplet state group form an interdependent and interactive relationship. In the meantime, trading authorization and blind signature is introduced by means of controllable quantum teleportation. Thus, an effective monitor is practiced on the premise that the privacy of trading partners is guaranteed. If there is a dispute or deceptive behavior, the system will find out the deceiver immediately according to the relationship mentioned above.

  9. Authentication in Online Banking Systems through Quantum Cryptography

    Directory of Open Access Journals (Sweden)

    Anand Sharma

    2013-06-01

    Full Text Available The new information technology is becoming an important factor in the future development of financial services industry, and especially banking industry. Growing international trading and problems in transferring money have motivated researchers to introduce a new structure. Online banking is the newest delivery channel for retail banking services. Online banking facilitated by various Electronic Commerce technologies, has helped commercial banks to stay competitive through productivity gains, transaction cost reduction and customer service improvement. Security for online banking has changed considerably during the relatively short period that online banking has been in use. In particular, authentication in the early implementations was, and sometimes still is, vulnerable to various attacks such as phishing. It is known that the quantum cryptography protocols are able to detect immediately any attempt to attack the key exchange and the authentication process. This paper presentsan introduction of online banking and quantum cryptography. In this paper we are proposing a model for authentication in online banking system with quantum cryptography.

  10. Counterfactual quantum cryptography.

    Science.gov (United States)

    Noh, Tae-Gon

    2009-12-01

    Quantum cryptography allows one to distribute a secret key between two remote parties using the fundamental principles of quantum mechanics. The well-known established paradigm for the quantum key distribution relies on the actual transmission of signal particle through a quantum channel. In this Letter, we show that the task of a secret key distribution can be accomplished even though a particle carrying secret information is not in fact transmitted through the quantum channel. The proposed protocols can be implemented with current technologies and provide practical security advantages by eliminating the possibility that an eavesdropper can directly access the entire quantum system of each signal particle.

  11. Quantum cryptography: a view from classical cryptography

    Science.gov (United States)

    Buchmann, Johannes; Braun, Johannes; Demirel, Denise; Geihs, Matthias

    2017-06-01

    Much of digital data requires long-term protection of confidentiality, for example, medical health records. Cryptography provides such protection. However, currently used cryptographic techniques such as Diffe-Hellman key exchange may not provide long-term security. Such techniques rely on certain computational assumptions, such as the hardness of the discrete logarithm problem that may turn out to be incorrect. On the other hand, quantum cryptography---in particular quantum random number generation and quantum key distribution---offers information theoretic protection. In this paper, we explore the challenge of providing long-term confidentiality and we argue that a combination of quantum cryptography and classical cryptography can provide such protection.

  12. Single photon quantum cryptography

    CERN Document Server

    Beveratos, A; Gacoin, T; Villing, A; Poizat, J P; Grangier, P; Beveratos, Alexios; Brouri, Rosa; Gacoin, Thierry; Villing, Andre; Poizat, Jean-Philippe; Grangier, Philippe

    2002-01-01

    We report the full implementation of a quantum cryptography protocol using a stream of single photon pulses generated by a stable and efficient source operating at room temperature. The single photon pulses are emitted on demand by a single nitrogen-vacancy (NV) color center in a diamond nanocrystal. The quantum bit error rate is less that 4.6% and the secure bit rate is 9500 bits/s. The overall performances of our system reaches a domain where single photons have a measurable advantage over an equivalent system based on attenuated light pulses.

  13. Single photon quantum cryptography.

    Science.gov (United States)

    Beveratos, Alexios; Brouri, Rosa; Gacoin, Thierry; Villing, André; Poizat, Jean-Philippe; Grangier, Philippe

    2002-10-28

    We report the full implementation of a quantum cryptography protocol using a stream of single photon pulses generated by a stable and efficient source operating at room temperature. The single photon pulses are emitted on demand by a single nitrogen-vacancy color center in a diamond nanocrystal. The quantum bit error rate is less that 4.6% and the secure bit rate is 7700 bits/s. The overall performances of our system reaches a domain where single photons have a measurable advantage over an equivalent system based on attenuated light pulses.

  14. Autocompensating Quantum Cryptography

    CERN Document Server

    Bethune, D S; Bethune, Donald S.; Risk, William P.

    2002-01-01

    Quantum cryptographic key distribution (QKD) uses extremely faint light pulses to carry quantum information between two parties (Alice and Bob), allowing them to generate a shared, secret cryptographic key. Autocompensating QKD systems automatically and passively compensate for uncontrolled time dependent variations of the optical fiber properties by coding the information as a differential phase between orthogonally-polarized components of a light pulse sent on a round trip through the fiber, reflected at mid-course using a Faraday mirror. We have built a prototype system based on standard telecom technology that achieves a privacy-amplified bit generation rate of ~1000 bits/s over a 10-km optical fiber link. Quantum cryptography is an example of an application that, by using quantum states of individual particles to represent information, accomplishes a practical task that is impossible using classical means.

  15. Quantum Computational Cryptography

    Science.gov (United States)

    Kawachi, Akinori; Koshiba, Takeshi

    As computational approaches to classical cryptography have succeeded in the establishment of the foundation of the network security, computational approaches even to quantum cryptography are promising, since quantum computational cryptography could offer richer applications than the quantum key distribution. Our project focused especially on the quantum one-wayness and quantum public-key cryptosystems. The one-wayness of functions (or permutations) is one of the most important notions in computational cryptography. First, we give an algorithmic characterization of quantum one-way permutations. In other words, we show a necessary and sufficient condition for quantum one-way permutations in terms of reflection operators. Second, we introduce a problem of distinguishing between two quantum states as a new underlying problem that is harder to solve than the graph automorphism problem. The new problem is a natural generalization of the distinguishability problem between two probability distributions, which are commonly used in computational cryptography. We show that the problem has several cryptographic properties and they enable us to construct a quantum publickey cryptosystem, which is likely to withstand any attack of a quantum adversary.

  16. Quantum Cryptography in Practice

    CERN Document Server

    Elliott, C; Troxel, G; Elliott, Chip; Pearson, David; Troxel, Gregory

    2003-01-01

    BBN, Harvard, and Boston University are building the DARPA Quantum Network, the world's first network that delivers end-to-end network security via high-speed Quantum Key Distribution, and testing that Network against sophisticated eavesdropping attacks. The first network link has been up and steadily operational in our laboratory since December 2002. It provides a Virtual Private Network between private enclaves, with user traffic protected by a weak-coherent implementation of quantum cryptography. This prototype is suitable for deployment in metro-size areas via standard telecom (dark) fiber. In this paper, we introduce quantum cryptography, discuss its relation to modern secure networks, and describe its unusual physical layer, its specialized quantum cryptographic protocol suite (quite interesting in its own right), and our extensions to IPsec to integrate it with quantum cryptography.

  17. Post-Quantum Cryptography

    DEFF Research Database (Denmark)

    Gauthier Umana, Valérie

    The security of almost all the public-key cryptosystems used in practice depends on the fact that the prime factorization of a number and the discrete logarithm are hard problems to solve. In 1994, Peter Shor found a polynomial-time algorithm which solves these two problems using quantum computers....... The public key cryptosystems that can resist these emerging attacks are called quantum resistant or post-quantum cryptosystems. There are mainly four classes of public-key cryptography that are believed to resist classical and quantum attacks: code-based cryptography, hash-based cryptography, lattice......-cyclic alternant codes and quasi-dyadic codes (joint work with Gregor Leander). We also present a deterministic polynomial-time algorithm to solve the Goppa Code Distinguisher problem for high rate codes (joint work with Jean-Charles Faugere, Ayoub Otmani, Ludovic Perret and Jean-Pierre Tillich). In the second...

  18. Quantum cryptography using optical fibers.

    Science.gov (United States)

    Franson, J D; Lives, H

    1994-05-10

    Quantum cryptography permits the transmission of secret information whose security is guaranteed by the uncertainty principle. An experimental system for quantum crytography is implemented based on the linear polarization of single photons transmitted by an optical fiber. Polarization-preserving optical fiber and a feedback loop are employed to maintain the state of polarization. Error rates of less than 0.5% are obtained.

  19. 量子密码体系研究%Study on Quantum Cryptography System

    Institute of Scientific and Technical Information of China (English)

    李佳

    2013-01-01

    本文主要介绍了量子密码体系中密码算法、密钥管理、密码技术、安全协议、密钥分配等主要内容。得出了量子密码比传统密码更安全的有效结论,最后总结了量子密码广阔的发展前景。%T his paper introduced som e im portantcontenton quantum cryptography system ,such as encryption algorithm , key m anagem ent, encryption technology, secure protocol, key distribution. It pointed out safer com-pared quantum cryptography w ith traditional cryptography and the broad prospects of developm ent on quantum cryptography system atlast.

  20. Quantum memory in quantum cryptography

    CERN Document Server

    Mor, T

    1999-01-01

    [Shortened abstract:] This thesis investigates the importance of quantum memory in quantum cryptography, concentrating on quantum key distribution schemes. In the hands of an eavesdropper -- a quantum memory is a powerful tool, putting in question the security of quantum cryptography; Classical privacy amplification techniques, used to prove security against less powerful eavesdroppers, might not be effective when the eavesdropper can keep quantum states for a long time. In this work we suggest a possible direction for approaching this problem. We define strong attacks of this type, and show security against them, suggesting that quantum cryptography is secure. We start with a complete analysis regarding the information about a parity bit (since parity bits are used for privacy amplification). We use the results regarding the information on parity bits to prove security against very strong eavesdropping attacks, which uses quantum memories and all classical data (including error correction codes) to attack th...

  1. QUANTUM CRYPTOGRAPHY WITH PHOTON PAIRS

    Directory of Open Access Journals (Sweden)

    Anand Sharma,

    2010-07-01

    Full Text Available Quantum cryptographic systems use quantum mechanical concepts that are based on qubit superposition of states, and on the no cloning or no copying theorem to establish unbreakable cipher keys. The basic idea of quantum cryptography is to send the key in the form of photons over a public channel, encoding the zeros and one on quantum states in such a way that any eavesdropping attempt can be detected. Using optical communications the most commonly quantum mechanical property used is the polarization state of photon. However, in most quantum cryptographic algorithms a random polarization state is required. The photons are ideal for low loss transport, either in free space or in optical fibers, i.e. we have the full arsenal of fiber optic technology at our disposal. In this paper we are describing the process of quantum cryptography with photon pairs.

  2. QUANTUM CRYPTOGRAPHY: Single Photons.

    Science.gov (United States)

    Benjamin, S

    2000-12-22

    Quantum cryptography offers the potential of totally secure transfer of information, but as Benjamin discusses in this Perspective, its practical implementation hinges on being able to generate single photons (rather than two or more) at a time. Michler et al. show how this condition can be met in a quantum dot microdisk structure. Single molecules were also recently shown to allow controlled single-photon emission.

  3. QUANTUM CRYPTOGRAPHY SYSTEM WITH A SINGLE PHOTON SOURCE BASED ON THE SPONTANEOUS PARAMETRIC SCATTERING EFFECT

    Directory of Open Access Journals (Sweden)

    V. I. Egorov

    2012-01-01

    Full Text Available A scheme of a single photon source for quantum informatics applications based on the spontaneous parametric scattering effect is proposed and a quantum cryptography setup using it is presented. The system is compared to the alternative ones that operate with attenuated classic light.

  4. Protocols and plan of quantum cryptography

    Directory of Open Access Journals (Sweden)

    Milorad S. Markagić

    2012-01-01

    Full Text Available Along with the development of confidentiality of data and resources, there is a need to develop systems that would provide confidentiality. Currently, the most used systems are classical cryptographic systems and encryption public key systems. However, none of these systems provides a solution for the famous 'catch 22' of cryptography. Owing to the intensive development of quantum mechanics, in the last 30 years emerged an entirely new kind of cryptography-quantum cryptography. Its greatest contribution is a possibility to discover an intercepted communication channel from a third party. The question is: is this really true? The question arises: 'If the quantum cryptography is so good, why is not widely used?' The aim of this paper is, on the one hand, to define the basic mechanisms of quantum cryptography IP, and, on the other hand, to point to the shortcomings, as they related to the opportunities of today's devices and flaws in protocols.

  5. A Secure Key Distribution System of Quantum Cryptography Based on the Coherent State

    Science.gov (United States)

    Guo, Guang-Can; Zhang, Xiao-Yu

    1996-01-01

    The cryptographic communication has a lot of important applications, particularly in the magnificent prospects of private communication. As one knows, the security of cryptographic channel depends crucially on the secrecy of the key. The Vernam cipher is the only cipher system which has guaranteed security. In that system the key must be as long as the message and most be used only once. Quantum cryptography is a method whereby key secrecy can be guaranteed by a physical law. So it is impossible, even in principle, to eavesdrop on such channels. Quantum cryptography has been developed in recent years. Up to now, many schemes of quantum cryptography have been proposed. Now one of the main problems in this field is how to increase transmission distance. In order to use quantum nature of light, up to now proposed schemes all use very dim light pulses. The average photon number is about 0.1. Because of the loss of the optical fiber, it is difficult for the quantum cryptography based on one photon level or on dim light to realize quantum key-distribution over long distance. A quantum key distribution based on coherent state is introduced in this paper. Here we discuss the feasibility and security of this scheme.

  6. On Classical and Quantum Cryptography

    CERN Document Server

    Volovich, I V; Volovich, Ya.I.

    2001-01-01

    Lectures on classical and quantum cryptography. Contents: Private key cryptosystems. Elements of number theory. Public key cryptography and RSA cryptosystem. Shannon`s entropy and mutual information. Entropic uncertainty relations. The no cloning theorem. The BB84 quantum cryptographic protocol. Security proofs. Bell`s theorem. The EPRBE quantum cryptographic protocol.

  7. Quantum cryptography with entangled photons

    Science.gov (United States)

    Jennewein; Simon; Weihs; Weinfurter; Zeilinger

    2000-05-15

    By realizing a quantum cryptography system based on polarization entangled photon pairs we establish highly secure keys, because a single photon source is approximated and the inherent randomness of quantum measurements is exploited. We implement a novel key distribution scheme using Wigner's inequality to test the security of the quantum channel, and, alternatively, realize a variant of the BB84 protocol. Our system has two completely independent users separated by 360 m, and generates raw keys at rates of 400-800 bits/s with bit error rates around 3%.

  8. Compact transmission system using single-sideband modulation of light for quantum cryptography.

    Science.gov (United States)

    Duraffourg, L; Merolla, J M; Goedgebuer, J P; Mazurenko, Y; Rhodes, W T

    2001-09-15

    We report a new transmission that can be used for quantum key distribution. The system uses single-sideband-modulated light in an implementation of the BB84 quantum cryptography protocol. The system is formed by two integrated unbalanced Mach-Zehnder interferometers and is based on interference between phase-modulated sidebands in the spectral domain. Experiments show that high interference visibility can be obtained.

  9. A Quick Glance at Quantum Cryptography

    CERN Document Server

    Lomonaco, S J

    1998-01-01

    The recent application of the principles of quantum mechanics to cryptography has led to a remarkable new dimension in secret communication. As a result of these new developments, it is now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it occur, and which give a guarantee of no eavesdropping should it not occur. CONTENTS P3....Cryptographic systems before quantum cryptography P7....Preamble to quantum cryptography P10..The BB84 quantum cryptographic protocol without noise P16..The BB84 quantum cryptographic protocol with noise P19..The B92 quantum cryptographic protocol P21..EPR quantum cryptographic protocols P25..Other protocols P25..Eavesdropping stategies and counter measures P26..Conclusion P29..Appendix A. The no cloning theorem P30..Appendix B. Proof that an undetectable eavesdropper can obtain no information from the B92 protocol P31..Appendix C. Part of a Rosetta stone for quantum mechanics P44..References

  10. Secure communications using quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, R.J.; Buttler, W.T.; Kwiat, P.G. [and others

    1997-08-01

    The secure distribution of the secret random bit sequences known as {open_quotes}key{close_quotes} material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is an emerging technology for secure key distribution with single-photon transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). We have developed experimental quantum cryptography systems based on the transmission of non-orthogonal single-photon states to generate shared key material over multi-kilometer optical fiber paths and over line-of-sight links. In both cases, key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. In our optical fiber experiment we have performed quantum key distribution over 24-km of underground optical fiber using single-photon interference states, demonstrating that secure, real-time key generation over {open_quotes}open{close_quotes} multi-km node-to-node optical fiber communications links is possible. We have also constructed a quantum key distribution system for free-space, line-of-sight transmission using single-photon polarization states, which is currently undergoing laboratory testing. 7 figs.

  11. Hacking commercial quantum cryptography systems by tailored bright illumination

    Science.gov (United States)

    Lydersen, Lars; Wiechers, Carlos; Wittmann, Christoffer; Elser, Dominique; Skaar, Johannes; Makarov, Vadim

    2010-10-01

    The peculiar properties of quantum mechanics allow two remote parties to communicate a private, secret key, which is protected from eavesdropping by the laws of physics. So-called quantum key distribution (QKD) implementations always rely on detectors to measure the relevant quantum property of single photons. Here we demonstrate experimentally that the detectors in two commercially available QKD systems can be fully remote-controlled using specially tailored bright illumination. This makes it possible to tracelessly acquire the full secret key; we propose an eavesdropping apparatus built from off-the-shelf components. The loophole is likely to be present in most QKD systems using avalanche photodiodes to detect single photons. We believe that our findings are crucial for strengthening the security of practical QKD, by identifying and patching technological deficiencies.

  12. Quantum cryptography over underground optical fibers

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, R.J.; Luther, G.G.; Morgan, G.L.; Peterson, C.G.; Simmons, C.

    1996-05-01

    Quantum cryptography is an emerging technology in which two parties may simultaneously generated shared, secret cryptographic key material using the transmission of quantum states of light whose security is based on the inviolability of the laws of quantum mechanics. An adversary can neither successfully tap the key transmissions, nor evade detection, owing to Heisenberg`s uncertainty principle. In this paper the authors describe the theory of quantum cryptography, and the most recent results from their experimental system with which they are generating key material over 14-km of underground optical fiber. These results show that optical-fiber based quantum cryptography could allow secure, real-time key generation over ``open`` multi-km node-to-node optical fiber communications links between secure ``islands.``

  13. Quantum Cryptography in Spin Networks

    Institute of Scientific and Technical Information of China (English)

    DENG Hong-Liang; FANG Xi-Ming

    2007-01-01

    In this paper we propose a new scheme of long-distance quantum cryptography based on spin networks with qubits stored in electron spins of quantum dots. By conditional Faraday rotation, single photon polarization measurement, and quantum state transfer, maximal-entangled Bell states for quantum cryptography between two long-distance parties are created. Meanwhile, efficient quantum state transfer over arbitrary distances is obtained in a spin chain by a proper choice of coupling strengths and using spin memory technique improved. We also analyse the security of the scheme against the cloning-based attack which can be also implemented in spin network and discover that this spin network cloning coincides with the optimal fidelity achieved by an eavesdropper for entanglement-based cryptography.

  14. Classical Cryptography v/s Quantum Cryptography A Comparative Study

    Directory of Open Access Journals (Sweden)

    Minakshi Bhatt

    2012-01-01

    Full Text Available In this era of information technology, the need for security has attained paramount importance. As most of our sensitive information is stored in computers the need of data security becomes increasingly important. Protecting this information against unauthorized access is therefore a major concern for both operating systems and users alike. Cryptography is one such method of safeguarding sensitive data from being stolen or intercepted by unwanted third parties. Traditional cryptology is certainly clever, but as with all encoding methods in code-breaking history, it's being phased out. Quantum cryptography uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages. By harnessing the unpredictable nature of matter at the quantum level, physicists have figured out a way to exchange information on secret keys. Attaching information to the photons spin is the essence of Quantum Cryptology. In brief, the processes of encoding (cryptography and decoding (crypto analysis information or messages (called plaintext into an otherwise meaningless data (cipher text combined are cryptology. And when the keys used for this process are photons, it’s called Quantum Cryptology.

  15. Quantum asymmetric cryptography with symmetric keys

    Science.gov (United States)

    Gao, Fei; Wen, Qiaoyan; Qin, Sujuan; Zhu, Fuchen

    2009-12-01

    Based on quantum encryption, we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system. We show that the quantum-mechanical nature renders it feasible and reasonable to use symmetric keys in such a scheme, which is quite different from that in conventional public-key cryptography. The security of our scheme is analyzed and some features are discussed. Furthermore, the state-estimation attack to a prior QPKC scheme is demonstrated.

  16. Quantum asymmetric cryptography with symmetric keys

    OpenAIRE

    Gao, Fei; Wen, Qiao-Yan; Qin, Su-Juan; Zhu, Fu-Chen

    2008-01-01

    Based on quantum encryption, we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system. We show that the quantum-mechanical nature renders it feasible and reasonable to use symmetric keys in such a scheme, which is quite different from that in conventional public-key cryptography. The security of our scheme is analyzed and some features are discussed. Furthermore, the state-estimation attack to a prior QPKC scheme is demonstr...

  17. Quantum asymmetric cryptography with symmetric keys

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Based on quantum encryption,we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system. We show that the quantum-mechanical nature renders it feasible and reasonable to use symmetric keys in such a scheme,which is quite different from that in conventional public-key cryptography. The security of our scheme is analyzed and some features are discussed. Furthermore,the state-estimation attack to a prior QPKC scheme is demonstrated.

  18. Quantum asymmetric cryptography with symmetric keys

    Institute of Scientific and Technical Information of China (English)

    GAO Fei; WEN QiaoYan; QIN SuJuan; ZHU FuChen

    2009-01-01

    Based on quantum encryption, we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system. We show that the quantum-mechanical nature renders it feasible and reasonable to use symmetric keys in such a scheme, which is quite different from that in conventional public-key cryptography. The security of our scheme is analyzed and some features are discussed. Furthermore, the state-estimation attack to a prior QPKC scheme is demonstrated.

  19. On protection against a bright-pulse attack in the two-pass quantum cryptography system

    Science.gov (United States)

    Balygin, K. A.; Klimov, A. N.; Korol'kov, A. V.; Kulik, S. P.; Molotkov, S. N.

    2016-06-01

    The security of keys in quantum cryptography systems, in contrast to mathematical cryptographic algorithms, is guaranteed by fundamental quantum-mechanical laws. However, the cryptographic resistance of such systems, which are distributed physical devices, fundamentally depends on the method of their implementation and particularly on the calibration and control of critical parameters. The most important parameter is the number of photons in quasi-single-photon information states in a communication channel. The sensitivity to a bright-pulse attack has been demonstrated in an explicit form for a number of systems. A method guaranteeing the resistance to such attacks has been proposed and implemented. Furthermore, the relation of physical observables used and obtained at the control of quantum states to the length of final secret keys has been obtained for the first time.

  20. On Simulation of Quantum Cryptography

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    The simulation of quantum cryptography on classical computers is discussed in this paper. The methods to express the preparation and measurement of quantum states on current computers are given and the basic algorithms for simulating the quantum key distribution protocols are presented. All the simulating results of each protocol are given and compared with the theoretic one. It is shown that the simulation results are completely tallied with the theoretic one.

  1. Quantum cryptography beyond quantum key distribution

    NARCIS (Netherlands)

    A. Broadbent (Anne); C. Schaffner (Christian)

    2016-01-01

    textabstractQuantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks. While the most well-known example of this discipline is quantum key distribution (QKD), there exist many other applications such as quantum money, randomness

  2. Quantum cryptography beyond quantum key distribution

    NARCIS (Netherlands)

    Broadbent, A.; Schaffner, C.

    2016-01-01

    Quantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks. While the most well-known example of this discipline is quantum key distribution (QKD), there exist many other applications such as quantum money, randomness generation,

  3. Quantum cryptography beyond quantum key distribution

    NARCIS (Netherlands)

    Broadbent, A.; Schaffner, C.

    2016-01-01

    Quantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks. While the most well-known example of this discipline is quantum key distribution (QKD), there exist many other applications such as quantum money, randomness generation, secu

  4. Quantum cryptography: Theoretical protocols for quantum key distribution and tests of selected commercial QKD systems in commercial fiber networks

    Science.gov (United States)

    Jacak, Monika; Jacak, Janusz; Jóźwiak, Piotr; Jóźwiak, Ireneusz

    2016-06-01

    The overview of the current status of quantum cryptography is given in regard to quantum key distribution (QKD) protocols, implemented both on nonentangled and entangled flying qubits. Two commercial R&D platforms of QKD systems are described (the Clavis II platform by idQuantique implemented on nonentangled photons and the EPR S405 Quelle platform by AIT based on entangled photons) and tested for feasibility of their usage in commercial TELECOM fiber metropolitan networks. The comparison of systems efficiency, stability and resistivity against noise and hacker attacks is given with some suggestion toward system improvement, along with assessment of two models of QKD.

  5. Trusted Certificates in Quantum Cryptography

    OpenAIRE

    Perkins, William

    2006-01-01

    This paper analyzes the performance of Kak's three stage quantum cryptographic protocol based on public key cryptography against a man-in-the-middle attack. A method for protecting against such an attack is presented using certificates distributed by a trusted third party.

  6. Full-field implementation of a perfect eavesdropper on a quantum cryptography system.

    Science.gov (United States)

    Gerhardt, Ilja; Liu, Qin; Lamas-Linares, Antía; Skaar, Johannes; Kurtsiefer, Christian; Makarov, Vadim

    2011-06-14

    Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality it significantly relies on the physical implementation. Technological imperfections of QKD systems have been previously explored, but no attack on an established QKD connection has been realized so far. Here we show the first full-field implementation of a complete attack on a running QKD connection. An installed eavesdropper obtains the entire 'secret' key, while none of the parameters monitored by the legitimate parties indicate a security breach. This confirms that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure.

  7. On the complexity of search for keys in quantum cryptography

    Science.gov (United States)

    Molotkov, S. N.

    2016-03-01

    The trace distance is used as a security criterion in proofs of security of keys in quantum cryptography. Some authors doubted that this criterion can be reduced to criteria used in classical cryptography. The following question has been answered in this work. Let a quantum cryptography system provide an ɛ-secure key such that ½‖ρ XE - ρ U ⊗ ρ E ‖1 cryptography. Bounds for the minimum and maximum numbers of search steps for the determination of the actual key have been presented.

  8. Quantum Erasure Cryptography

    Science.gov (United States)

    Salih, Hatim

    2016-05-01

    The phenomenon of quantum erasure has long intrigued physicists, but has surprisingly found limited practical application. Here, we propose a protocol for quantum key distribution (QKD) based on quantum erasure, promising inherent security against detector attacks. We particularly demonstrate its security against a powerful detector-blinding attack.

  9. Perspectives on Entangled Nuclear Particle Pairs Generation and Manipulation in Quantum Communication and Cryptography Systems

    Directory of Open Access Journals (Sweden)

    Octavian Dănilă

    2012-01-01

    Full Text Available Entanglement between two quantum elements is a phenomenon which presents a broad application spectrum, being used largely in quantum cryptography schemes and in physical characterisation of the universe. Commonly known entangled states have been obtained with photons and electrons, but other quantum elements such as quarks, leptons, and neutrinos have shown their informational potential. In this paper, we present the perspective of exploiting the phenomenon of entanglement that appears in nuclear particle interactions as a resource for quantum key distribution protocols.

  10. Quantum Cryptography in Existing Telecommunications Infrastructure

    Science.gov (United States)

    Rogers, Daniel; Bienfang, Joshua; Mink, Alan; Hershman, Barry; Nakassis, Anastase; Tang, Xiao; Ma, Lijun; Su, David; Williams, Carl; Clark, Charles

    2006-03-01

    Quantum cryptography has shown the potential for ultra-secure communications. However, all systems demonstrated to date operate at speeds that make them impractical for performing continuous one-time-pad encryption of today's broadband communications. By adapting clock and data recovery techniques from modern telecommunications engineering practice, and by designing and implementing expeditious error correction and privacy amplification algorithms, we have demonstrated error-corrected and privacy-amplified key rates up to 1.0 Mbps over a free-space link with a 1.25 Gbps clock. Using new detectors with improved timing resolution, careful wavelength selection and an increased clock speed, we expect to quadruple the transmission rate over a 1.5 km free-space link. We have identified scalable solutions for delivering sustained one-time-pad encryption at 10 Mbps, thus making it possible to integrate quantum cryptography with first-generation Ethernet protocols.

  11. Quantum cryptography without switching.

    Science.gov (United States)

    Weedbrook, Christian; Lance, Andrew M; Bowen, Warwick P; Symul, Thomas; Ralph, Timothy C; Lam, Ping Koy

    2004-10-22

    We propose a new coherent state quantum key distribution protocol that eliminates the need to randomly switch between measurement bases. This protocol provides significantly higher secret key rates with increased bandwidths than previous schemes that only make single quadrature measurements. It also offers the further advantage of simplicity compared to all previous protocols which, to date, have relied on switching.

  12. FREE-SPACE QUANTUM CRYPTOGRAPHY IN DAYLIGHT

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, R.J.; Buttler, W.T. [and others

    2000-01-01

    Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the quantum transmissions, nor evade detection, owing to Heisenberg's uncertainty principle. In this paper we describe the theory of quantum cryptography, and the most recent results from our experimental free-space system with which we have demonstrated for the first time the feasibility of quantum key generation over a point-to-point outdoor atmospheric path in daylight. We achieved a transmission distance of 0.5 km, which was limited only by the length of the test range. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on orbit. We present a feasibility analysis of surface-to-satellite quantum key generation.

  13. de Finetti Representation Theorem for Infinite-Dimensional Quantum Systems and Applications to Quantum Cryptography

    Science.gov (United States)

    Renner, R.; Cirac, J. I.

    2009-03-01

    We show that the quantum de Finetti theorem holds for states on infinite-dimensional systems, provided they satisfy certain experimentally verifiable conditions. This result can be applied to prove the security of quantum key distribution based on weak coherent states or other continuous variable states against general attacks.

  14. Cryptography, quantum computation and trapped ions

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard J.

    1998-03-01

    The significance of quantum computation for cryptography is discussed. Following a brief survey of the requirements for quantum computational hardware, an overview of the ion trap quantum computation project at Los Alamos is presented. The physical limitations to quantum computation with trapped ions are analyzed and an assessment of the computational potential of the technology is made.

  15. Optimal eavesdropping in cryptography with three-dimensional quantum states.

    Science.gov (United States)

    Bruss, D; Macchiavello, C

    2002-03-25

    We study optimal eavesdropping in quantum cryptography with three-dimensional systems, and show that this scheme is more secure against symmetric attacks than protocols using two-dimensional states. We generalize the according eavesdropping transformation to arbitrary dimensions, and discuss the connection with optimal quantum cloning.

  16. Chaos Cryptography with Dynamical Systems

    Science.gov (United States)

    Anderson, Robert; Morse, Jack; Schimmrigk, Rolf

    2001-11-01

    Cryptography is a subject that draws strength from an amazing variety of different mathematical fields, including such deep results as the Weil-Dwork-Deligne theorem on the zeta function. Physical theories have recently entered the subject as well, an example being the subject of quantum cryptography, motivated in part by Shor's insight into the vulnerability of prime number factorization based crypto systems. In this contribution we describe a cryptographic algorithm which is based on the dynamics of a class of physical models that exhibit chaotic behavior. More precisely, we consider dissipative systems which are described by nonlinear three-dimensional systems of differential equations with strange attractor surfaces of non-integer Lyapunov dimension. The time evolution of such systems in part of the moduli space shows unpredictable behavior, which suggests that they might be useful as pseudorandom number generators. We will show that this is indeed the case and illustrate our procedure mainly with the Lorenz attractor, though we also briefly mention the Rössler system. We use this class of nonlinear models to construct an extremely fast stream cipher with a large keyspace, which we test with Marsaglia's battery of DieHard tests.

  17. Distinguishability of quantum states and shannon complexity in quantum cryptography

    Science.gov (United States)

    Arbekov, I. M.; Molotkov, S. N.

    2017-07-01

    The proof of the security of quantum key distribution is a rather complex problem. Security is defined in terms different from the requirements imposed on keys in classical cryptography. In quantum cryptography, the security of keys is expressed in terms of the closeness of the quantum state of an eavesdropper after key distribution to an ideal quantum state that is uncorrelated to the key of legitimate users. A metric of closeness between two quantum states is given by the trace metric. In classical cryptography, the security of keys is understood in terms of, say, the complexity of key search in the presence of side information. In quantum cryptography, side information for the eavesdropper is given by the whole volume of information on keys obtained from both quantum and classical channels. The fact that the mathematical apparatuses used in the proof of key security in classical and quantum cryptography are essentially different leads to misunderstanding and emotional discussions [1]. Therefore, one should be able to answer the question of how different cryptographic robustness criteria are related to each other. In the present study, it is shown that there is a direct relationship between the security criterion in quantum cryptography, which is based on the trace distance determining the distinguishability of quantum states, and the criterion in classical cryptography, which uses guesswork on the determination of a key in the presence of side information.

  18. Quantum cryptography approaching the classical limit.

    Science.gov (United States)

    Weedbrook, Christian; Pirandola, Stefano; Lloyd, Seth; Ralph, Timothy C

    2010-09-10

    We consider the security of continuous-variable quantum cryptography as we approach the classical limit, i.e., when the unknown preparation noise at the sender's station becomes significantly noisy or thermal (even by as much as 10(4) times greater than the variance of the vacuum mode). We show that, provided the channel transmission losses do not exceed 50%, the security of quantum cryptography is not dependent on the channel transmission, and is therefore incredibly robust against significant amounts of excess preparation noise. We extend these results to consider for the first time quantum cryptography at wavelengths considerably longer than optical and find that regions of security still exist all the way down to the microwave.

  19. 802.11i Encryption Key Distribution Using Quantum Cryptography

    Directory of Open Access Journals (Sweden)

    Thi Mai Trang Nguyen

    2006-10-01

    Full Text Available Quantum cryptography is a promising solution towards absolute security in long term cryptosystems. While the use of quantum cryptography in fiber optical networks gets significant advances, research on the application of quantum cryptography in mobile wireless network is still premature. In this paper, we analyze the interests of using quantum cryptography in 802.11 wireless networks, and propose a scheme integrating quantum cryptography in 802.11i security mechanisms for the distribution of the encryption keys. The use of an apparatus network to provide alternative line-of-sight paths is also discussed.

  20. A Generic Simulation Framework for Non-Entangled based Experimental Quantum Cryptography and Communication: Quantum Cryptography and Communication Simulator (QuCCs)

    Science.gov (United States)

    Buhari, Abudhahir; Zukarnain, Zuriati Ahmad; Khalid, Roszelinda; Zakir Dato', Wira Jaafar Ahmad

    2016-11-01

    The applications of quantum information science move towards bigger and better heights for the next generation technology. Especially, in the field of quantum cryptography and quantum computation, the world already witnessed various ground-breaking tangible product and promising results. Quantum cryptography is one of the mature field from quantum mechanics and already available in the markets. The current state of quantum cryptography is still under various researches in order to reach the heights of digital cryptography. The complexity of quantum cryptography is higher due to combination of hardware and software. The lack of effective simulation tool to design and analyze the quantum cryptography experiments delays the reaching distance of the success. In this paper, we propose a framework to achieve an effective non-entanglement based quantum cryptography simulation tool. We applied hybrid simulation technique i.e. discrete event, continuous event and system dynamics. We also highlight the limitations of a commercial photonic simulation tool based experiments. Finally, we discuss ideas for achieving one-stop simulation package for quantum based secure key distribution experiments. All the modules of simulation framework are viewed from the computer science perspective.

  1. PREFACE: Quantum Information, Communication, Computation and Cryptography

    Science.gov (United States)

    Benatti, F.; Fannes, M.; Floreanini, R.; Petritis, D.

    2007-07-01

    The application of quantum mechanics to information related fields such as communication, computation and cryptography is a fast growing line of research that has been witnessing an outburst of theoretical and experimental results, with possible practical applications. On the one hand, quantum cryptography with its impact on secrecy of transmission is having its first important actual implementations; on the other hand, the recent advances in quantum optics, ion trapping, BEC manipulation, spin and quantum dot technologies allow us to put to direct test a great deal of theoretical ideas and results. These achievements have stimulated a reborn interest in various aspects of quantum mechanics, creating a unique interplay between physics, both theoretical and experimental, mathematics, information theory and computer science. In view of all these developments, it appeared timely to organize a meeting where graduate students and young researchers could be exposed to the fundamentals of the theory, while senior experts could exchange their latest results. The activity was structured as a school followed by a workshop, and took place at The Abdus Salam International Center for Theoretical Physics (ICTP) and The International School for Advanced Studies (SISSA) in Trieste, Italy, from 12-23 June 2006. The meeting was part of the activity of the Joint European Master Curriculum Development Programme in Quantum Information, Communication, Cryptography and Computation, involving the Universities of Cergy-Pontoise (France), Chania (Greece), Leuven (Belgium), Rennes1 (France) and Trieste (Italy). This special issue of Journal of Physics A: Mathematical and Theoretical collects 22 contributions from well known experts who took part in the workshop. They summarize the present day status of the research in the manifold aspects of quantum information. The issue is opened by two review articles, the first by G Adesso and F Illuminati discussing entanglement in continuous variable

  2. A Survey on Recent Security Trends using Quantum Cryptography

    Directory of Open Access Journals (Sweden)

    T. Rubya

    2010-12-01

    Full Text Available Cryptography is the science of keeping private information from nauthorized access of ensuring data integrity and authentication, and it is the strongest tool for controlling against much kind of security threats. Role of cryptography appears in many secured area like government agencies, large banks, telecommunications companies and other corporations who handle sensitive or military data. Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. This paper onsists of the main aspects of quantum cryptography and it investigates the information about where and all quantum cryptography takes place.

  3. Free-space quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.; Lamoreaux, S.K.; Morgan, G.L.; Nordholt, J.E.; Peterson, C.G.

    1998-12-31

    An experimental free-space quantum key distribution (QKD) system has been tested over an outdoor optical path of {approximately}1 km under nighttime conditions at Los Alamos National Laboratory. This system employs the Bennett 92 protocol; here the authors give a brief overview of this protocol, and describe the experimental implementation of it. An analysis of the system efficiency is presented, as well as a description of the error detection protocol, which employs a two-dimensional parity check scheme. Finally, the susceptibility of this system to eavesdropping by various techniques is determined. Possible applications include the rekeying of satellites in low earth orbit.

  4. Direction Cryptography in Quantum Communications

    CERN Document Server

    Simmons, W; Simmons, Walter; Pakvasa, Sandip

    2003-01-01

    We examine a situation in which an information-carrying signal is sent from two sources to a common receiver. The radiation travels through free space in the presence of noise. The information resides in a relationship between the two beams. We inquire into whether itis possible, in principle, that the locations of the transmitters can be concealed from a party who receives the radiation and decodes the information. Direction finding entails making a set of measurements on asignal and constructing an analytic continuation of the time dependent fields from the results. The fact that this process is generally different in quantum mechanics and in classical electrodynamics is the basis in this investigation. We develop a model based upon encoding information into a microscopic, transverse, non-local quantum image (whose dimensions are of the order of a few wavelengths) and using a detector of a type recently proposed by Strekalov et al. The optical system, which uses SPDC (Spontaneous Parametric Down Conversion)...

  5. Quantum discord as a resource for quantum cryptography.

    Science.gov (United States)

    Pirandola, Stefano

    2014-11-07

    Quantum discord is the minimal bipartite resource which is needed for a secure quantum key distribution, being a cryptographic primitive equivalent to non-orthogonality. Its role becomes crucial in device-dependent quantum cryptography, where the presence of preparation and detection noise (inaccessible to all parties) may be so strong to prevent the distribution and distillation of entanglement. The necessity of entanglement is re-affirmed in the stronger scenario of device-independent quantum cryptography, where all sources of noise are ascribed to the eavesdropper.

  6. Postselection technique for quantum channels with applications to quantum cryptography.

    Science.gov (United States)

    Christandl, Matthias; König, Robert; Renner, Renato

    2009-01-16

    We propose a general method for studying properties of quantum channels acting on an n-partite system, whose action is invariant under permutations of the subsystems. Our main result is that, in order to prove that a certain property holds for an arbitrary input, it is sufficient to consider the case where the input is a particular de Finetti-type state, i.e., a state which consists of n identical and independent copies of an (unknown) state on a single subsystem. Our technique can be applied to the analysis of information-theoretic problems. For example, in quantum cryptography, we get a simple proof for the fact that security of a discrete-variable quantum key distribution protocol against collective attacks implies security of the protocol against the most general attacks. The resulting security bounds are tighter than previously known bounds obtained with help of the exponential de Finetti theorem.

  7. Partially Blind Signatures Based on Quantum Cryptography

    Science.gov (United States)

    Cai, Xiao-Qiu; Niu, Hui-Fang

    2012-12-01

    In a partially blind signature scheme, the signer explicitly includes pre-agreed common information in the blind signature, which can improve the availability and performance. We present a new partially blind signature scheme based on fundamental properties of quantum mechanics. In addition, we analyze the security of this scheme, and show it is not possible to forge valid partially blind signatures. Moreover, the comparisons between this scheme and those based on public-key cryptography are also discussed.

  8. Multiphoton entanglement concentration and quantum cryptography.

    Science.gov (United States)

    Durkin, Gabriel A; Simon, Christoph; Bouwmeester, Dik

    2002-05-01

    Multiphoton states from parametric down-conversion can be entangled both in polarization and photon number. Maximal high-dimensional entanglement can be concentrated postselectively from these states via photon counting. This makes them natural candidates for quantum key distribution, where the presence of more than one photon per detection interval has up to now been considered undesirable. We propose a simple multiphoton cryptography protocol for the case of low losses.

  9. Spectral coherent-state quantum cryptography.

    Science.gov (United States)

    Cincotti, Gabriella; Spiekman, Leo; Wada, Naoya; Kitayama, Ken-ichi

    2008-11-01

    A novel implementation of quantum-noise optical cryptography is proposed, which is based on a simplified architecture that allows long-haul, high-speed transmission in a fiber optical network. By using a single multiport encoder/decoder and 16 phase shifters, this new approach can provide the same confidentiality as other implementations of Yuen's encryption protocol, which use a larger number of phase or polarization coherent states. Data confidentiality and error probability for authorized and unauthorized receivers are carefully analyzed.

  10. Position-based quantum cryptography and catalytic computation

    NARCIS (Netherlands)

    Speelman, F.

    2016-01-01

    In this thesis, we present several results along two different lines of research. The first part concerns the study of position-based quantum cryptography, a topic in quantum cryptography. By combining quantum mechanics with special relativity theory, new cryptographic tasks can be developed that us

  11. IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY

    Directory of Open Access Journals (Sweden)

    Mohamed Elboukhari

    2010-07-01

    Full Text Available Quantum Cryptography or Quantum Key Distribution (QKD solves the key distribution problem byallowing the exchange of a cryptographic key between two remote parties with absolute security,guaranteed by the laws of quantum physics. Extensive studies have been undertaken on QKD since it wasnoted that quantum computers could break public key cryptosystems based on number theory. Actually,the progress of research in this field allows the implementation of QKD outside of laboratories. Effortsare made to exploit this technology in the existing communication networks and to improve theperformance and reliability of the implemented technologies. Some research is in progress for theintegration of QKD with the protocols in different layers of OSI model. The examples of such researcheffort are the integration of QKD in point-to-point protocol (PPP OSI layer 2 and the integration ofQKD with IPSEC at OSI layer-3. All these works are moving towards the utilization of QKD technologyfor enhancing the security of modern computing applications on the internet. In this paper, we present anovel extension of the TLS protocol based on QKD. We introduce a scheme for integrating QuantumCryptography in this protocol. Our approach improves the security of the process of authentication anddata encryption. Also, we describe an example to illustrate the feasibility of our scheme’simplementation.

  12. High Data Rate Quantum Cryptography

    Science.gov (United States)

    Kwiat, Paul; Christensen, Bradley; McCusker, Kevin; Kumor, Daniel; Gauthier, Daniel

    2015-05-01

    While quantum key distribution (QKD) systems are now commercially available, the data rate is a limiting factor for some desired applications (e.g., secure video transmission). Most QKD systems receive at most a single random bit per detection event, causing the data rate to be limited by the saturation of the single-photon detectors. Recent experiments have begun to explore using larger degree of freedoms, i.e., temporal or spatial qubits, to optimize the data rate. Here, we continue this exploration using entanglement in multiple degrees of freedom. That is, we use simultaneous temporal and polarization entanglement to reach up to 8.3 bits of randomness per coincident detection. Due to current technology, we are unable to fully secure the temporal degree of freedom against all possible future attacks; however, by assuming a technologically-limited eavesdropper, we are able to obtain 23.4 MB/s secure key rate across an optical table, after error reconciliation and privacy amplification. In this talk, we will describe our high-rate QKD experiment, with a short discussion on our work towards extending this system to ship-to-ship and ship-to-shore communication, aiming to secure the temporal degree of freedom and to implement a 30-km free-space link over a marine environment.

  13. Stability assessment of QKD procedures in commercial quantum cryptography systems versus quality of dark channel

    Science.gov (United States)

    Jacak, Monika; Melniczuk, Damian; Jacak, Janusz; Jóźwiak, Ireneusz; Gruber, Jacek; Jóźwiak, Piotr

    2015-02-01

    In order to assess the susceptibility of the quantum key distribution (QKD) systems to the hacking attack including simultaneous and frequent system self-decalibrations, we analyze the stability of the QKD transmission organized in two commercially available systems. The first one employs non-entangled photons as flying qubits in the dark quantum channel for communication whereas the second one utilizes the entangled photon pairs to secretly share the cryptographic key. Applying standard methods of the statistical data analysis to the characteristic indicators of the quality of the QKD communication (the raw key exchange rate [RKER] and the quantum bit error rate [QBER]), we have estimated the pace of the self-decalibration of both systems and the repeatability rate in the case of controlled worsening of the dark channel quality.

  14. Experimental quantum secret sharing and third-man quantum cryptography.

    Science.gov (United States)

    Chen, Yu-Ao; Zhang, An-Ning; Zhao, Zhi; Zhou, Xiao-Qi; Lu, Chao-Yang; Peng, Cheng-Zhi; Yang, Tao; Pan, Jian-Wei

    2005-11-11

    Quantum secret sharing (QSS) and third-man quantum cryptography (TQC) are essential for advanced quantum communication; however, the low intensity and fragility of the multiphoton entanglement source in previous experiments have made their realization an extreme experimental challenge. Here, we develop and exploit an ultrastable high intensity source of four-photon entanglement to report an experimental realization of QSS and TQC. The technology developed in our experiment will be important for future multiparty quantum communication.

  15. Three-Stage Quantum Cryptography Protocol under Collective-Rotation Noise

    Directory of Open Access Journals (Sweden)

    Linsen Wu

    2015-05-01

    Full Text Available Information security is increasingly important as society migrates to the information age. Classical cryptography widely used nowadays is based on computational complexity, which means that it assumes that solving some particular mathematical problems is hard on a classical computer. With the development of supercomputers and, potentially, quantum computers, classical cryptography has more and more potential risks. Quantum cryptography provides a solution which is based on the Heisenberg uncertainty principle and no-cloning theorem. While BB84-based quantum protocols are only secure when a single photon is used in communication, the three-stage quantum protocol is multi-photon tolerant. However, existing analyses assume perfect noiseless channels. In this paper, a multi-photon analysis is performed for the three-stage quantum protocol under the collective-rotation noise model. The analysis provides insights into the impact of the noise level on a three-stage quantum cryptography system.

  16. High-rate measurement-device-independent quantum cryptography

    DEFF Research Database (Denmark)

    Pirandola, Stefano; Ottaviani, Carlo; Spedalieri, Gaetana

    2015-01-01

    Quantum cryptography achieves a formidable task - the remote distribution of secret keys by exploiting the fundamental laws of physics. Quantum cryptography is now headed towards solving the practical problem of constructing scalable and secure quantum networks. A significant step in this direction...... than those currently achieved. Our protocol could be employed to build high-rate quantum networks where devices securely connect to nearby access points or proxy servers....

  17. Quantum cryptography with squeezed states

    CERN Document Server

    Hillery, M

    1999-01-01

    A quantum key distribution scheme based on the use of displaced squeezed vacuum states is presented. The states are squeezed in one of two field quadrature components, and the value of the squeezed component is used to encode a character from an alphabet. The uncertainty relation between quadrature components prevents an eavesdropper from determining both with enough precision to determine the character being sent. Losses degrade the performance of this scheme, but it is possible to use phase-sensitive amplifiers to boost the signal and partially compensate for their effect.

  18. EDITORIAL: Focus on Quantum Cryptography: Theory and Practice FOCUS ON QUANTUM CRYPTOGRAPHY: THEORY AND PRACTICE

    Science.gov (United States)

    Lütkenhaus, N.; Shields, A. J.

    2009-04-01

    distribution network in Vienna M Peev, C Pacher, R Alléaume, C Barreiro, J Bouda, W Boxleitner, T Debuisschert, E Diamanti, M Dianati, J F Dynes, S Fasel, S Fossier, M Fürst, J-D Gautier, O Gay, N Gisin, P Grangier, A Happe, Y Hasani, M Hentschel, H Hübel, G Humer, T Länger, M Legré, R Lieger, J Lodewyck, T Lorünser, N Lütkenhaus, A Marhold, T Matyus, O Maurhart, L Monat, S Nauerth, J-B Page, A Poppe, E Querasser, G Ribordy, S Robyr, L Salvail, A W Sharpe, A J Shields, D Stucki, M Suda, C Tamas, T Themel, R T Thew, Y Thoma, A Treiber, P Trinkler, R Tualle-Brouri, F Vannel, N Walenta, H Weier, H Weinfurter, I Wimberger, Z L Yuan, H Zbinden and A Zeilinger Stable quantum key distribution with active polarization control based on time-division multiplexing J Chen, G Wu, L Xu, X Gu, E Wu and H Zeng Controlling passively quenched single photon detectors by bright light Vadim Makarov Information leakage via side channels in freespace BB84 quantum cryptography Sebastian Nauerth, Martin Fürst, Tobias Schmitt-Manderbach, Henning Weier and Harald Weinfurter Standardization of quantum key distribution and the ETSI standardization initiative ISG-QKD Thomas Länger and Gaby Lenhart Entangled quantum key distribution with a biased basis choice Chris Erven, Xiongfeng Ma, Raymond Laflamme and Gregor Weihs Finite-key analysis for practical implementations of quantum key distribution Raymond Y Q Cai and Valerio Scarani Field test of a continuous-variable quantum key distribution prototype S Fossier, E Diamanti, T Debuisschert, A Villing, R Tualle-Brouri and P Grangier Physics and application of photon number resolving detectors based on superconducting parallel nanowires F Marsili, D Bitauld, A Gaggero, S Jahanmirinejad, R Leoni, F Mattioli and A Fiore Device-independent quantum key distribution secure against collective attacks Stefano Pironio, Antonio Acín, Nicolas Brunner, Nicolas Gisin, Serge Massar and Valerio Scarani 1310 nm differential-phase-shift QKD system using

  19. Practical Quantum Cryptography for Secure Free-Space Communications

    Energy Technology Data Exchange (ETDEWEB)

    Buttler, W.T.; Hughes, R.J.; Kwiat, P.G.; Lamoreaux, S.K.; Morgan, G.L.; Nordholt, J.E.; Peterson, C.G.

    1999-02-01

    Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the quantum transmissions, nor evade detection, owing to Heisenberg's uncertainty principle. In this paper we describe the theory of quantum cryptography, and the most recent results from our experimental free-space system with which we have demonstrated for the first time the feasibility of quantum key generation over a point-to-point outdoor atmospheric path in daylight. We achieved a transmission distance of 0.5 km, which was limited only by the length of the test range. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on orbit. We present a feasibility analysis of surface-to-satellite quantum key generation.

  20. Entropy in quantum information theory - Communication and cryptography

    DEFF Research Database (Denmark)

    Majenz, Christian

    to density matrices, the von Neumann entropy behaves dierently. The latter does not, for example, have the monotonicity property that the latter possesses: When adding another quantum system, the entropy can decrease. A long-standing open question is, whether there are quantum analogues of unconstrained non......Entropies have been immensely useful in information theory. In this Thesis, several results in quantum information theory are collected, most of which use entropy as the main mathematical tool. The rst one concerns the von Neumann entropy. While a direct generalization of the Shannon entropy...... in quantum Shannon theory. While immensely more entanglement-consuming, the variant of port based teleportation is interesting for applications like instantaneous non-local computation and attacks on quantum position-based cryptography. Port based teleportation cannot be implemented perfectly...

  1. Twenty Seven Years of Quantum Cryptography!

    Science.gov (United States)

    Hughes, Richard

    2011-03-01

    One of the fundamental goals of cryptographic research is to minimize the assumptions underlying the protocols that enable secure communications between pairs or groups of users. In 1984, building on earlier research by Stephen Wiesner, Charles Bennett and Gilles Brassard showed how quantum physics could be harnessed to provide information-theoretic security for protocols such as the distribution of cryptographic keys, which enables two parties to secure their conventional communications. Bennett and Brassard and colleagues performed a proof-of-principle quantum key distribution (QKD) experiment with single-photon quantum state transmission over a 32-cm air path in 1991. This seminal experiment led other researchers to explore QKD in optical fibers and over line-of-sight outdoor atmospheric paths (``free-space''), resulting in dramatic increases in range, bit rate and security. These advances have been enabled by improvements in sources and single-photon detectors. Also in 1991 Artur Ekert showed how the security of QKD could be related to quantum entanglement. This insight led to a deeper understanding and proof of QKD security with practical sources and detectors in the presence of transmission loss and channel noise. Today, QKD has been implemented over ranges much greater than 100km in both fiber and free-space, multi-node network testbeds have been demonstrated, and satellite-based QKD is under study in several countries. ``Quantum hacking'' researchers have shown the importance of extending security considerations to the classical devices that produce and detect the photon quantum states. New quantum cryptographic protocols such as secure identification have been proposed, and others such as quantum secret splitting have been demonstrated. It is now possible to envision quantum cryptography providing a more secure alternative to present-day cryptographic methods for many secure communications functions. My talk will survey these remarkable developments.

  2. The Secrecy Capacity of Practical Quantum Cryptography

    CERN Document Server

    Gilbert, G

    2001-01-01

    Quantum cryptography has attracted much recent attention due to its potential for providing secret communications that cannot be decrypted by any amount of computational effort. This is the first analysis of the secrecy of a practical implementation of the BB84 protocol that simultaneously takes into account and presents the {\\it full} set of complete analytical expressions for effects due to the presence of pulses containing multiple photons in the attenuated output of the laser, the finite length of individual blocks of key material, losses due to error correction, privacy amplification, continuous authentication, errors in polarization detection, the efficiency of the detectors, and attenuation processes in the transmission medium. The analysis addresses eavesdropping attacks on individual photons rather than collective attacks in general. Of particular importance is the first derivation of the necessary and sufficient amount of privacy amplification compression to ensure secrecy against the loss of key ma...

  3. Quantum cryptography for secure free-space communications

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.; Lamoreaux, S.K.; Luther, G.G.; Morgan, G.L.; Nordholt, J.E.; Peterson, C.G.

    1999-03-01

    The secure distribution of the secret random bit sequences known as key material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is a new technique for secure key distribution with single-photon transmissions: Heisenberg`s uncertainty principle ensures that an adversary can neither successfully tap the key transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). The authors have developed experimental quantum cryptography systems based on the transmission of non-orthogonal photon polarization states to generate shared key material over line-of-sight optical links. Key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. The authors have developed and tested a free-space quantum key distribution (QKD) system over an outdoor optical path of {approximately}1 km at Los Alamos National Laboratory under nighttime conditions. Results show that free-space QKD can provide secure real-time key distribution between parties who have a need to communicate secretly. Finally, they examine the feasibility of surface to satellite QKD.

  4. Quantum random number generators and their applications in cryptography

    Science.gov (United States)

    Stipcevic, Mario

    2012-06-01

    Random number generators (RNG) are an important resource in many areas: cryptography (both quantum and classical), probabilistic computation (Monte Carlo methods), numerical simulations, industrial testing and labeling, hazard games, scientific research etc. Because today's computers are deterministic, they can not create random numbers unless complemented with a physical RNG. Randomness of a RNG can be defined and scientifically characterized and measured. Especially valuable is the information-theoretic provable RNG which, at state of the art, seem to be possible only by harvest of randomness inherent to certain (simple) quantum systems and such a generator we call Quantum RNG (QRNG). On the other hand, current industry standards dictate use of RNGs based on free running oscillators (FRO) whose randomness is derived from electronics noise present in logic circuits and which, although quantum in nature, cannot be strictly proven. This approach is currently used in FPGA and ASIC chips. We compare weak and strong aspects of the two approaches for use in cryptography and in general. We also give an alternative definition of randomness, discuss usage of single photon detectors in realization of QRNGs and give several examples where QRNG can significantly improve security of a cryptographic system.

  5. Integration of Quantum Cryptography through Satellite Networks Transmission

    Directory of Open Access Journals (Sweden)

    Skander Aris

    2011-01-01

    Full Text Available Problem statement: The security of the telecommunications satellite has become a crucial issue. The telecommunications can be set using the classical cryptography. But this so-called classical cryptography provides cryptographic security. This means that security is based on the difficulty of some mathematics problems. On the other hand, quantum cryptography provides security without conditions based on the law of quantum physics. This method, called the theoretic information security is evidenced using the theory of information. Approach: In this study, we study whether quantum cryptography can be applied in the frame of the satellite telecommunications network. To do this in our project, we present theories regarding the following issues: Telecommunications Station and Satellite Communication Networks, Quantum Key Distribution, Open Space and Satellites, Analyses in different Scenarios between the Satellite and Earth station. Results: Quantum communications offers many advantages for secure data transmission, in our implementation study, we presented different scenarios of quantum key exchange between satellites and ground stations for possible approach to subsystem with quantum communication in space, capable of generating and detecting entangled photons as well as faint laser pulses. Conclusion: The use of satellites to distribute quantum photon provides a unique solution for long-distance. Moreover, quantum cryptography is a satisfactory solution to improve the safety problem. So, the quantum transmissions are the future of telecommunications.

  6. Quantum random number generators and their use in cryptography

    CERN Document Server

    Stipcevic, Mario

    2011-01-01

    Random number generators (RNG) are an important resource in many areas: cryptography (both quantum and classical), probabilistic computation (Monte Carlo methods), numerical simulations, industrial testing and labeling, hazard games, scientific research, etc. Because today's computers are deterministic, they can not create random numbers unless complemented with a RNG. Randomness of a RNG can be precisely, scientifically characterized and measured. Especially valuable is the information-theoretic provable RNG (True RNG - TRNG) which, at state of the art, seem to be possible only by use of physical randomness inherent to certain (simple) quantum systems. On the other hand, current industry standard dictates use of RNG's based on free running oscillators (FRO) whose randomness is derived from electronics noise present in logic circuits and which cannot be strictly proven. This approach is currently used in 3-rd and 4-th generation FPGA and ASIC hardware, unsuitable for realization of quantum TRNG. We compare we...

  7. On a simple attack, limiting the range transmission of secret keys in a system of quantum cryptography based on coding in a sub-carrier frequency

    Science.gov (United States)

    Klimov, A. N.; Kulik, S. P.; Molotkov, S. N.; Potapova, T. A.

    2017-03-01

    In the paper by Gleim et al (2016 Opt. Express 24 2619), it was declared that the system of quantum cryptography, exploiting quantum key distribution (QKD) protocol BB84 with the additional reference state and encoding in a sub-carrier, is able to distribute secret keys at a distance of 210 km. The following shows that a simple attack realized with a beam splitter results in a loss of privacy of the keys over substantially smaller distances. It turns out that the actual length of the secret key transmission for the QKD system encoding in the sub-carrier frequency is ten times less than that declared in Gleim et al (2016 Opt. Express 24 2619). Therefore it is impossible to safely use the keys when distributed at a larger length of the communication channel than shown below. The maximum communication distance does not exceed 22 km, even in the most optimistic scenario.

  8. Cryptography with chaos using Chua's system

    Science.gov (United States)

    Oliveira, C. H.; Pizolato, J. C., Jr.

    2011-03-01

    In the last years, chaotic systems have been applied in information security. These systems have a complex and unpredictable behavior, what makes them more attractive for data cryptography applications. In this work, the chaotic behavior of signals generated by Chua's system is combined with the original information in order to obtain a safe cryptographic method. The experimental results demonstrate that the proposed scheme can be used in data cryptography applications.

  9. SECOQC White Paper on Quantum Key Distribution and Cryptography

    CERN Document Server

    Alleaume, R; Branciard, C; Debuisschert, T; Dianati, M; Gisin, N; Godfrey, M; Grangier, P; Langer, T; Leverrier, A; Lütkenhaus, N; Painchault, P; Peev, M; Poppe, A; Pornin, T; Rarity, J; Renner, R; Ribordy, G; Riguidel, M; Salvail, L; Shields, A; Weinfurter, H; Zeilinger, A; Alleaume, Romain; Bouda, Jan; Branciard, Cyril; Debuisschert, Thierry; Dianati, Mehrdad; Gisin, Nicolas; Godfrey, Mark; Grangier, Philippe; Langer, Thomas; Leverrier, Anthony; Lutkenhaus, Norbert; Painchault, Philippe; Peev, Momtchil; Poppe, Andreas; Pornin, Thomas; Rarity, John; Renner, Renato; Ribordy, Gregoire; Riguidel, Michel; Salvail, Louis; Shields, Andrew; Weinfurter, Harald; Zeilinger, Anton

    2007-01-01

    The SECOQC White Paper on Quantum Key Distribution and Cryptography is the outcome on a thorough consultation and discussion among the participants of the European project SECOQC (www.secoqc.net). This paper is a review article that attempts to position Quantum Key Distribution (QKD) in terms of cryptographic applications. A detailed comparison of QKD with the solutions currently in use to solve the key distribution problem, based on classical cryptography, is provided. We also detail how the work on QKD networks lead within SECOQC will allow the deployment of long-distance secure communication infrastructures based on quantum cryptography. The purpose of the White Paper is finally to promote closer collaboration between classical and quantum cryptographers. We believe that very fruitful research, involving both communities, could emerge in the future years and try to sketch what may be the next challenges in this direction.

  10. Quantum cryptography in real-life applications: Assumptions and security

    Science.gov (United States)

    Zhao, Yi

    Quantum cryptography, or quantum key distribution (QKD), provides a means of unconditionally secure communication. The security is in principle based on the fundamental laws of physics. Security proofs show that if quantum cryptography is appropriately implemented, even the most powerful eavesdropper cannot decrypt the message from a cipher. The implementations of quantum crypto-systems in real life may not fully comply with the assumptions made in the security proofs. Such discrepancy between the experiment and the theory can be fatal to the security of a QKD system. In this thesis we address a number of these discrepancies. A perfect single-photon source is often assumed in many security proofs. However, a weak coherent source is widely used in a real-life QKD implementation. Decoy state protocols have been proposed as a novel approach to dramatically improve the performance of a weak coherent source based QKD implementation without jeopardizing its security. Here, we present the first experimental demonstrations of decoy state protocols. Our experimental scheme was later adopted by most decoy state QKD implementations. In the security proof of decoy state protocols as well as many other QKD protocols, it is widely assumed that a sender generates a phase-randomized coherent state. This assumption has been enforced in few implementations. We close this gap in two steps: First, we implement and verify the phase randomization experimentally; second, we prove the security of a QKD implementation without the coherent state assumption. In many security proofs of QKD, it is assumed that all the detectors on the receiver's side have identical detection efficiencies. We show experimentally that this assumption may be violated in a commercial QKD implementation due to an eavesdropper's malicious manipulation. Moreover, we show that the eavesdropper can learn part of the final key shared by the legitimate users as a consequence of this violation of the assumptions.

  11. FRAMEWORK FOR WIRELESS NETWORK SECURITY USING QUANTUM CRYPTOGRAPHY

    Directory of Open Access Journals (Sweden)

    Priyanka Bhatia

    2014-12-01

    Full Text Available Data that is transient over an unsecured wireless network is always susceptible to being intercepted by anyone within the range of the wireless signal. Hence providing secure communication to keep the user’s information and devices safe when connected wirelessly has become one of the major concerns. Quantum cryptography provides a solution towards absolute communication security over the network by encoding information as polarized photons, which can be sent through the air. This paper explores on the aspect of application of quantum cryptography in wireless networks. In this paper we present a methodology for integrating quantum cryptography and security of IEEE 802.11 wireless networks in terms of distribution of the encryption keys

  12. Field Experiment on a Robust Hierarchical Metropolitan Quantum Cryptography Network

    CERN Document Server

    Xu, Fangxing; Wang, Shuang; Yin, Zhenqiang; Zhang, Yang; Liu, Yun; Zhou, Zheng; Zhao, Yibo; Li, Hongwei; Liu, Dong; Han, Zhengfu; Guo, Guangcan

    2009-01-01

    A hierarchical metropolitan quantum cryptography network upon the inner-city commercial telecom fiber cables is reported in this paper. The seven-user network contains a four-node backbone net with one node acting as the subnet gateway, a two-user subnet and a single-fiber access link, which is realized by the Faraday-Michelson Interferometer set-ups. The techniques of the quantum router, optical switch and trusted relay are assembled here to guarantee the feasibility and expandability of the quantum cryptography network. Five nodes of the network are located in the government departments and the secure keys generated by the quantum key distribution network are utilized to encrypt the instant video, sound, text messages and confidential files transmitting between these bureaus. The whole implementation including the hierarchical quantum cryptographic communication network links and corresponding application software shows a big step toward the practical user-oriented network with high security level.

  13. Entangled state quantum cryptography: eavesdropping on the ekert protocol

    Science.gov (United States)

    Naik; Peterson; White; Berglund; Kwiat

    2000-05-15

    Using polarization-entangled photons from spontaneous parametric down-conversion, we have implemented Ekert's quantum cryptography protocol. The near-perfect correlations of the photons allow the sharing of a secret key between two parties. The presence of an eavesdropper is continually checked by measuring Bell's inequalities. We investigated several possible eavesdropper strategies, including pseudo-quantum-nondemolition measurements. In all cases, the eavesdropper's presence was readily apparent. We discuss a procedure to increase her detectability.

  14. Quantum Cryptography for Secure Communications to Low-Earth Orbit Satellites

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.; Lamoreaux, S.K.; Morgan, G.L.; Peterson, C.G.; Twyeffort, E.; Simmons, C.M.; Nordholt, J.E.

    1999-06-03

    This is the final report of a three-year, Laboratory Directed Research and Development (LDRD) project at Los Alamos National Laboratory (LANL). Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics. An adversary can neither successfully tap the quantum transmissions, nor evade detection. Key material is built up using the transmission of a single-photon per bit. We have developed an experimental quantum cryptography system based on the transmission of non-orthogonal single-photon polarization states to generate shared key material over line-of-sight optical links. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on in orbit.

  15. A fully efficient secure quantum cryptography protocol

    CERN Document Server

    Xiang Bin Wang

    2001-01-01

    Since Bennett and Brassard suggested their quantum key distribution protocol(BB84 protocol) in 1984, the subject has been extensively studied both theoretically and experimentally. The protocol allows two remote parties Alice and Bob to create and share a secret key using a quantum channel and public authenticated communications. The quantum key created in this way is in principle secure because eavesdroppers have no way to tap the quantum channel without disturb it. In the protocol, two level quantum bits are measured in two basis, $X$ and $Z$ randomly by Bob. So at least half of the measurement results will be discarded because Bob has a half probability taking the measurement in a wrong basis. On the other hand, the security is not the maximum in BB84 protocol. To increase the security, one may straightforwardly increase the number of basis used in the protocol. For example, six state protocol was proposed recently for two level system. However, in this way, it seems to be the case that the higher the secu...

  16. Development of mechanism for enhancing data security in quantum cryptography

    CERN Document Server

    Singh, Ajit

    2011-01-01

    Nowadays security in communication is increasingly important to the network communication because many categories of data are required restriction on authorization of access, modify, delete and insert. Quantum cryptography is one of the solutions that use property of polarization to ensure that transmitted data is not tampered. The research paper provides the mechanism that enhances the data security in quantum cryptography during exchange of information. In first phase detailed explanation of Quantum key distribution's BB84 protocol is given. BB84 protocol is used as the basis for the mechanism. In next phase the proposed mechanism is explained. The proposed mechanism combines BB84 protocol at two levels, from sender to receiver and then from receiver to sender. Moreover, a logic circuit is used to combine the bits hence to reduce the probability of eavesdropping. The key obtained can be used to exchange the information securely further it can help in encryption and decryption of crucial data. Double level B...

  17. Verification of Quantum Cryptography Protocols by Model Checking

    Directory of Open Access Journals (Sweden)

    Mohamed Elboukhari

    2010-10-01

    Full Text Available Unlike classical cryptography which is based on mathematical functions, Quantum Cryptography orQuantum Key Distribution (QKD exploits the laws of quantum physics to offer unconditionally securecommunication. The progress of research in this field allows the anticipation of QKD to be availableoutside of laboratories within the next few years and efforts are made to improve the performance andreliability of the implemented technologies. But despite this big progress, several challenges remain. Forexample the task of how to test the devices of QKD did not yet receive enough attention. These apparatusesbecome heterogeneous, complex and so demand a big verification effort. In this paper we propose to studyquantum cryptography protocols by applying the technique of probabilistic model checking. Using PRISMtool, we analyze the security of BB84 protocol and we are focused on the specific security property ofeavesdropper's information gain on the key derived from the implementation of this protocol. We show thatthis property is affected by the parameters of the eavesdropper’s power and the quantum channel.

  18. Finite key analysis in quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, T.

    2007-10-31

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes

  19. Nonlinear laser dynamics from quantum dots to cryptography

    CERN Document Server

    Lüdge, Kathy

    2012-01-01

    A distinctive discussion of the nonlinear dynamical phenomena of semiconductor lasers. The book combines recent results of quantum dot laser modeling with mathematical details and an analytic understanding of nonlinear phenomena in semiconductor lasers and points out possible applications of lasers in cryptography and chaos control. This interdisciplinary approach makes it a unique and powerful source of knowledge for anyone intending to contribute to this field of research.By presenting both experimental and theoretical results, the distinguished authors consider solitary lase

  20. Practical free-space quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.; Lamoreaux, S.K.; Luther, G.G.; Morgan, G.L.; Nordholt, J.E.; Peterson, C.G.; Simmons, C.M.

    1998-12-01

    An experimental free-space quantum key distribution (QKD) system has been tested over an outdoor optical path of {approx} 1 km under nighttime conditions at Los Alamos National Laboratory. This system employs the Bennett 92 protocol; here the authors give a brief overview of this protocol, and describe the experimental implementation of it. An analysis of the system efficiency is presented, as well as a description of the error detection protocol, which employs a two-dimensional parity check scheme. Finally, the susceptibility of this system to eavesdropping by various techniques is determined, and the effectiveness of privacy amplification procedures is discussed. The conclusions are that free-space QKD is both effective and secure; possible applications include the rekeying of satellites in low earth orbit.

  1. Quantum Overloading Cryptography Using Single-Photon Nonlocality

    Institute of Scientific and Technical Information of China (English)

    TAN Yong-Gang; CAI Qing-Yu; SHI Ting-Yun

    2007-01-01

    @@ Using the single-photon nonlocality, we propose a quantum novel overloading cryptography scheme, in which a single photon carries two bits information in one-way quantum channel. Two commutative modes of the single photon, the polarization mode and the spatial mode, are used to encode secret information. Strict time windows are set to detect the impersonation attack. The spatial mode which denotes the existence of photons is noncommutative with the phase of the photon, so that our scheme is secure against photon-number-splitting attack. Our protocol may be secure against individual attack.

  2. Quantum cryptography using coherent states: Randomized encryption and key generation

    Science.gov (United States)

    Corndorf, Eric

    With the advent of the global optical-telecommunications infrastructure, an increasing number of individuals, companies, and agencies communicate information with one another over public networks or physically-insecure private networks. While the majority of the traffic flowing through these networks requires little or no assurance of secrecy, the same cannot be said for certain communications between banks, between government agencies, within the military, and between corporations. In these arenas, the need to specify some level of secrecy in communications is a high priority. While the current approaches to securing sensitive information (namely the public-key-cryptography infrastructure and deterministic private-key ciphers like AES and 3DES) seem to be cryptographically strong based on empirical evidence, there exist no mathematical proofs of secrecy for any widely deployed cryptosystem. As an example, the ubiquitous public-key cryptosystems infer all of their secrecy from the assumption that factoring of the product of two large primes is necessarily time consuming---something which has not, and perhaps cannot, be proven. Since the 1980s, the possibility of using quantum-mechanical features of light as a physical mechanism for satisfying particular cryptographic objectives has been explored. This research has been fueled by the hopes that cryptosystems based on quantum systems may provide provable levels of secrecy which are at least as valid as quantum mechanics itself. Unfortunately, the most widely considered quantum-cryptographic protocols (BB84 and the Ekert protocol) have serious implementation problems. Specifically, they require quantum-mechanical states which are not readily available, and they rely on unproven relations between intrusion-level detection and the information available to an attacker. As a result, the secrecy level provided by these experimental implementations is entirely unspecified. In an effort to provably satisfy the cryptographic

  3. Cryptography from quantum uncertainty in the presence of quantum side information

    NARCIS (Netherlands)

    Bouman, Niek Johannes

    2012-01-01

    The thesis starts with a high-level introduction into cryptography and quantum mechanics. Chapter 2 gives a theoretical foundation by introducing probability theory, information theory, functional analysis, quantum mechanics and quantum information theory. Chapter 3, 4 and 5 are editions of work

  4. Cryptography from quantum uncertainty in the presence of quantum side information

    NARCIS (Netherlands)

    Bouman, Niek Johannes

    2012-01-01

    The thesis starts with a high-level introduction into cryptography and quantum mechanics. Chapter 2 gives a theoretical foundation by introducing probability theory, information theory, functional analysis, quantum mechanics and quantum information theory. Chapter 3, 4 and 5 are editions of work pub

  5. Encrypting Binary Bits via Quantum Cryptography

    Institute of Scientific and Technical Information of China (English)

    ZENGGuihua

    2004-01-01

    A quantum cryptographic algorithm, which may be exploited to encrypt classic information is investigated theoretically in this paper. The proposed algorithm can prevent quantum attack strategy as well as classic attack strategy. A proof-in-principle of experimental demonstration, which exploits optical fibre communication technology and photon technology, is suggested.

  6. Staging quantum cryptography with chocolate ballsa)

    Science.gov (United States)

    Svozil, Karl

    2006-09-01

    Moderated by a director, laypeople and students assume the role of quanta and enact a quantum cryptographic protocol. The performance is based on a generalized urn model capable of reproducing complementarity even for classical chocolate balls.

  7. Quantum cryptography: Round-robin with photons

    Science.gov (United States)

    Fröhlich, Bernd; Yuan, Zhiliang

    2015-12-01

    Last year the common notion that signal disturbance has to be monitored in a quantum cryptographic link to guarantee secrecy was challenged by a new protocol. The formidable task of demonstrating it experimentally has now been achieved.

  8. Continuous-variable quantum cryptography with untrusted relays

    CERN Document Server

    Pirandola, Stefano; Spedalieri, Gaetana; Weedbrook, Christian; Braunstein, Samuel L

    2013-01-01

    We extend the field of continuous-variable quantum cryptography to a more robust formulation which can be applied to untrusted networks. We consider two remote parties connected to an untrusted relay by insecure quantum links. To generate correlations, they transmit coherent states to the relay where a continuous-variable Bell detection is performed. Despite the possibility that the working mechanism of the relay could be fully corrupted and the links subject to optimal coherent attacks, the parties are still able to extract a secret key. Furthermore, our analysis shows that very long distances and high rates can be reached when the relay is proximal to one of the parties, configuration typical of a mobile device connecting to a public access point. Thus, using the cheapest possible quantum resources, we show the possibility of long-distance high-rate quantum key distribution in network topologies where direct links are missing between two end-users and intermediate relays cannot be trusted.

  9. Experimental realization of quantum cryptography communication in free space

    Institute of Scientific and Technical Information of China (English)

    WANG; Chuan; ZHANG; Jingfu; WANG; Pingxiao; DENG; Fuguo; A

    2005-01-01

    Utilizing linear optical devices, the principle of B92 quantum key distribution (QKD) protocol is demonstrated in free space with a distance of transmission of 2.2 meters. The faint laser pulses with 650 nm wavelength are used as the single photon sources. The experimental results show that the eavesdropping behavior in the signal transmission can be detected. We also discuss the problems and solutions in using the quantum cryptography communication practically. It is pointed out that one of the approaches to increasing the distance of the quantum communication is to overcome the attenuation of the single photon in transmission. This could not be solved by the use of single photon source, and new quantum communication protocols are needed to solve these problems.

  10. Continuous variable quantum cryptography using coherent states.

    Science.gov (United States)

    Grosshans, Frédéric; Grangier, Philippe

    2002-02-04

    We propose several methods for quantum key distribution (QKD) based on the generation and transmission of random distributions of coherent or squeezed states, and we show that they are secure against individual eavesdropping attacks. These protocols require that the transmission of the optical line between Alice and Bob is larger than 50%, but they do not rely on "sub-shot-noise" features such as squeezing. Their security is a direct consequence of the no-cloning theorem, which limits the signal-to-noise ratio of possible quantum measurements on the transmission line. Our approach can also be used for evaluating various QKD protocols using light with Gaussian statistics.

  11. Continuous variable quantum cryptography using coherent states

    CERN Document Server

    Grosshans, F; Grosshans, Fr\\'ed\\'eric; Grangier, Philippe

    2002-01-01

    We propose several methods for quantum key distribution (QKD), based upon the generation and transmission of random distributions of coherent or squeezed states. We show that these protocols are secure against individual eavesdropping attacks, provided that the transmission of the optical line between Alice and Bob is larger than 50 %. The security of the protocol is related to the no-cloning theorem, that limits the signal to noise ratio of possible quantum measurements on the transmission line, even though the transmitted light has no "non-classical" feature such as squeezing. We show also that our approach can be used for evaluating any QKD protocol using light with gaussian statistics.

  12. Quantum Cryptography with Entangled QuNits

    Institute of Scientific and Technical Information of China (English)

    DENG Hong-Liang; FANG Xi-Ming

    2005-01-01

    @@ We propose an extension of quantum key distribution based on encoding the key into quNits, i.e. quantum states in an N-dimensional Hilbert space. In our protocol, we adopt asymmetric measurement scheme resulting in an efficiency higher than previous protocols and a generalized Bell inequality [Phys. Rev. Lett. 92 (2004) 130404] is employed to detect the presence of an eavesdropper Eve. We also derive the information gained by a potential eavesdropper Eve applying a cloning-based attack and the maximal error rate which measures the robustness of the protocol. The result shows that the security of our scheme increases with the dimension N.

  13. Quantum cryptography with an ideal local relay

    DEFF Research Database (Denmark)

    Spedalieri, Gaetana; Ottaviani, Carlo; Braunstein, Samuel L.

    2015-01-01

    We consider two remote parties connected to a relay by two quantum channels. To generate a secret key, they transmit coherent states to the relay, where the states are subject to a continuous-variable (CV) Bell detection. We study the ideal case where Alice's channel is lossless, i.e., the relay...

  14. One-way entangled-photon autocompensating quantum cryptography

    Science.gov (United States)

    Walton, Zachary D.; Abouraddy, Ayman F.; Sergienko, Alexander V.; Saleh, Bahaa E.; Teich, Malvin C.

    2003-06-01

    A quantum cryptography implementation is presented that uses entanglement to combine one-way operation with an autocompensating feature that has hitherto only been available in implementations that require the signal to make a round trip between the users. Using the concept of advanced waves, it is shown that this proposed implementation is related to the round-trip implementation in the same way that Ekert’s two-particle scheme is related to the original one-particle scheme of Bennett and Brassard. The practical advantages and disadvantages of the proposed implementation are discussed in the context of existing schemes.

  15. Teleportation-based continuous variable quantum cryptography

    Science.gov (United States)

    Luiz, F. S.; Rigolin, Gustavo

    2017-03-01

    We present a continuous variable (CV) quantum key distribution (QKD) scheme based on the CV quantum teleportation of coherent states that yields a raw secret key made up of discrete variables for both Alice and Bob. This protocol preserves the efficient detection schemes of current CV technology (no single-photon detection techniques) and, at the same time, has efficient error correction and privacy amplification schemes due to the binary modulation of the key. We show that for a certain type of incoherent attack, it is secure for almost any value of the transmittance of the optical line used by Alice to share entangled two-mode squeezed states with Bob (no 3 dB or 50% loss limitation characteristic of beam splitting attacks). The present CVQKD protocol works deterministically (no postselection needed) with efficient direct reconciliation techniques (no reverse reconciliation) in order to generate a secure key and beyond the 50% loss case at the incoherent attack level.

  16. Advanced quantum communication systems

    Science.gov (United States)

    Jeffrey, Evan Robert

    Quantum communication provides several examples of communication protocols which cannot be implemented securely using only classical communication. Currently, the most widely known of these is quantum cryptography, which allows secure key exchange between parties sharing a quantum channel subject to an eavesdropper. This thesis explores and extends the realm of quantum communication. Two new quantum communication protocols are described. The first is a new form of quantum cryptography---relativistic quantum cryptography---which increases communication efficiency by exploiting a relativistic bound on the power of an eavesdropper, in addition to the usual quantum mechanical restrictions intrinsic to quantum cryptography. By doing so, we have observed over 170% improvement in communication efficiency over a similar protocol not utilizing relativity. A second protocol, Quantum Orienteering, allows two cooperating parties to communicate a specific direction in space. This application shows the possibility of using joint measurements, or projections onto an entangled state, in order to extract the maximum useful information from quantum bits. For two-qubit communication, the maximal fidelity of communication using only separable operations is 73.6%, while joint measurements can improve the efficiency to 78.9%. In addition to implementing these protocols, we have improved several resources for quantum communication and quantum computing. Specifically, we have developed improved sources of polarization-entangled photons, a low-loss quantum memory for polarization qubits, and a quantum random number generator. These tools may be applied to a wide variety of future quantum and classical information systems.

  17. Tight finite-key analysis for quantum cryptography.

    Science.gov (United States)

    Tomamichel, Marco; Lim, Charles Ci Wen; Gisin, Nicolas; Renner, Renato

    2012-01-17

    Despite enormous theoretical and experimental progress in quantum cryptography, the security of most current implementations of quantum key distribution is still not rigorously established. One significant problem is that the security of the final key strongly depends on the number, M, of signals exchanged between the legitimate parties. Yet, existing security proofs are often only valid asymptotically, for unrealistically large values of M. Another challenge is that most security proofs are very sensitive to small differences between the physical devices used by the protocol and the theoretical model used to describe them. Here we show that these gaps between theory and experiment can be simultaneously overcome by using a recently developed proof technique based on the uncertainty relation for smooth entropies.

  18. Field test of a practical secure communication network with decoy-state quantum cryptography.

    Science.gov (United States)

    Chen, Teng-Yun; Liang, Hao; Liu, Yang; Cai, Wen-Qi; Ju, Lei; Liu, Wei-Yue; Wang, Jian; Yin, Hao; Chen, Kai; Chen, Zeng-Bing; Peng, Cheng-Zhi; Pan, Jian-Wei

    2009-04-13

    We present a secure network communication system that operated with decoy-state quantum cryptography in a real-world application scenario. The full key exchange and application protocols were performed in real time among three nodes, in which two adjacent nodes were connected by approximate 20 km of commercial telecom optical fiber. The generated quantum keys were immediately employed and demonstrated for communication applications, including unbreakable real-time voice telephone between any two of the three communication nodes, or a broadcast from one node to the other two nodes by using one-time pad encryption.

  19. Anonymous-key quantum cryptography and unconditionally secure quantum bit commitment

    CERN Document Server

    Yuen, H P

    2000-01-01

    A new cryptographic tool, anonymous quantum key technique, is introduced that leads to unconditionally secure key distribution and encryption schemes that can be readily implemented experimentally in a realistic environment. If quantum memory is available, the technique would have many features of public-key cryptography; an identification protocol that does not require a shared secret key is provided as an illustration. The possibility is also indicated for obtaining unconditionally secure quantum bit commitment protocols with this technique.

  20. Detection of Eavesdropping in Quantum Cryptography%量子密码的窃听检测

    Institute of Scientific and Technical Information of China (English)

    李凯; 黄晓英; 滕吉红; 李振华

    2012-01-01

    量子密码是密码学与量子力学相结合的产物.它具有得天独厚的优势并逐渐成为下一代密码技术中的重要研究分支.与经典密码相比,量子密码最大的优势就是它的可证明安全性和可检测性.分析了量子密码协议中的窃听检测过程并给出一个新的量子密码协议方案.%Quantum cryptography is the combination of quantum mechanics and cryptography. It has native advantage in the sense of security and is gradually developing into an important branch of next generation of technologies in cryptography. Compared to the classical cryptography, the greatest advantages of quantum cryptography are provable security and detectability. In this paper, the detection of eavesdropping in quantum cryptography schemes is investigated and a new quantum cryptography protocol is presented.

  1. Quantum information. Teleportation - cryptography - quantum computer; Quanteninformation. Teleportation - Kryptografie - Quantencomputer

    Energy Technology Data Exchange (ETDEWEB)

    Koenneker, Carsten (comp.)

    2012-11-01

    The following topics are dealt with: Reality in the test facility, quantum teleportation, the reality of quanta, interaction-free quantum measurement, rules for quantum computers, quantum computers with ions, spintronics with diamond, the limits of the quantum computers, a view in the future of quantum optics. (HSI)

  2. Quantum signal processing-based visual cryptography with unexpanded shares

    Science.gov (United States)

    Das, Surya Sarathi; Sharma, Kaushik Das; Chandra, Jayanta K.; Bera, Jitendra Nath

    2015-09-01

    This paper proposes a visual cryptography scheme (VCS) based on quantum signal processing (QSP). VCS is an image encryption technique that is very simple in formulation and is secure. In (k,n)-VCS, a secret binary image is encoded into n share images and minimum k shares are needed to decrypt the secret image. The efforts to encrypt a grayscale image are few in number and the majority are related to grayscale to binary conversion. Thus, a generalized approach of encryption for all types of images, i.e., binary, gray, and color is needed. Here, a generic VCS is proposed based on QSP where all types of images can be encrypted without pixel expansion along with a smoothing technique to enhance the quality of the decrypted image. The proposed scheme is tested and compared for benchmark images, and the result shows the effectiveness of the scheme.

  3. A Study of Quantum Algorithms and Quantum Cryptography

    OpenAIRE

    小柴, 健史

    2007-01-01

    This report describes properties of basic cryptographic primitives (quantum public-key cryptosystmes and quantum one-way functions) in the quantum world where quantum computers are available. Some quantum public-key cryptosystems have already proposed. However, the security requirements for quantum public-key cryptosystems are not studied well. We propose several security notions for quantum public-key cryptosystems and discuss relation among them. In the classical setting, the notion of one-...

  4. A new spin on quantum cryptography: Avoiding trapdoors and embracing public keys

    CERN Document Server

    Ioannou, Lawrence M

    2011-01-01

    We give new arguments in support of \\emph{signed quantum key establishment}, where quantum cryptography is used in a public-key infrastructure that provides the required authentication. We also analyze more thoroughly than previous works the benefits that quantum key establishment protocols have over certain classical protocols, motivated in part by the various objections to quantum key establishment that are sometimes raised. Previous knowledge of quantum cryptography on the reader's part is not required for this article, as the definition of "quantum key establishment" that we use is an entirely classical and black-box characterization (one need only trust that protocols satisfying the definition exist).

  5. Role of causality in ensuring unconditional security of relativistic quantum cryptography

    CERN Document Server

    Molotkov, S N

    2001-01-01

    The problem of unconditional security of quantum cryptography (i.e. the security which is guaranteed by the fundamental laws of nature rather than by technical limitations) is one of the central points in quantum information theory. We propose a relativistic quantum cryptosystem and prove its unconditional security against any eavesdropping attempts. Relativistic causality arguments allow to demonstrate the security of the system in a simple way. Since the proposed protocol does not employ collective measurements and quantum codes, the cryptosystem can be experimentally realized with the present state-of-art in fiber optics technologies. The proposed cryptosystem employs only the individual measurements and classical codes and, in addition, the key distribution problem allows to postpone the choice of the state encoding scheme until after the states are already received instead of choosing it before sending the states into the communication channel (i.e. to employ a sort of ``antedate'' coding).

  6. Post-selection technique for quantum channels with applications to quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Christandl, Matthias [University of Munich (Germany); Koenig, Robert [California Institute of Technology, Pasadena, CA (United States); Renner, Renato [ETH Zurich (Switzerland)

    2009-07-01

    We propose a general method for studying properties of quantum channels acting on an n-partite system, whose action is invariant under permutations of the subsystems. Our main result is that, in order to prove that a certain property holds for any arbitrary input, it is sufficient to consider the special case where the input is a particular de Finetti-type state, i.e., a state which consists of n identical and independent copies of an (unknown) state on a single subsystem. A similar statement holds for more general channels which are covariant with respect to the action of an arbitrary finite or locally compact group. Our technique can be applied to the analysis of information-theoretic problems. For example, in quantum cryptography, we get a simple proof for the fact that security of a discrete-variable quantum key distribution protocol against collective attacks implies security of the protocol against the most general attacks. The resulting security bounds are tighter than previously known bounds obtained by proofs relying on the exponential de Finetti theorem.

  7. Topics in quantum cryptography, quantum error correction, and channel simulation

    Science.gov (United States)

    Luo, Zhicheng

    In this thesis, we mainly investigate four different topics: efficiently implementable codes for quantum key expansion [51], quantum error-correcting codes based on privacy amplification [48], private classical capacity of quantum channels [44], and classical channel simulation with quantum side information [49, 50]. For the first topic, we propose an efficiently implementable quantum key expansion protocol, capable of increasing the size of a pre-shared secret key by a constant factor. Previously, the Shor-Preskill proof [64] of the security of the Bennett-Brassard 1984 (BB84) [6] quantum key distribution protocol relied on the theoretical existence of good classical error-correcting codes with the "dual-containing" property. But the explicit and efficiently decodable construction of such codes is unknown. We show that we can lift the dual-containing constraint by employing the non-dual-containing codes with excellent performance and efficient decoding algorithms. For the second topic, we propose a construction of Calderbank-Shor-Steane (CSS) [19, 68] quantum error-correcting codes, which are originally based on pairs of mutually dual-containing classical codes, by combining a classical code with a two-universal hash function. We show, using the results of Renner and Koenig [57], that the communication rates of such codes approach the hashing bound on tensor powers of Pauli channels in the limit of large block-length. For the third topic, we prove a regularized formula for the secret key assisted capacity region of a quantum channel for transmitting private classical information. This result parallels the work of Devetak on entanglement assisted quantum communication capacity. This formula provides a new family protocol, the private father protocol, under the resource inequality framework that includes the private classical communication without the assisted secret keys as a child protocol. For the fourth topic, we study and solve the problem of classical channel

  8. A Review on Elliptic Curve Cryptography for Embedded Systems

    CERN Document Server

    Afreen, Rahat

    2011-01-01

    Importance of Elliptic Curves in Cryptography was independently proposed by Neal Koblitz and Victor Miller in 1985.Since then, Elliptic curve cryptography or ECC has evolved as a vast field for public key cryptography (PKC) systems. In PKC system, we use separate keys to encode and decode the data. Since one of the keys is distributed publicly in PKC systems, the strength of security depends on large key size. The mathematical problems of prime factorization and discrete logarithm are previously used in PKC systems. ECC has proved to provide same level of security with relatively small key sizes. The research in the field of ECC is mostly focused on its implementation on application specific systems. Such systems have restricted resources like storage, processing speed and domain specific CPU architecture.

  9. Fast and simple high-capacity quantum cryptography with error detection

    Science.gov (United States)

    Lai, Hong; Luo, Ming-Xing; Pieprzyk, Josef; Zhang, Jun; Pan, Lei; Li, Shudong; Orgun, Mehmet A.

    2017-04-01

    Quantum cryptography is commonly used to generate fresh secure keys with quantum signal transmission for instant use between two parties. However, research shows that the relatively low key generation rate hinders its practical use where a symmetric cryptography component consumes the shared key. That is, the security of the symmetric cryptography demands frequent rate of key updates, which leads to a higher consumption of the internal one-time-pad communication bandwidth, since it requires the length of the key to be as long as that of the secret. In order to alleviate these issues, we develop a matrix algorithm for fast and simple high-capacity quantum cryptography. Our scheme can achieve secure private communication with fresh keys generated from Fibonacci- and Lucas- valued orbital angular momentum (OAM) states for the seed to construct recursive Fibonacci and Lucas matrices. Moreover, the proposed matrix algorithm for quantum cryptography can ultimately be simplified to matrix multiplication, which is implemented and optimized in modern computers. Most importantly, considerably information capacity can be improved effectively and efficiently by the recursive property of Fibonacci and Lucas matrices, thereby avoiding the restriction of physical conditions, such as the communication bandwidth.

  10. Security proof of counterfactual quantum cryptography against general intercept-resend attacks and its vulnerability

    Institute of Scientific and Technical Information of China (English)

    Zhang Sheng; Wang Jian; Tang Chao-Jing

    2012-01-01

    Counterfactual quantum cryptography,recently proposed by Noh,is featured with no transmission of signal particles.This exhibits evident security advantages,such as its immunity to the well-known photon-number-splitting attack.In this paper,the theoretical security of counterfactual quantum cryptography protocol against the general interceptresend attacks is proved by bounding the information of an eavesdropper Eve more tightly than in Yin's proposal [Phys.Rev.A 82 042335 (2010)].It is also shown that practical counterfactual quantum cryptography implementations may be vulnerable when equipped with imperfect apparatuses,by proving that a negative key rate can be achieved when Eve launches a time-shift attack based on imperfect detector efficiency.

  11. Information complementarity in multipartite quantum states and security in cryptography

    Science.gov (United States)

    Bera, Anindita; Kumar, Asutosh; Rakshit, Debraj; Prabhu, R.; SenDe, Aditi; Sen, Ujjwal

    2016-03-01

    We derive complementarity relations for arbitrary quantum states of multiparty systems of any number of parties and dimensions between the purity of a part of the system and several correlation quantities, including entanglement and other quantum correlations as well as classical and total correlations, of that part with the remainder of the system. We subsequently use such a complementarity relation between purity and quantum mutual information in the tripartite scenario to provide a bound on the secret key rate for individual attacks on a quantum key distribution protocol.

  12. Proposed System for data hiding using Cryptography and Steganography Proposed System for data hiding using Cryptography and Steganography

    CERN Document Server

    Sarmah, Dipti Kapoor

    2010-01-01

    Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptography techniques available; among them AES is one of the most powerful techniques. In Steganography we have various techniques in different domains like spatial domain, frequency domain etc. to hide the message. It is very difficult to detect hidden message in frequency domain and for this domain we use various transformations like DCT, FFT and Wavelets etc. In this project we are developing a system where we develop a new technique in which Cryptography and Steganography are used as integrated part along with newly developed enhanced security module. In Cryptography we are using AES algorithm to encrypt a message and a part of the message is hidden in DCT of an image; remaining part of the message is used to generate two secret keys which make this system highly secured. Keyword: Cryptography, Steganography, S...

  13. A Practical Trojan Horse for Bell-inequality-based Quantum Cryptography

    CERN Document Server

    Larsson, J A

    2002-01-01

    Quantum Cryptography, or more accurately, Quantum Key Distribution (QKD) is based on using an unconditionally secure ``quantum channel'' to share a secret key among two users. A manufacturer of QKD devices could, intentionally or not, use a (semi-)classical channel instead of the quantum channel, which would remove the supposedly unconditional security. One example is the BB84 protocol, where the quantum channel can be implemented in polarization of single photons. Here, use of several photons instead of one to encode each bit of the key provides a similar but insecure system. For protocols based on violation of a Bell inequality (e.g., the Ekert protocol), such a modification is generally thought to be impossible. However, a counterexample will be given here using an identical physical setup as is used in photon-polarization Ekert QKD. Since the physical implementation is identical, a manufacturer may include this modification as a Trojan Horse in manufactured systems, to be activated at will by an eavesdrop...

  14. Direct Use of Secret Key in Quantum Cryptography

    CERN Document Server

    Yuen, H P

    2006-01-01

    For single-photon quantum key generation between two users, it is shown that for collective attacks the use of a shared secret key extended via a pseudo-random number generator may simultaneously enhance the security and efficiency of the cryptosystem. This effect arises from the intrinsic performance difference between quantum detectors with versus without knowledge of the key, a purely quantum effect and a new principle for key generation. No intrusion level estimation is needed and the method is directly applicable to realistic systems involving multi-photon sources, losses, noises, and finite-sequence statistical fluctuations. It is suggested that such use of a secret key be routinely incorporated in a quantum key generation system. The use of a secret key in quantum direct encryption is also indicated.

  15. Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography.

    Science.gov (United States)

    Pirandola, Stefano; Braunstein, Samuel L; Lloyd, Seth

    2008-11-14

    We provide a simple description of the most general collective Gaussian attack in continuous-variable quantum cryptography. In the scenario of such general attacks, we analyze the asymptotic secret-key rates which are achievable with coherent states, joint measurements of the quadratures and one-way classical communication.

  16. A weak blind signature scheme based on quantum cryptography

    Science.gov (United States)

    Wen, Xiaojun; Niu, Xiamu; Ji, Liping; Tian, Yuan

    2009-02-01

    In this paper, we present a weak blind signature scheme based on the correlation of EPR (Einstein-Padolsky-Rosen) pairs. Different from classical blind signature schemes and current quantum signature schemes, our quantum blind signature scheme could guarantee not only the unconditionally security but also the anonymity of the message owner. To achieve that, quantum key distribution and one-time pad are adopted in our scheme. Experimental analysis proved that our scheme have the characteristics of non-counterfeit, non-disavowal, blindness and traceability. It has a wide application to E-payment system, E-government, E-business, and etc.

  17. Quantum walks public key cryptographic system

    OpenAIRE

    Vlachou, C; Rodrigues, J.; Mateus, P.; Paunković, N.; Souto, A.

    2016-01-01

    Quantum Cryptography is a rapidly developing field of research that benefits from the properties of Quantum Mechanics in performing cryptographic tasks. Quantum walks are a powerful model for quantum computation and very promising for quantum information processing. In this paper, we present a quantum public-key cryptographic system based on quantum walks. In particular, in the proposed protocol the public key is given by a quantum state generated by performing a quantum walk. We show that th...

  18. Reduced randomness in quantum cryptography with sequences of qubits encoded in the same basis

    CERN Document Server

    Lamoureux, L P; Cerf, N J; Gisin, Nicolas; Macchiavello, C

    2005-01-01

    We consider the cloning of sequences of qubits prepared in the states used in the BB84 or 6-state quantum cryptography protocol, and show that the single-qubit fidelity is unaffected even if entire sequences of qubits are prepared in the same basis. This result is of great importance for practical quantum cryptosystems because it reduces the need for high-speed random number generation without impairing on the security against finite-size attacks.

  19. Quantum Cryptography Based on the Deutsch-Jozsa Algorithm

    Science.gov (United States)

    Nagata, Koji; Nakamura, Tadao; Farouk, Ahmed

    2017-09-01

    Recently, secure quantum key distribution based on Deutsch's algorithm using the Bell state is reported (Nagata and Nakamura, Int. J. Theor. Phys. doi: 10.1007/s10773-017-3352-4, 2017). Our aim is of extending the result to a multipartite system. In this paper, we propose a highly speedy key distribution protocol. We present sequre quantum key distribution based on a special Deutsch-Jozsa algorithm using Greenberger-Horne-Zeilinger states. Bob has promised to use a function f which is of one of two kinds; either the value of f( x) is constant for all values of x, or else the value of f( x) is balanced, that is, equal to 1 for exactly half of the possible x, and 0 for the other half. Here, we introduce an additional condition to the function when it is balanced. Our quantum key distribution overcomes a classical counterpart by a factor O(2 N ).

  20. High-dimensional quantum cryptography with twisted light

    CERN Document Server

    Mirhosseini, Mohammad; O'Sullivan, Malcolm N; Rodenburg, Brandon; Malik, Mehul; Gauthier, Daniel J; Boyd, Robert W

    2014-01-01

    Quantum key distribution (QKD) systems have conventionally relied on the polarization of light for encoding. This limits the amount of information that can be sent per photon and puts a tight bound on the error such a system can tolerate. Here we show an experimental realization of a multilevel QKD system that uses the orbital angular momentum (OAM) of photons. Through the use of a 7-dimensional alphabet encoded in OAM, we achieve a channel capacity of 2.1 bits per sifted photon which is more than double the maximum allowed capacity of polarization-based QKD systems. Our experiment uses a digital micro-mirror device for the rapid generation of OAM modes at 4 kHz, and a mode sorter capable of sorting single photons based on OAM with a separation efficiency of 93%. Further, our scheme provides an increased tolerance to errors, leading to a quantum communication channel that is more robust against eavesdropping.

  1. Thermal blinding of gated detectors in quantum cryptography.

    Science.gov (United States)

    Lydersen, Lars; Wiechers, Carlos; Wittmann, Christoffer; Elser, Dominique; Skaar, Johannes; Makarov, Vadim

    2010-12-20

    It has previously been shown that the gated detectors of two commercially available quantum key distribution (QKD) systems are blindable and controllable by an eavesdropper using continuous-wave illumination and short bright trigger pulses, manipulating voltages in the circuit [Nat. Photonics 4, 686 (2010)]. This allows for an attack eavesdropping the full raw and secret key without increasing the quantum bit error rate (QBER). Here we show how thermal effects in detectors under bright illumination can lead to the same outcome. We demonstrate that the detectors in a commercial QKD system Clavis2 can be blinded by heating the avalanche photo diodes (APDs) using bright illumination, so-called thermal blinding. Further, the detectors can be triggered using short bright pulses once they are blind. For systems with pauses between packet transmission such as the plug-and-play systems, thermal inertia enables Eve to apply the bright blinding illumination before eavesdropping, making her more difficult to catch.

  2. Laser Damage Helps the Eavesdropper in Quantum Cryptography

    Science.gov (United States)

    Bugge, Audun Nystad; Sauge, Sebastien; Ghazali, Aina Mardhiyah M.; Skaar, Johannes; Lydersen, Lars; Makarov, Vadim

    2014-02-01

    We propose a class of attacks on quantum key distribution (QKD) systems where an eavesdropper actively engineers new loopholes by using damaging laser illumination to permanently change properties of system components. This can turn a perfect QKD system into a completely insecure system. A proof-of-principle experiment performed on an avalanche photodiode-based detector shows that laser damage can be used to create loopholes. After ˜1 W illumination, the detectors' dark count rate reduces 2-5 times, permanently improving single-photon counting performance. After ˜1.5 W, the detectors switch permanently into the linear photodetection mode and become completely insecure for QKD applications.

  3. High-Rate Strong-Signal Quantum Cryptography

    Science.gov (United States)

    Yuen, Horace P.

    1996-01-01

    Several quantum cryptosystems utilizing different kinds of nonclassical lights, which can accommodate high intensity fields and high data rate, are described. However, they are all sensitive to loss and both the high rate and the strong-signal character rapidly disappear. A squeezed light homodyne detection scheme is proposed which, with present-day technology, leads to more than two orders of magnitude data rate improvement over other current experimental systems for moderate loss.

  4. The Modeling Library of Eavesdropping Methods in Quantum Cryptography Protocols by Model Checking

    Science.gov (United States)

    Yang, Fan; Yang, Guowu; Hao, Yujie

    2016-07-01

    The most crucial issue of quantum cryptography protocols is its security. There exists many ways to attack the quantum communication process. In this paper, we present a model checking method for modeling the eavesdropping in quantum information protocols. So when the security properties of a certain protocol are needed to be verified, we can directly use the models which are already built. Here we adopt the probabilistic model checking tool—PRISM to model these attack methods. The verification results show that the detection rate of eavesdropping is approximately close to 1 when enough photons are transmitted.

  5. Laser damage helps the eavesdropper in quantum cryptography

    CERN Document Server

    Bugge, Audun N; Ghazali, Aina M M; Skaar, Johannes; Lydersen, Lars; Makarov, Vadim

    2013-01-01

    By destructive laser illumination, an eavesdropper may turn a perfect quantum key distribution (QKD) system into a completely insecure system. We demonstrate this by illuminating avalanche photodiodes with increasingly intense radiation, and monitoring their parameters. After about 1 W illumination, the detectors' dark count rate drops by a factor of 2 to 5, permanently improving their single-photon counting performance. After about 1.5 W, the dark current rises, switching the detectors permanently into the linear photodetection mode and making them completely insecure for QKD applications. Illumination power higher than 2 W destroys all photosensitivity. This shows that an eavesdropper can engineer loopholes in QKD via laser damage.

  6. Bounds for reference-frame independent protocols in quantum cryptography using generalized uncertainty relations

    CERN Document Server

    Le, Thinh Phuc; Scarani, Valerio

    2011-01-01

    We define a family of reference-frame-independent quantum cryptography protocols for arbitrary dimensional signals. The generalized entropic uncertainty relations [M. Tomamichel and R. Renner, Phys. Rev. Lett. 106, 110506 (2011)] are used for the first time to derive security bounds for protocols which use more than two measurements and combine the statistics in a non-linear parameter. This shows the power and versatility of this technique compared to the heavier, though usually tighter, conventional techniques.

  7. Active stabilization of the optical part in fiber optic quantum cryptography

    Science.gov (United States)

    Balygin, K. A.; Klimov, A. N.; Kulik, S. P.; Molotkov, S. N.

    2016-03-01

    The method of active stabilization of the polarization and other parameters of the optical part of a two-pass fiber optic quantum cryptography has been proposed and implemented. The method allows the completely automated maintenance of the visibility of interference close to an ideal value ( V ≥ 0.99) and the reduction of the instrumental contribution to the error in primary keys (QBER) to 0.5%.

  8. Free space relativistic quantum cryptography with faint laser pulses

    Science.gov (United States)

    Molotkov, S. N.; Potapova, T. A.

    2013-07-01

    A new protocol for quantum key distribution through empty space is proposed. Apart from the quantum mechanical restrictions on distinguishability of non-orthogonal states, the protocol employs additional restrictions imposed by special relativity. The protocol ensures generation of a secure key even for the source generating non-strictly single-photon quantum states and for arbitrary losses in quantum communication channel.

  9. Laser damage helps the eavesdropper in quantum cryptography.

    Science.gov (United States)

    Bugge, Audun Nystad; Sauge, Sebastien; Ghazali, Aina Mardhiyah M; Skaar, Johannes; Lydersen, Lars; Makarov, Vadim

    2014-02-21

    We propose a class of attacks on quantum key distribution (QKD) systems where an eavesdropper actively engineers new loopholes by using damaging laser illumination to permanently change properties of system components. This can turn a perfect QKD system into a completely insecure system. A proof-of-principle experiment performed on an avalanche photodiode-based detector shows that laser damage can be used to create loopholes. After ∼1  W illumination, the detectors' dark count rate reduces 2-5 times, permanently improving single-photon counting performance. After ∼1.5  W, the detectors switch permanently into the linear photodetection mode and become completely insecure for QKD applications.

  10. Practical Quantum Cryptography: the Q-KeyMaker

    CERN Document Server

    Bovino, Fabio A

    2011-01-01

    In the next years the data transmission connections will constitute one of the principal tools of communication among cities, enterprises and public administration. With their enhanced connectivity, the systems and nets of information are now exposed to an increased vulnerability and new safety problems are emerging. Insofar Quantum Key Distribution (QKD) has matured to real world applications and can enhance the safety of the communication nets. In this paper we present the QKD network designed and implemented by Selex-SI and we give an overview of the obtained results.

  11. Conjugacy Systems Based on Nonabelian Factorization Problems and Their Applications in Cryptography

    Directory of Open Access Journals (Sweden)

    Lize Gu

    2014-01-01

    Full Text Available To resist known quantum algorithm attacks, several nonabelian algebraic structures mounted upon the stage of modern cryptography. Recently, Baba et al. proposed an important analogy from the integer factorization problem to the factorization problem over nonabelian groups. In this paper, we propose several conjugated problems related to the factorization problem over nonabelian groups and then present three constructions of cryptographic primitives based on these newly introduced conjugacy systems: encryption, signature, and signcryption. Sample implementations of our proposal as well as the related performance analysis are also presented.

  12. A Luggage Control System Based on NFC and Homomorphic Cryptography

    Directory of Open Access Journals (Sweden)

    Néstor Álvarez-Díaz

    2017-01-01

    Full Text Available We propose an innovative luggage tracking and management system that can be used to secure airport terminal services and reduce the waiting time of passengers during check-in. This addresses an urgent need to streamline and optimize passenger flows at airport terminals and lowers the risk of terrorist threats. The system employs Near Field Communication (NFC technology and homomorphic cryptography (the Paillier cryptosystem to protect wireless communication and stored data. A security analysis and a performance test show the usability and applicability of the proposed system.

  13. Conventional Cryptography.

    Science.gov (United States)

    Wright, Marie A.

    1993-01-01

    Cryptography is the science that renders data unintelligible to prevent its unauthorized disclosure or modification. Presents an application of matrices used in linear transformations to illustrate a cryptographic system. An example is provided. (17 references) (MDH)

  14. Practical limitation for continuous-variable quantum cryptography using coherent States.

    Science.gov (United States)

    Namiki, Ryo; Hirano, Takuya

    2004-03-19

    In this Letter, first, we investigate the security of a continuous-variable quantum cryptographic scheme with a postselection process against individual beam splitting attack. It is shown that the scheme can be secure in the presence of the transmission loss owing to the postselection. Second, we provide a loss limit for continuous-variable quantum cryptography using coherent states taking into account excess Gaussian noise on quadrature distribution. Since the excess noise is reduced by the loss mechanism, a realistic intercept-resend attack which makes a Gaussian mixture of coherent states gives a loss limit in the presence of any excess Gaussian noise.

  15. Bridging the gap between theory and practice in quantum cryptography

    Science.gov (United States)

    Curty, Marcos; Tamaki, Kiyoshi; Xu, Feihu; Mizutani, Akihiro; Lim, Charles C. W.; Qi, Bing; Lo, Hoi-Kwong

    2015-10-01

    Quantum key distribution (QKD) needs to close the big gap between theory and practice to be a suitable technology for achieving information-theoretic secure communications. Indeed, recent studies on side-channel attacks have exposed the vulnerabilities of QKD implementations against an eavesdropper who may try to attack both the source and the measurement device. Here, we review two potential approaches that, combined, could bring this goal closer: measurement-device-independent QKD and the loss-tolerant QKD protocol. The former removes all possible side-channels from the measurement apparatus and guarantees a high performance over long distances. The latter appears as a robust solution against typical source flaws and it offers similar key rates as those of standard QKD systems. Most importantly, the feasibility of both solutions has already been demonstrated in several lab and field-test experiments.

  16. Security Notions for Quantum Public-Key Cryptography

    CERN Document Server

    Koshiba, T

    2007-01-01

    It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

  17. Security Notions for Quantum Public-Key Cryptography

    OpenAIRE

    Koshiba, Takeshi

    2007-01-01

    It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to ad...

  18. Reverse reconciliation protocols for quantum cryptography with continuous variables

    CERN Document Server

    Grosshans, F; Grosshans, Fr\\'ed\\'eric; Grangier, Philippe

    2002-01-01

    We introduce new quantum key distribution protocols using quantum continuous variables, that are secure against individual attacks for any transmission of the optical line between Alice and Bob. In particular, it is not required that this transmission is larger than 50 %. Though squeezing or entanglement may be helpful, they are not required, and there is no need for quantum memories or entanglement purification. These protocols can thus be implemented using coherent states and homodyne detection, and they may be more efficient than usual protocols using quantum discrete variables.

  19. Finite and profinite quantum systems

    CERN Document Server

    Vourdas, Apostolos

    2017-01-01

    This monograph provides an introduction to finite quantum systems, a field at the interface between quantum information and number theory, with applications in quantum computation and condensed matter physics. The first major part of this monograph studies the so-called `qubits' and `qudits', systems with periodic finite lattice as position space. It also discusses the so-called mutually unbiased bases, which have applications in quantum information and quantum cryptography. Quantum logic and its applications to quantum gates is also studied. The second part studies finite quantum systems, where the position takes values in a Galois field. This combines quantum mechanics with Galois theory. The third part extends the discussion to quantum systems with variables in profinite groups, considering the limit where the dimension of the system becomes very large. It uses the concepts of inverse and direct limit and studies quantum mechanics on p-adic numbers. Applications of the formalism include quantum optics and ...

  20. Cryptography in the Bounded Quantum-Storage Model

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Serge, Fehr; Schaffner, Christian;

    2008-01-01

    We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary's quantum memory is of bounded size. We show that oblivious transfer and bit commitment can be implemented in this model using protocols where honest parties need no quantum memory...

  1. Cryptography In The Bounded Quantum-Storage Model

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Schaffner, Christian;

    2005-01-01

    We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary's quantum memory is of bounded size. We show that oblivious transfer and bit commitment can be implemented in this model using protocols where honest parties need no quantum memory...

  2. Field experiment on a robust hierarchical metropolitan quantum cryptography network

    Institute of Scientific and Technical Information of China (English)

    XU FangXing; CHEN Wei; WANG Shuang; YIN ZhenQiang; ZHANG Yang; LIU Yun; ZHOU Zheng; ZHAO YiBo; LI HongWei; LIU Dong; HAN ZhengFu; GUO GuangCan

    2009-01-01

    these bureaus.The whole implementation including the hierarchical quantum cryptographic communication network links and the corresponding application software shows a big step toward the practical user-oriented network with a high security level.

  3. Public-key cryptography based on bounded quantum reference frames

    OpenAIRE

    Ioannou, Lawrence M.; Mosca, Michele

    2009-01-01

    We demonstrate that the framework of bounded quantum reference frames has application to building quantum-public-key cryptographic protocols and proving their security. Thus, the framework we introduce can be seen as a public-key analogue of the framework of Bartlett et al. (Phys. Rev. A 70, 032307), where a private shared reference frame is shown to have cryptographic application. The protocol we present in this paper is an identification scheme, which, like a digital signature scheme, is a ...

  4. New field of cryptography: DNA cryptography

    Institute of Scientific and Technical Information of China (English)

    XIAO Guozhen; LU Mingxin; QIN Lei; LAI Xuejia

    2006-01-01

    DNA cryptography is a new born cryptographic field emerged with the research of DNA computing, in which DNA is used as information carrier and the modern biological technology is used as implementation tool. The vast parallelism and extraordinary information density inherent in DNA molecules are explored for cryptographic purposes such as encryption, authentication, signature, and so on. In this paper, we briefly introduce the biological background of DNA cryptography and the principle of DNA computing, summarize the progress of DNA cryptographic research and several key problems, discuss the trend of DNA cryptography, and compare the status, security and application fields of DNA cryptography with those of traditional cryptography and quantum cryptography. It is pointed out that all the three kinds of cryptography have their own advantages and disadvantages and complement each other in future practical application. The current main difficulties of DNA cryptography are the absence of effective secure theory and simple realizable method. The main goal of the research of DNA cryptography is exploring characteristics of DNA molecule and reaction, establishing corresponding theories, discovering possible development directions, searching for simple methods of realizing DNA cryptography, and laying the basis for future development.

  5. Cryptography based on spatial chaotic system

    Science.gov (United States)

    Sun, Fuyan; Lü, Zongwang

    2010-08-01

    Encryption of images is different from that of texts due to some intrinsic features of images such as bulk data capacity and high redundancy, which is generally difficult to handle by traditional methods. This paper proposes a new spatial chaos system(SCS), which is investigated by conducting FIPS 140-1 statistic test, and is especially useful for encryption of digital images. It is shown how to adapt a two dimensional(2D) ergodic matrix obtained from SCS to permute the positions of image pixels and confuse the relationship between the cipher image and plain image simultaneously. Experimental results show that the performance and security of the proposed cryptographic system are better than those of existing lower dimensional chaotic cryptographic systems.

  6. Entropy in quantum information theory - Communication and cryptography

    DEFF Research Database (Denmark)

    Majenz, Christian

    Entropies have been immensely useful in information theory. In this Thesis, several results in quantum information theory are collected, most of which use entropy as the main mathematical tool. The rst one concerns the von Neumann entropy. While a direct generalization of the Shannon entropy......-Shannon type inequalities. Here, a new constrained non-von-Neumann type inequality is proven, a step towards a conjectured unconstrained inequality by Linden and Winter. Like many other information-theoretic tasks, quantum source coding problems such as coherent state merging have recently been analyzed...... in the one-shot setting. While the case of many independent, identically distributed quantum states has been treated using the decoupling technique, the essentially optimal one-shot results in terms of the max-mutual information by Berta et al. and Anshu at al. had to bring in additional mathematical...

  7. Gaps between equations and experiments in quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Myers, John M [Gordon McKay Laboratory, Division of Engineering and Applied Sciences, Harvard University, Cambridge, MA 02138 (United States); Madjid, F Hadi [82 Powers Road, Concord, MA 01742 (United States)

    2002-06-01

    Traditional methods of cryptographic key distribution rest on judgments about an attacker. With the advent of quantum key distribution (QKD) came proofs of security for the mathematical models that define the protocols BB84 and B92; however, applying such proofs to actual transmitting and receiving devices has been questioned. Proofs of QKD security are propositions about models written in the mathematical language of quantum mechanics, and the issue is the linking of such models to actual devices in an experiment on security. To explore this issue, we adapt Wittgenstein's method of language games to view quantum language in its application to experimental activity involving transmitting and receiving devices. We sketch concepts with which to think about models in relation to experiments, without assuming the experiments accord with any model; included is a concept of one quantum mechanical model enveloping another. For any model that agrees with given experimental results and implies the security of a key, there is an enveloping model that agrees with the same results while denying that security. As a result there is a gap between equations and the behaviour recorded from devices in an experiment, a gap bridged only by resort to something beyond the reach of logic and measured data, well named by the word guesswork. While this recognition of guesswork encourages eavesdropping, a related recognition of guesswork in the design of feedback loops can help a transmitter and receiver to reduce their vulnerability to eavesdropping.

  8. Invisible transmission in quantum cryptography using continuous variables: A proof of Eve's vulnerability

    Science.gov (United States)

    Navez, Patrick; Gatti, Alessandra; Lugiato, Luigi A.

    2002-03-01

    By analogy to classical cryptography, we develop a quantum cryptographic scheme in which the two public and private keys consist in each of two entangled beams of squeezed light. An analog secret information is encrypted by modulating the phase of the beam sent in public. The knowledge of the degree of nonclassical correlation between the beam quadratures measured in private and in public allows only the receiver to decrypt the secret information. Finally, in a view towards absolute security, we formally prove that any external intervention of an eavesdropper makes him vulnerable to any subsequent detection.

  9. Quantum Cryptography using entangled photons in energy-time Bell states

    OpenAIRE

    Tittel, Wolfgang; Brendel, Jurgen; Zbinden, Hugo; Gisin, Nicolas

    1999-01-01

    We present a setup for quantum cryptography based on photon pairs in energy-time Bell states and show its feasibility in a laboratory experiment. Our scheme combines the advantages of using photon pairs instead of faint laser pulses and the possibility to preserve energy-time entanglement over long distances. Moreover, using four-dimensional energy-time states, no fast random change of bases is required in our setup: Nature itself decides whether to measure in the energy or in the time base, ...

  10. General Theory of Decoy-State Quantum Cryptography with Dark Count Rate Fluctuation

    Institute of Scientific and Technical Information of China (English)

    GAO Xiang; SUN Shi-Hai; LIANG Lin-Mei

    2009-01-01

    The existing theory of decoy-state quantum cryptography assumes that the dark count rate is a constant, but in practice there exists fluctuation. We develop a new scheme of the decoy state, achieve a more practical key generation rate in the presence of fluctuation of the dark count rate, and compare the result with the result of the decoy-state without fluctuation.It is found that the key generation rate and maximal secure distance will be decreased under the influence of the fluctuation of the dark count rate.

  11. Quantum cryptography using entangled photons in energy-time bell states

    Science.gov (United States)

    Tittel; Brendel; Zbinden; Gisin

    2000-05-15

    We present a setup for quantum cryptography based on photon pairs in energy-time Bell states and show its feasibility in a laboratory experiment. Our scheme combines the advantages of using photon pairs instead of faint laser pulses and the possibility to preserve energy-time entanglement over long distances. Moreover, using four-dimensional energy-time states, no fast random change of bases is required in our setup: Nature itself decides whether to measure in the energy or in the time base, thus rendering eavesdropper attacks based on "photon number splitting" less efficient.

  12. A sessional blind signature based on quantum cryptography

    Science.gov (United States)

    Khodambashi, Siavash; Zakerolhosseini, Ali

    2014-01-01

    In this paper, we present a sessional blind signature protocol whose security is guaranteed by fundamental principles of quantum physics. It allows a message owner to get his message signed by an authorized signatory. However, the signatory is not capable of reading the message contents and everyone can verify authenticity of the message. For this purpose, we took advantage of a sessional signature as well as quantum entangled pairs which are generated with respect to it in our proposed protocol. We describe our proposed blind signature through an example and briefly discuss about its unconditional security. Due to the feasibility of the protocol, it can be widely employed for e-payment, e-government, e-business and etc.

  13. Unconditionally secure commitment in position-based quantum cryptography.

    Science.gov (United States)

    Nadeem, Muhammad

    2014-10-27

    A new commitment scheme based on position-verification and non-local quantum correlations is presented here for the first time in literature. The only credential for unconditional security is the position of committer and non-local correlations generated; neither receiver has any pre-shared data with the committer nor does receiver require trusted and authenticated quantum/classical channels between him and the committer. In the proposed scheme, receiver trusts the commitment only if the scheme itself verifies position of the committer and validates her commitment through non-local quantum correlations in a single round. The position-based commitment scheme bounds committer to reveal valid commitment within allocated time and guarantees that the receiver will not be able to get information about commitment unless committer reveals. The scheme works for the commitment of both bits and qubits and is equally secure against committer/receiver as well as against any third party who may have interests in destroying the commitment. Our proposed scheme is unconditionally secure in general and evades Mayers and Lo-Chau attacks in particular.

  14. Memory attacks on device-independent quantum cryptography.

    Science.gov (United States)

    Barrett, Jonathan; Colbeck, Roger; Kent, Adrian

    2013-01-01

    Device-independent quantum cryptographic schemes aim to guarantee security to users based only on the output statistics of any components used, and without the need to verify their internal functionality. Since this would protect users against untrustworthy or incompetent manufacturers, sabotage, or device degradation, this idea has excited much interest, and many device-independent schemes have been proposed. Here we identify a critical weakness of device-independent protocols that rely on public communication between secure laboratories. Untrusted devices may record their inputs and outputs and reveal information about them via publicly discussed outputs during later runs. Reusing devices thus compromises the security of a protocol and risks leaking secret data. Possible defenses include securely destroying or isolating used devices. However, these are costly and often impractical. We propose other more practical partial defenses as well as a new protocol structure for device-independent quantum key distribution that aims to achieve composable security in the case of two parties using a small number of devices to repeatedly share keys with each other (and no other party).

  15. 量子密码通信及其研究进展%Quantum Cryptography and Its Research Progress

    Institute of Scientific and Technical Information of China (English)

    林帅; 林雄

    2012-01-01

    2007年4月2日,国际上首个量子密码通信网络由中国科学家在北京测试运行成功。这是迄今为止国际公开报道的唯一无中转,可同时、任意互通的量子密码通信网络,标志着量子保密通信技术从点对点方式向网络化迈出了关键一步。这次实验的成功,为量子因特网的发展奠定了基础。文章阐述量子密码的产生、量子密码学的基本原理、该领域的实验研究及研究成果,最后指出量子密码通信将是保障未来网络通信安全的一种重要技术。%China's first quantum cryptography network has been successfully tested in Beijing, the Chinese Academy of Sciences announced on April 2, 2007. It is the only fully-connected quantum network that could make simultaneous communications without any relay ever reported in the world, according to experts. The feat is a crucial step towards the practical usage of quantum cryptography from the point-to-point network. The success of this experiment, laid the foundation for the development of quantum Internet. This paper describes the generation of quantum cryptography, the basic principle of quantum cryptography in the field of experimental research and research results, and finally pointed out that quantum cryptography will be an important technology to protect the security of network communication.

  16. SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC

    Directory of Open Access Journals (Sweden)

    Ayman Wazwaz1

    2016-08-01

    Full Text Available Security System for Data using Steganography and Cryptography (SSDSC is a set of hardware and software components that will be used to send secured documents through the internet. Some of the software will be loaded into a microcontrollers in order to increase the complexity and security. The data will be encrypted using the Advanced Encryption Standard (AES algorithm with a key from the Raspberry PI microcontroller and hide it inside an image using Least Significant Bit (LSB algorithm, the data will be invisible. The image will be transmitted and received through the internet, the receivers will extract the hidden data from the image and decrypt it to have the original data with the image. Complicating the steps of hiding and encryption will reduce the possiblity of intrusin of secured documents, and the process will be trasparent to the user to increase security without affecting the normal steps and the behavior in secured documents exchange.

  17. Coherent pulse implementations of quantum cryptography protocols resistant to photon number splitting attacks

    CERN Document Server

    Acin, A; Scarani, V; Acin, Antonio; Gisin, Nicolas; Scarani, Valerio

    2004-01-01

    A new class of quantum cryptography (QC) protocols that are robust against the most general photon number splitting attacks in a weak coherent pulse implementation has been recently proposed. In this article we give a quite exhaustive analysis of several eavesdropping attacks on these schemes. The eavesdropper (Eve) is supposed to have unlimited technological power while the honest parties (Alice and Bob) use present day technology, in particular an attenuated laser as an approximation of a single-photon source. They exploit the nonorthogonality of quantum states for decreasing the information accessible to Eve in the multi-photon pulses accidentally produced by the imperfect source. An implementation of some of these protocols using present day technology allow for a secure key distribution up to distances of $\\sim$ 150 km. We also show that strong-pulse implementations, where a strong pulse is included as a reference, allow for key distribution robust against photon number splitting attacks.

  18. Quantum walk public-key cryptographic system

    Science.gov (United States)

    Vlachou, C.; Rodrigues, J.; Mateus, P.; Paunković, N.; Souto, A.

    2015-12-01

    Quantum Cryptography is a rapidly developing field of research that benefits from the properties of Quantum Mechanics in performing cryptographic tasks. Quantum walks are a powerful model for quantum computation and very promising for quantum information processing. In this paper, we present a quantum public-key cryptographic system based on quantum walks. In particular, in the proposed protocol the public-key is given by a quantum state generated by performing a quantum walk. We show that the protocol is secure and analyze the complexity of public key generation and encryption/decryption procedures.

  19. A contribution to quantum cryptography in finite-dimensional systems including further results from the field of quantum information theory; Ein Beitrag zur Quantenkryptographie in endlichdimensionalen Systemen nebst weiteren Ergebnissen aus dem Gebiet der Quanteninformationstheorie

    Energy Technology Data Exchange (ETDEWEB)

    Ranade, Kedar S.

    2009-02-04

    This PhD thesis deals with quantum-cryptographic protocols which allow general finite-dimensional quantum systems (qudits) as carriers of information in contrast to the predominantly used two-dimensional quantum systems (qubits). The main focus of investigations is the maximum tolerable error rate of such protocols and its behaviour as a function of the dimension of the information carriers. For this purpose, several concepts are introduced which allow the treatment of this problem. In particular, protocols are presented which work up to a maximum tolerate error rate, and it is shown that a wide class of protocols cannot be used for higher error rates. Among other things, it turns out that the maximum tolerable error rate for two-basis protocols increases up to 50% for high dimensions. Apart from the above-mentioned main subjects of this thesis, some other results from the field of quantum information theory are given, which were achieved during this PhD project. (orig.)

  20. Wigner representation for experiments on quantum cryptography using two-photon polarization entanglement produced in parametric down-conversion

    Energy Technology Data Exchange (ETDEWEB)

    Casado, A [Departamento de Fisica Aplicada III, Escuela Superior de Ingenieros, Universidad de Sevilla, 41092 Sevilla (Spain); Guerra, S [Centro Asociado de la Universidad Nacional de Educacion a Distancia de Las Palmas de Gran Canaria (Spain); Placido, J [Departamento de Fisica, Universidad de Las Palmas de Gran Canaria (Spain)], E-mail: acasado@us.es

    2008-02-28

    In this paper, the theory of parametric down-conversion in the Wigner representation is applied to Ekert's quantum cryptography protocol. We analyse the relation between two-photon entanglement and (non-secure) quantum key distribution within the Wigner framework in the Heisenberg picture. Experiments using two-qubit polarization entanglement generated in nonlinear crystals are analysed in this formalism, along with the effects of eavesdropping attacks in the case of projective measurements.

  1. Which optical processes are suitable to make probabilistic single photon sources for quantum cryptography?

    CERN Document Server

    Verma, Amit

    2009-01-01

    Single photon sources to be used in quantum cryptography must show higher order antibunching (HOA). HOA is reported by us in several many wave mixing processes. In the present work we have investigated the possibility of observing HOA in multiwave mixing processes in general. The generalized Hamiltonian is solved for several particular cases in Heisenberg picture and possibility of observing HOA is investigated with the help of criterion of Pathak and Garcia. Several particular cases of the generalized Hamiltonian are solved with the help of short time approximation technique and HOA is reported for pump modes of different multiwave mixing processes. It is also found that HOA can not be observed for the signal and stokes modes in of the cases studied here.

  2. Quantum Information, computation and cryptography. An introductory survey of theory, technology and experiments

    Energy Technology Data Exchange (ETDEWEB)

    Benatti, Fabio [Trieste Univ., Miramare (Italy). Dipt. Fisica Teorica; Fannes, Mark [Leuven Univ. (Belgium). Inst. voor Theoretische Fysica; Floreanini, Roberto [INFN, Trieste (Italy). Dipt. di Fisica Teorica; Petritis, Dimitri (eds.) [Rennes 1 Univ., 35 (France). Inst. de Recherche Mathematique de Rennes

    2010-07-01

    This multi-authored textbook addresses graduate students with a background in physics, mathematics or computer science. No research experience is necessary. Consequently, rather than comprehensively reviewing the vast body of knowledge and literature gathered in the past twenty years, this book concentrates on a number of carefully selected aspects of quantum information theory and technology. Given the highly interdisciplinary nature of the subject, the multi-authored approach brings together different points of view from various renowned experts, providing a coherent picture of the subject matter. The book consists of ten chapters and includes examples, problems, and exercises. The first five present the mathematical tools required for a full comprehension of various aspects of quantum mechanics, classical information, and coding theory. Chapter 6 deals with the manipulation and transmission of information in the quantum realm. Chapters 7 and 8 discuss experimental implementations of quantum information ideas using photons and atoms. Finally, chapters 9 and 10 address ground-breaking applications in cryptography and computation. (orig.)

  3. Quantum Cryptography, Quantum Communication, and Quantum Computer in a Noisy Environment

    Science.gov (United States)

    Nagata, Koji; Nakamura, Tadao

    2017-07-01

    First, we study several information theories based on quantum computing in a desirable noiseless situation. (1) We present quantum key distribution based on Deutsch's algorithm using an entangled state. (2) We discuss the fact that the Bernstein-Vazirani algorithm can be used for quantum communication including an error correction. Finally, we discuss the main result. We study the Bernstein-Vazirani algorithm in a noisy environment. The original algorithm determines a noiseless function. Here we consider the case that the function has an environmental noise. We introduce a noise term into the function f( x). So we have another noisy function g( x). The relation between them is g( x) = f( x) ± O( 𝜖). Here O( 𝜖) ≪ 1 is the noise term. The goal is to determine the noisy function g( x) with a success probability. The algorithm overcomes classical counterpart by a factor of N in a noisy environment.

  4. FINGERPRINT IDENTIFICATION SYSTEM combined with "CRYPTOGRAPHY" for Authentication.

    Directory of Open Access Journals (Sweden)

    G.Prasanna Lakshmi

    2010-07-01

    Full Text Available Biometrics technology, which uses physical or behavioral characteristics to identify users, has come to attract increased attention as a means of reliable personal authentication that helps the identity of an actual user. Among various modalities of Biometrics, Fingerprints are known to have the longest history of actual use in law enforcement applications with proven performance. This project surveys the state of the art in fingerprint identification technology. In this project, a design schema of a security authentication system combined with fingerprint identification and public key cryptography is explored, and its specific security mechanism is discussed in detail. In our schema, fingerprint is added into user's private key and served a security parameter, such that user’s secret key is separated into secret key parameters and fingerprint, by secret splitting mechanism, which makes the secret key to be bounded with user's information. This will increase the security of secret key ultimately. In such an uthentication system, the diplex authentication technologies --- fingerprint and smart card --- are adopted, and the user fingerprint needn’t to be transmitted during the authentication process, whichcan protect user's privacy effectively.

  5. Research on Applications of Cryptography for Multi-Mobile Agent System

    Institute of Scientific and Technical Information of China (English)

    HUANG Hai-ping; WANG Ru-chuan; XU Xiao-long

    2004-01-01

    With the development of information network and agent technology, Multi-Mobile Agents' Cooperation can not only improve the computing efficiency, but also have a comprehensive applicative value in solving the security issues of mobile agent system. Aiming at the security and flexibility, this paper proposes a kind of basic architecture and the design pattern of Multi-Mobile Agent System (MMAS). Combined with cryptography, it builds the security mechanism on keys' distribution and management and Coalition Signature of MMAS. Through the analysis of security and validity, the introduction and application of cryptography can improve the performance of MMAS.

  6. Elliptic Curve Cryptography with Security System in Wireless Sensor Networks

    Science.gov (United States)

    Huang, Xu; Sharma, Dharmendra

    2010-10-01

    The rapid progress of wireless communications and embedded micro-electro-system technologies has made wireless sensor networks (WSN) very popular and even become part of our daily life. WSNs design are generally application driven, namely a particular application's requirements will determine how the network behaves. However, the natures of WSN have attracted increasing attention in recent years due to its linear scalability, a small software footprint, low hardware implementation cost, low bandwidth requirement, and high device performance. It is noted that today's software applications are mainly characterized by their component-based structures which are usually heterogeneous and distributed, including the WSNs. But WSNs typically need to configure themselves automatically and support as hoc routing. Agent technology provides a method for handling increasing software complexity and supporting rapid and accurate decision making. This paper based on our previous works [1, 2], three contributions have made, namely (a) fuzzy controller for dynamic slide window size to improve the performance of running ECC (b) first presented a hidden generation point for protection from man-in-the middle attack and (c) we first investigates multi-agent applying for key exchange together. Security systems have been drawing great attentions as cryptographic algorithms have gained popularity due to the natures that make them suitable for use in constrained environment such as mobile sensor information applications, where computing resources and power availability are limited. Elliptic curve cryptography (ECC) is one of high potential candidates for WSNs, which requires less computational power, communication bandwidth, and memory in comparison with other cryptosystem. For saving pre-computing storages recently there is a trend for the sensor networks that the sensor group leaders rather than sensors communicate to the end database, which highlighted the needs to prevent from the man

  7. Theoretical Study of Quantum Bit Rate in Free-Space Quantum Cryptography

    Institute of Scientific and Technical Information of China (English)

    MA Jing; ZHANG Guang-Yu; TAN Li-Ying

    2006-01-01

    The quantum bit rate is an important operating parameter in free-space quantum key distribution. We introduce the measuring factor and the sifting factor, and present the expressions of the quantum bit rate based on the ideal single-photon sources and the single-photon sources with Poisson distribution. The quantum bit rate is studied in the numerical simulation for the laser links between a ground station and a satellite in a low earth orbit. The results show that it is feasible to implement quantum key distribution between a ground station and a satellite in a low earth orbit.

  8. Security of quantum key distribution source

    OpenAIRE

    Simonsen, Eivind Sjøtun

    2010-01-01

    Cryptography has begun its journey into the field of quantum information theory. Classical cryptography has shown weaknesses, which may be exploited in the future, either by development in mathematics, or by quantum computers. Quantum key distribution (QKD) is a promising path for cryptography to enable secure communication in the future. Although the theory of QKD promises absolute security, the reality is that current quantum crypto systems have flaws in them, as perfect devices have proven...

  9. An Elliptic Curve Cryptography-Based RFID Authentication Securing E-Health System

    OpenAIRE

    2015-01-01

    Mobile healthcare (M-health) systems can monitor the patients’ conditions remotely and provide the patients and doctors with access to electronic medical records, and Radio Frequency Identification (RFID) technology plays an important role in M-health services. It is important to securely access RFID data in M-health systems: here, authentication, privacy, anonymity, and tracking resistance are desirable security properties. In 2014, He et al. proposed an elliptic curve cryptography- (ECC-) b...

  10. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  11. Randomized dynamical decoupling strategies and improved one-way key rates for quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Kern, Oliver

    2009-05-25

    The present thesis deals with various methods of quantum error correction. It is divided into two parts. In the first part, dynamical decoupling methods are considered which have the task of suppressing the influence of residual imperfections in a quantum memory. Such imperfections might be given by couplings between the finite dimensional quantum systems (qudits) constituting the quantum memory, for instance. The suppression is achieved by altering the dynamics of an imperfect quantum memory with the help of a sequence of local unitary operations applied to the qudits. Whereas up to now the operations of such decoupling sequences have been constructed in a deterministic fashion, strategies are developed in this thesis which construct the operations by random selection from a suitable set. Formulas are derived which estimate the average performance of such strategies. As it turns out, randomized decoupling strategies offer advantages and disadvantages over deterministic ones. It is possible to benefit from the advantages of both kind of strategies by designing combined strategies. Furthermore, it is investigated if and how the discussed decoupling strategies can be employed to protect a quantum computation running on the quantum memory. It is shown that a purely randomized decoupling strategy may be used by applying the decoupling operations and adjusted gates of the quantum algorithm in an alternating fashion. Again this method can be enhanced by the means of deterministic methods in order to obtain a combined decoupling method for quantum computations analogously to the combining strategies for quantum memories. The second part of the thesis deals with quantum error-correcting codes and protocols for quantum key distribution. The focus is on the BB84 and the 6-state protocol making use of only one-way communication during the error correction and privacy amplification steps. It is shown that by adding additional errors to the preliminary key (a process called

  12. Calculator Cryptography.

    Science.gov (United States)

    Hall, Matthew

    2003-01-01

    Uses cryptography to demonstrate the importance of algebra and the use of technology as an effective real application of mathematics. Explains simple encoding and decoding of messages for student learning of modular arithmetic. This elementary encounter with cryptography along with its historical and modern background serves to motivate student…

  13. Neural cryptography with feedback

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Shacham, Lanir; Kanter, Ido

    2004-04-01

    Neural cryptography is based on a competition between attractive and repulsive stochastic forces. A feedback mechanism is added to neural cryptography which increases the repulsive forces. Using numerical simulations and an analytic approach, the probability of a successful attack is calculated for different model parameters. Scaling laws are derived which show that feedback improves the security of the system. In addition, a network with feedback generates a pseudorandom bit sequence which can be used to encrypt and decrypt a secret message.

  14. Neural cryptography with feedback.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Shacham, Lanir; Kanter, Ido

    2004-04-01

    Neural cryptography is based on a competition between attractive and repulsive stochastic forces. A feedback mechanism is added to neural cryptography which increases the repulsive forces. Using numerical simulations and an analytic approach, the probability of a successful attack is calculated for different model parameters. Scaling laws are derived which show that feedback improves the security of the system. In addition, a network with feedback generates a pseudorandom bit sequence which can be used to encrypt and decrypt a secret message.

  15. Quantum Cost Efficient Reversible BCD Adder for Nanotechnology Based Systems

    CERN Document Server

    Islam, Md Saiful; Begum, Zerina

    2011-01-01

    Reversible logic allows low power dissipating circuit design and founds its application in cryptography, digital signal processing, quantum and optical information processing. This paper presents a novel quantum cost efficient reversible BCD adder for nanotechnology based systems using PFAG gate. It has been demonstrated that the proposed design offers less hardware complexity and requires minimum number of garbage outputs than the existing counterparts. The remarkable property of the proposed designs is that its quantum realization is given in NMR technology.

  16. Trojan-horse attacks threaten the security of practical quantum cryptography

    Science.gov (United States)

    Jain, Nitin; Anisimova, Elena; Khan, Imran; Makarov, Vadim; Marquardt, Christoph; Leuchs, Gerd

    2014-12-01

    A quantum key distribution (QKD) system may be probed by an eavesdropper Eve by sending in bright light from the quantum channel and analyzing the back-reflections. We propose and experimentally demonstrate a setup for mounting such a Trojan-horse attack. We show it in operation against the quantum cryptosystem Clavis2 from ID Quantique, as a proof-of-principle. With just a few back-reflected photons, Eve discerns Bob's (secret) basis choice, and thus the raw key bit in the Scarani-Acín-Ribordy-Gisin 2004 protocol, with higher than 90% probability. This would clearly breach the security of the cryptosystem. Unfortunately, Eve's bright pulses have a side effect of causing a high level of afterpulsing in Bob's single-photon detectors, resulting in a large quantum bit error rate that effectively protects this system from our attack. However, in a Clavis2-like system equipped with detectors with less-noisy but realistic characteristics, an attack strategy with positive leakage of the key would exist. We confirm this by a numerical simulation. Both the eavesdropping setup and strategy can be generalized to attack most of the current QKD systems, especially if they lack proper safeguards. We also propose countermeasures to prevent such attacks.

  17. Contemporary cryptography

    CERN Document Server

    Oppliger, Rolf

    2011-01-01

    Whether you're new to the field or looking to broaden your knowledge of contemporary cryptography, this newly revised edition of an Artech House classic puts all aspects of this important topic into perspective. Delivering an accurate introduction to the current state-of-the-art in modern cryptography, the book offers you an in-depth understanding of essential tools and applications to help you with your daily work. The second edition has been reorganized and expanded, providing mathematical fundamentals and important cryptography principles in the appropriate appendixes, rather than summarize

  18. Hybrid ququart-encoded quantum cryptography protected by Kochen-Specker contextuality

    CERN Document Server

    Cabello, Adan; Nagali, Eleonora; Sciarrino, Fabio; 10.1103/PhysRevA.84.030302

    2011-01-01

    Quantum cryptographic protocols based on complementarity are nonsecure against attacks in which complementarity is imitated with classical resources. The Kochen-Specker (KS) theorem provides protection against these attacks, without requiring entanglement or spatially separated composite systems. We analyze the maximum tolerated noise to guarantee the security of a KS-protected cryptographic scheme against these attacks, and describe a photonic realization of this scheme using hybrid ququarts defined by the polarization and orbital angular momentum of single photons.

  19. Hybrid ququart-encoded quantum cryptography protected by Kochen-Specker contextuality

    Energy Technology Data Exchange (ETDEWEB)

    Cabello, Adan [Departamento de Fisica Aplicada II, Universidad de Sevilla, E-41012 Sevilla (Spain); Department of Physics, Stockholm University, S-10691 Stockholm (Sweden); D' Ambrosio, Vincenzo; Nagali, Eleonora [Dipartimento di Fisica della ' ' Sapienza' ' Universita di Roma, I-00185 Roma (Italy); Sciarrino, Fabio [Dipartimento di Fisica della ' ' Sapienza' ' Universita di Roma, I-00185 Roma (Italy); Istituto Nazionale di Ottica, Consiglio Nazionale delle Ricerche (INO-CNR), I-50125 Florence (Italy)

    2011-09-15

    Quantum cryptographic protocols based on complementarity are not secure against attacks in which complementarity is imitated with classical resources. The Kochen-Specker (KS) theorem provides protection against these attacks, without requiring entanglement or spatially separated composite systems. We analyze the maximum tolerated noise to guarantee the security of a KS-protected cryptographic scheme against these attacks and describe a photonic realization of this scheme using hybrid ququarts defined by the polarization and orbital angular momentum of single photons.

  20. Theory and practice of chaotic cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Amigo, J.M. [Centro de Investigacion Operativa, Universidad Miguel Hernandez, Avda. de la Universidad, 03202 Elche (Spain)]. E-mail: jm.amigo@umh.es; Kocarev, L. [Institute for Nonlinear Science, University of California, San Diego, 9500 Gilman Drive, La Jolla, CA 92093-0402 (United States)]. E-mail: lkocarev@ucsd.edu; Szczepanski, J. [Institute of Fundamental Technological Research, Polish Academy of Science, Swietokrzyska 21, 00-049 Warsaw (Poland)]. E-mail: jszczepa@ippt.gov.pl

    2007-06-25

    In this Letter we address some basic questions about chaotic cryptography, not least the very definition of chaos in discrete systems. We propose a conceptual framework and illustrate it with different examples from private and public key cryptography. We elaborate also on possible limits of chaotic cryptography.

  1. Asymptotic correctability of Bell-diagonal qudit states and lower bounds on tolerable error probabilities in quantum cryptography

    CERN Document Server

    Ranade, K S; Alber, Gernot; Ranade, Kedar S.

    2007-01-01

    The concept of asymptotic correctability of Bell-diagonal quantum states is generalised to elementary quantum systems of higher dimensions. Based on these results basic properties of quantum state purification protocols are investigated which are capable of purifying tensor products of Bell-diagonal states and which are based on $B$-steps of the Gottesman-Lo-type with the subsequent application of a Calderbank-Shor-Steane quantum code. Consequences for maximum tolerable error rates of quantum cryptographic protocols are discussed.

  2. Attacks to Cryptography Protocols of Wireless Industrial Communication Systems

    Directory of Open Access Journals (Sweden)

    Maria Franekova

    2010-01-01

    Full Text Available The paper deals with problems of safety and security principles within wireless industrial communication systems. First safety requirements to wireless industrial communication system, summarisation of attack methods and the available measures for risks elimination are described with orientation to safety critical applications. The mainly part is oriented to identification of risks and summarisation of defensive methods of wireless communication based on cryptographic techniques. Practical part the cryptoanalytic’s attacks to COTS (Commercial Off-The-Shelf wireless communications are mentioned based on the IEEE 802.11 standards.

  3. Communications with chaotic optoelectronic systems cryptography and multiplexing

    Science.gov (United States)

    Rontani, Damien

    With the rapid development of optical communications and the increasing amount of data exchanged, it has become utterly important to provide effective architectures to protect sensitive data. The use of chaotic optoelectronic devices has already demonstrated great potential in terms of additional computational security at the physical layer of the optical network. However, the determination of the security level and the lack of a multi-user framework are two hurdles which have prevented their deployment on a large scale. In this thesis, we propose to address these two issues. First, we investigate the security of a widely used chaotic generator, the external cavity semiconductor laser (ECSL). This is a time-delay system known for providing complex and high-dimensional chaos, but with a low level of security regarding the identification of its most critical parameter, the time delay. We perform a detailed analysis of the in uence of the ECSL parameters to devise how higher levels of security can be achieved and provide a physical interpretation of their origin. Second, we devise new architectures to multiplex optical chaotic signals and realize multi-user communications at high bit rates. We propose two different approaches exploiting known chaotic optoelectronic devices. The first one uses mutually coupled ECSL and extends typical chaos-based encryption strategies, such as chaos-shift keying (CSK) and chaos modulation (CMo). The second one uses an electro-optical oscillator (EOO) with multiple delayed feedback loops and aims first at transposing coded-division multiple access (CDMA) and then at developing novel strategies of encryption and decryption, when the time-delays of each feedback loop are time-dependent.

  4. Applications of single-qubit rotations in quantum public-key cryptography

    OpenAIRE

    Nikolopoulos, Georgios M.

    2008-01-01

    We discuss cryptographic applications of single-qubit rotations from the perspective of trapdoor one-way functions and public-key encryption. In particular, we present an asymmetric cryptosystem whose security relies on fundamental principles of quantum physics. A quantum public key is used for the encryption of messages while decryption is possible by means of a classical private key only. The trapdoor one-way function underlying the proposed cryptosystem maps integer numbers to quantum stat...

  5. Cryptography Basics

    DEFF Research Database (Denmark)

    Förster, Klaus-Tycho

    2017-01-01

    Public-key cryptography is one of the biggest scientific achievements of the last century. Two people that never met before can establish a common secret in plain sight? Sounds like pure magic! The idea of this chapter is to reveal some of the tricks of this “crypto magic”. This chapter...

  6. Safety Evalution of Cryptography Modules within Safety Related Control Systems for Railway Applications

    Directory of Open Access Journals (Sweden)

    Maria Franekova

    2011-01-01

    Full Text Available The paper deals with the problem of safety evaluation of cryptographic modules used within safety-related control system for applications with increasing safety integrity level. The requirements to cryptographic techniques in safety-related communication for railway application are describe. The mainly part is oriented to description of mathematical apparatus for an error probability of cryptography code with a safety code, used in an additional safety communication layer. The practical results are related with the quantitative evaluation of an average error probability of code word for Euroradio protocol recommended for communication in European Train Control System.

  7. Faint laser pulses versus a single-photon source in free space quantum cryptography

    Science.gov (United States)

    Molotkov, S. N.; Potapova, T. A.

    2016-03-01

    In this letter we present estimates for the distance of secret key transmission through free space for three different protocols of quantum key distribution: for BB84 and phase time-coding protocols in the case of a strictly single-photon source, and for the relativistic quantum key distribution protocol in the case of faint laser pulses.

  8. Applications of single-qubit rotations in quantum public-key cryptography

    Science.gov (United States)

    Nikolopoulos, Georgios M.

    2008-03-01

    We discuss cryptographic applications of single-qubit rotations from the perspective of trapdoor one-way functions and public-key encryption. In particular, we present an asymmetric cryptosystem whose security relies on fundamental principles of quantum physics. A quantum public key is used for the encryption of messages while decryption is possible by means of a classical private key only. The trapdoor one-way function underlying the proposed cryptosystem maps integer numbers to quantum states of a qubit and its inversion can be infeasible by virtue of the Holevo’s theorem.

  9. Private classical capacity with a symmetric side channel and its application to quantum cryptography

    Science.gov (United States)

    Smith, Graeme

    2008-08-01

    We study the symmetric-side-channel-assisted private capacity of a quantum channel, for which we provide a single-letter formula. This capacity is additive, convex, and, for degradable channels, equal to the unassisted private capacity. While a channel’s (unassisted) capacity for private classical communication may be strictly larger than its quantum capacity, we will show that these capacities are equal for degradable channels, thus demonstrating the equivalence of privacy and quantum coherence in this context. We use these ideas to find new bounds on the key rate of quantum key distribution protocols with one-way classical post-processing. For the Bennett-Brassard 1984 protocol, our results demonstrate that collective attacks are strictly stronger than individual attacks.

  10. Virtual Entanglement and Reconciliation Protocols for Quantum Cryptography with Continuous Variables

    CERN Document Server

    Grosshans, F; Wenger, J; Tualle-Brouri, R; Grangier, P; Grangier, Ph.

    2003-01-01

    We discuss quantum key distribution protocols using quantum continuous variables. We show that such protocols can be made secure against individual gaussian attacks regardless the transmission of the optical line between Alice and Bob. This is achieved by reversing the reconciliation procedure subsequent to the quantum transmission, that is, using Bob's instead of Alice's data to build the key. Although squeezing or entanglement may be helpful to improve the resistance to noise, they are not required for the protocols to remain secure with high losses. Therefore, these protocols can be implemented very simply by transmitting coherent states and performing homodyne detection. Here, we show that entanglement nevertheless plays a crucial role in the security analysis of coherent state protocols. Every cryptographic protocol based on displaced gaussian states turns out to be equivalent to an entanglement-based protocol, even though no entanglement is actually present. This equivalence even holds in the absence of...

  11. Quantum Key Distribution Protocol with Private-Public Key

    OpenAIRE

    Serna, Eduin H.

    2009-01-01

    A quantum cryptographic protocol based in public key cryptography combinations and private key cryptography is presented. Unlike the BB84 protocol [1] and its many variants [2,3] two quantum channels are used. The present research does not make reconciliation mechanisms of information to derive the key. A three related system of key distribution are described.

  12. Free-Space Quantum Key Distribution

    CERN Document Server

    Carrasco-Casado, Alberto; Denisenko, Natalia

    2016-01-01

    Based on the firm laws of physics rather than unproven foundations of mathematical complexity, quantum cryptography provides a radically different solution for encryption and promises unconditional security. Quantum cryptography systems are typically built between two nodes connected to each other through fiber optic. This chapter focuses on quantum cryptography systems operating over free-space optical channels as a cost-effective and license-free alternative to fiber optic counterparts. It provides an overview of the different parts of an experimental free-space quantum communication link developed in the Spanish National Research Council (Madrid, Spain).

  13. Advanced techniques for free-space optical quantum cryptography over water

    Science.gov (United States)

    Hill, Alexander D.; Christensen, Bradley; Kwiat, Paul G.

    2016-03-01

    Free-space quantum key distribution (QKD) over water (e.g., ship to ship) may be limited by ship motion and atmospheric effects, such as mode distortion and beam wander due to turbulence. We report on a technique which reduces noise by excluding spatial modes which are less likely to contain QKD signal photons and experimentally demonstrate an improvement in QKD key generation rates in various noise and turbulence regimes.

  14. General immunity and superadditivity of two-way Gaussian quantum cryptography

    Science.gov (United States)

    Ottaviani, Carlo; Pirandola, Stefano

    2016-03-01

    We consider two-way continuous-variable quantum key distribution, studying its security against general eavesdropping strategies. Assuming the asymptotic limit of many signals exchanged, we prove that two-way Gaussian protocols are immune to coherent attacks. More precisely we show the general superadditivity of the two-way security thresholds, which are proven to be higher than the corresponding one-way counterparts in all cases. We perform the security analysis first reducing the general eavesdropping to a two-mode coherent Gaussian attack, and then showing that the superadditivity is achieved by exploiting the random on/off switching of the two-way quantum communication. This allows the parties to choose the appropriate communication instances to prepare the key, accordingly to the tomography of the quantum channel. The random opening and closing of the circuit represents, in fact, an additional degree of freedom allowing the parties to convert, a posteriori, the two-mode correlations of the eavesdropping into noise. The eavesdropper is assumed to have no access to the on/off switching and, indeed, cannot adapt her attack. We explicitly prove that this mechanism enhances the security performance, no matter if the eavesdropper performs collective or coherent attacks.

  15. General immunity and superadditivity of two-way Gaussian quantum cryptography.

    Science.gov (United States)

    Ottaviani, Carlo; Pirandola, Stefano

    2016-03-01

    We consider two-way continuous-variable quantum key distribution, studying its security against general eavesdropping strategies. Assuming the asymptotic limit of many signals exchanged, we prove that two-way Gaussian protocols are immune to coherent attacks. More precisely we show the general superadditivity of the two-way security thresholds, which are proven to be higher than the corresponding one-way counterparts in all cases. We perform the security analysis first reducing the general eavesdropping to a two-mode coherent Gaussian attack, and then showing that the superadditivity is achieved by exploiting the random on/off switching of the two-way quantum communication. This allows the parties to choose the appropriate communication instances to prepare the key, accordingly to the tomography of the quantum channel. The random opening and closing of the circuit represents, in fact, an additional degree of freedom allowing the parties to convert, a posteriori, the two-mode correlations of the eavesdropping into noise. The eavesdropper is assumed to have no access to the on/off switching and, indeed, cannot adapt her attack. We explicitly prove that this mechanism enhances the security performance, no matter if the eavesdropper performs collective or coherent attacks.

  16. Quantum cloning

    OpenAIRE

    Scarani, Valerio; Iblisdir, Sofyan; Gisin, Nicolas; Acin, Antonio

    2005-01-01

    The impossibility of perfectly copying (or cloning) an arbitrary quantum state is one of the basic rules governing the physics of quantum systems. The processes that perform the optimal approximate cloning have been found in many cases. These "quantum cloning machines" are important tools for studying a wide variety of tasks, e.g. state estimation and eavesdropping on quantum cryptography. This paper provides a comprehensive review of quantum cloning machines (both for discrete-dimensional an...

  17. A simple coherent attack and practical security of differential phase shift quantum cryptography

    Science.gov (United States)

    Kronberg, D. A.

    2014-02-01

    The differential phase shift quantum key distribution protocol reveals good security against such powerful attacks as unambiguous state discrimination and beam splitting attacks. Its complete security analysis is complex due to high dimensions of the supposed spaces and density operators. In this paper, we consider a particular and conceptually simple coherent attack, available in practical implementations. The main condition for this attack is the length of used coherent state tuples of order 8-12. We show that under this condition, no high level of practical distance between legitimate users can be achieved.

  18. System Level Design of Reconfigurable Server Farms Using Elliptic Curve Cryptography Processor Engines

    Directory of Open Access Journals (Sweden)

    Sangook Moon

    2014-01-01

    Full Text Available As today’s hardware architecture becomes more and more complicated, it is getting harder to modify or improve the microarchitecture of a design in register transfer level (RTL. Consequently, traditional methods we have used to develop a design are not capable of coping with complex designs. In this paper, we suggest a way of designing complex digital logic circuits with a soft and advanced type of SystemVerilog at an electronic system level. We apply the concept of design-and-reuse with a high level of abstraction to implement elliptic curve crypto-processor server farms. With the concept of the superior level of abstraction to the RTL used with the traditional HDL design, we successfully achieved the soft implementation of the crypto-processor server farms as well as robust test bench code with trivial effort in the same simulation environment. Otherwise, it could have required error-prone Verilog simulations for the hardware IPs and other time-consuming jobs such as C/SystemC verification for the software, sacrificing more time and effort. In the design of the elliptic curve cryptography processor engine, we propose a 3X faster GF(2m serial multiplication architecture.

  19. A decoy-state protocol for quantum cryptography with 4 intensities of coherent states

    CERN Document Server

    Wang, X B

    2004-01-01

    In order to beat any type of photon-number-splitting attack, we In order to beat any type of photon-number-splitting attack, we propose a protocol for quantum key distributoin (QKD) using 4 different intensities of pulses. They are vacuum and coherent states with mean photon number $\\mu,\\mu'$ and $\\mu_s$. $\\mu_s$ is around 0.55 and this class of pulses are used as the main signal states. The other two classes of coherent states are used for both decoy and signal. We have shown that, given the typical set-up in practice, the key rate from the main signal pulses is more than 77% to 88% of the theoretically allowed maximal rate in the case of overall transmittance of $10^{-4}$ and $10^{-3}$.

  20. A Generic Evolution of Key Using Quantum Cryptography Management for Transcript

    Directory of Open Access Journals (Sweden)

    BASANT DHAKAD

    2013-03-01

    Full Text Available Network Security is play very important role in Network system, Because in networked systems, the major security risks occur while conducting business on the Net; The following are some of the security risks occur: unauthorized access, Eavesdropping, Password sniffing, spoofing-spoofing, Denial of Service, virus attack, System modification, Data modification, Repudiation, E-mail bombing. Not With data storage and processing snowballing into a necessity from being an efficient part of any business process or organization, the need for securing storage at various degrees of granularity is gaining considerable interest. The challenge in designing an encrypted file system stems from balancing performance, security perception, ease of usage and enterprise level deploy ability. Often, the most secure solutions may not even be the best solution either due to hit on performance or due to decreased usability. Further, narrowing the trust circle to exclude even hitherto trusted system administrators makes creating an encrypted file system a huge engineering exercise.

  1. Neural Network Approach to Locating Cryptography in Object Code

    Energy Technology Data Exchange (ETDEWEB)

    Jason L. Wright; Milos Manic

    2009-09-01

    Finding and identifying cryptography is a growing concern in the malware analysis community. In this paper, artificial neural networks are used to classify functional blocks from a disassembled program as being either cryptography related or not. The resulting system, referred to as NNLC (Neural Net for Locating Cryptography) is presented and results of applying this system to various libraries are described.

  2. Dynamics of neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Kanter, Ido

    2007-05-01

    Synchronization of neural networks has been used for public channel protocols in cryptography. In the case of tree parity machines the dynamics of both bidirectional synchronization and unidirectional learning is driven by attractive and repulsive stochastic forces. Thus it can be described well by a random walk model for the overlap between participating neural networks. For that purpose transition probabilities and scaling laws for the step sizes are derived analytically. Both these calculations as well as numerical simulations show that bidirectional interaction leads to full synchronization on average. In contrast, successful learning is only possible by means of fluctuations. Consequently, synchronization is much faster than learning, which is essential for the security of the neural key-exchange protocol. However, this qualitative difference between bidirectional and unidirectional interaction vanishes if tree parity machines with more than three hidden units are used, so that those neural networks are not suitable for neural cryptography. In addition, the effective number of keys which can be generated by the neural key-exchange protocol is calculated using the entropy of the weight distribution. As this quantity increases exponentially with the system size, brute-force attacks on neural cryptography can easily be made unfeasible.

  3. Report of the Public Cryptography Study Group.

    Science.gov (United States)

    American Council on Education, Washington, DC.

    Concerns of the National Security Agency (NSA) that information contained in some articles about cryptography in learned and professional journals and in monographs might be inimical to the national security are addressed. The Public Cryptography Study Group, with one dissenting opinion, recommends that a voluntary system of prior review of…

  4. Review of Lattice-based Public key Cryptography(Russian)

    OpenAIRE

    Usatyuk, V. S.

    2010-01-01

    This article presets a review of the achievements rapidly developing field of cryptography - public-key cryptography based on the lattice theory. Paper contains the necessary basic concepts and the major problems of the lattice theory, as well as together with the description on the benefits of this cryptography class - the properties of the reliability to quantum computers and full homomorphism, the shortcomings of specific implementations.

  5. Rossler Nonlinear Dynamical Machine for Cryptography Applications

    CERN Document Server

    Pandey, Sunil; Shrivastava, Dr S C

    2009-01-01

    In many of the cryptography applications like password or IP address encryption schemes, symmetric cryptography is useful. In these relatively simpler applications of cryptography, asymmetric cryptography is difficult to justify on account of the computational and implementation complexities associated with asymmetric cryptography. Symmetric schemes make use of a single shared key known only between the two communicating hosts. This shared key is used both for the encryption as well as the decryption of data. This key has to be small in size besides being a subset of a potentially large keyspace making it convenient for the communicating hosts while at the same time making cryptanalysis difficult for the potential attackers. In the present work, an abstract Rossler nonlinear dynamical machine has been described first. The Rossler system exhibits chaotic dynamics for certain values of system parameters and initial conditions. The chaotic dynamics of the Rossler system with its apparently erratic and irregular ...

  6. Chocolate Key Cryptography

    Science.gov (United States)

    Bachman, Dale J.; Brown, Ezra A.; Norton, Anderson H.

    2010-01-01

    Cryptography is the science of hidden or secret writing. More generally, cryptography refers to the science of safeguarding information. Cryptography allows people to use a public medium such as the Internet to transmit private information securely, thus enabling a whole range of conveniences, from online shopping to personally printed movie…

  7. Chocolate Key Cryptography

    Science.gov (United States)

    Bachman, Dale J.; Brown, Ezra A.; Norton, Anderson H.

    2010-01-01

    Cryptography is the science of hidden or secret writing. More generally, cryptography refers to the science of safeguarding information. Cryptography allows people to use a public medium such as the Internet to transmit private information securely, thus enabling a whole range of conveniences, from online shopping to personally printed movie…

  8. Use of Cryptography in communication

    Directory of Open Access Journals (Sweden)

    University Junior Assistant Ioana-Julieta Vasile

    2008-05-01

    Full Text Available This work envisages the presentation and analysis of important cryptographic systems in the field as well as the way these systems have been applied during the course of time. The work presents the advantages and disadvantages that derive from the use of cryptography while also emphasizing the importance cryptography has had along the way. Not least, the present article shall analyze the "“Pretty Good Privacy"” model - –a widely used system nowadays, whose decryption key has yet to be found.

  9. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  10. Quantum key management

    Science.gov (United States)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  11. Quantum System Identification

    OpenAIRE

    Burgarth, Daniel; Yuasa, Kazuya

    2011-01-01

    The aim of quantum system identification is to estimate the ingredients inside a black box, in which some quantum-mechanical unitary process takes place, by just looking at its input-output behavior. Here we establish a basic and general framework for quantum system identification, that allows us to classify how much knowledge about the quantum system is attainable, in principle, from a given experimental setup. Prior knowledge on some elements of the black box helps the system identification...

  12. Quantum key distribution for composite dimensional finite systems

    Science.gov (United States)

    Shalaby, Mohamed; Kamal, Yasser

    2017-06-01

    The application of quantum mechanics contributes to the field of cryptography with very important advantage as it offers a mechanism for detecting the eavesdropper. The pioneering work of quantum key distribution uses mutually unbiased bases (MUBs) to prepare and measure qubits (or qudits). Weak mutually unbiased bases (WMUBs) have weaker properties than MUBs properties, however, unlike MUBs, a complete set of WMUBs can be constructed for systems with composite dimensions. In this paper, we study the use of weak mutually unbiased bases (WMUBs) in quantum key distribution for composite dimensional finite systems. We prove that the security analysis of using a complete set of WMUBs to prepare and measure the quantum states in the generalized BB84 protocol, gives better results than using the maximum number of MUBs that can be constructed, when they are analyzed against the intercept and resend attack.

  13. Quantum Random Number Generators

    OpenAIRE

    Herrero-Collantes, Miguel; Garcia-Escartin, Juan Carlos

    2016-01-01

    Random numbers are a fundamental resource in science and engineering with important applications in simulation and cryptography. The inherent randomness at the core of quantum mechanics makes quantum systems a perfect source of entropy. Quantum random number generation is one of the most mature quantum technologies with many alternative generation methods. We discuss the different technologies in quantum random number generation from the early devices based on radioactive decay to the multipl...

  14. Modern Quantum Technologies of Information Security

    CERN Document Server

    Korchenko, Oleksandr; Gnatyuk, Sergiy

    2010-01-01

    In the paper systematization and classification of modern quantum technologies of the information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of used quantum technologies is given. The qualitative analysis of advantages and disadvantages of concrete quantum protocols is made. The current status of a problem of practical quantum cryptography using in telecommunication networks is considered. In particular, the short review of existing commercial systems of quantum key distribution is given.

  15. Introduction to modern cryptography

    CERN Document Server

    Katz, Jonathan

    2014-01-01

    Praise for the First Edition:""This book is a comprehensive, rigorous introduction to what the authors name 'modern' cryptography. … a novel approach to how cryptography is taught, replacing the older, construction-based approach. … The concepts are clearly stated, both in an intuitive fashion and formally. … I would heartily recommend this book to anyone who is interested in cryptography. … The exercises are challenging and interesting, and can benefit readers of all academic levels.""-IACR Book Reviews, January 2010""Over the past 30 years, cryptography has been transformed from a mysterious

  16. Open quantum system identification

    CERN Document Server

    Schirmer, Sophie G; Zhou, Weiwei; Gong, Erling; Zhang, Ming

    2012-01-01

    Engineering quantum systems offers great opportunities both technologically and scientifically for communication, computation, and simulation. The construction and operation of large scale quantum information devices presents a grand challenge and a major issue is the effective control of coherent dynamics. This is often in the presence of decoherence which further complicates the task of determining the behaviour of the system. Here, we show how to determine open system Markovian dynamics of a quantum system with restricted initialisation and partial output state information.

  17. Mathematical Background of Public Key Cryptography

    DEFF Research Database (Denmark)

    Frey, Gerhard; Lange, Tanja

    2005-01-01

    The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material.......The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material....

  18. Increasing complexity with quantum physics.

    Science.gov (United States)

    Anders, Janet; Wiesner, Karoline

    2011-09-01

    We argue that complex systems science and the rules of quantum physics are intricately related. We discuss a range of quantum phenomena, such as cryptography, computation and quantum phases, and the rules responsible for their complexity. We identify correlations as a central concept connecting quantum information and complex systems science. We present two examples for the power of correlations: using quantum resources to simulate the correlations of a stochastic process and to implement a classically impossible computational task.

  19. Sorting quantum systems efficiently

    Science.gov (United States)

    Ionicioiu, Radu

    2016-05-01

    Measuring the state of a quantum system is a fundamental process in quantum mechanics and plays an essential role in quantum information and quantum technologies. One method to measure a quantum observable is to sort the system in different spatial modes according to the measured value, followed by single-particle detectors on each mode. Examples of quantum sorters are polarizing beam-splitters (PBS) – which direct photons according to their polarization – and Stern-Gerlach devices. Here we propose a general scheme to sort a quantum system according to the value of any d-dimensional degree of freedom, such as spin, orbital angular momentum (OAM), wavelength etc. Our scheme is universal, works at the single-particle level and has a theoretical efficiency of 100%. As an application we design an efficient OAM sorter consisting of a single multi-path interferometer which is suitable for a photonic chip implementation.

  20. A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine maps

    Directory of Open Access Journals (Sweden)

    Manjunatha V G,

    2015-11-01

    Full Text Available The astonishing developments have been occurring in the field of network communications for a long time and these advancement lead to a genuine and conspicuous need of image transfer and getting safely through the web. The web is not secure for the exchange of dependable data, for example, content, picture and video. Cryptographic procedures are vital to be improved to exchange data through web safely. Routine cryptography, for example, AES, DES, IDEA and RSA includes simply rearranging of pixels and henceforth will prompt decreased security for information protection. With a specific end goal to enhance the security, it is important to expand the intricacy in encryption. As an answer for this it is proposed to utilize confused maps in encryption methods which expand the multifaceted nature. As intricacy builds, data security increments. Thus, chaos-based encryption has its own significance in providing security for secret information i.e. data confidentiality than conventional.

  1. Quantum Cryptography II: How to re-use a one-time pad safely even if P=NP.

    Science.gov (United States)

    Bennett, Charles H; Brassard, Gilles; Breidbart, Seth

    2014-01-01

    When elementary quantum systems, such as polarized photons, are used to transmit digital information, the uncertainty principle gives rise to novel cryptographic phenomena unachievable with traditional transmission media, e.g. a communications channel on which it is impossible in principle to eavesdrop without a high probability of being detected. With such a channel, a one-time pad can safely be reused many times as long as no eavesdrop is detected, and, planning ahead, part of the capacity of these uncompromised transmissions can be used to send fresh random bits with which to replace the one-time pad when an eavesdrop finally is detected. Unlike other schemes for stretching a one-time pad, this scheme does not depend on complexity-theoretic assumptions such as the difficulty of factoring.

  2. Selected areas in cryptography

    CERN Document Server

    Oorschot, Paul

    1997-01-01

    Selected Areas in Cryptography brings together in one place important contributions and up-to-date research results in this fast moving area. Selected Areas in Cryptography serves as an excellent reference, providing insight into some of the most challenging research issues in the field.

  3. Quantum coherence and correlations in quantum system

    Science.gov (United States)

    Xi, Zhengjun; Li, Yongming; Fan, Heng

    2015-01-01

    Criteria of measure quantifying quantum coherence, a unique property of quantum system, are proposed recently. In this paper, we first give an uncertainty-like expression relating the coherence and the entropy of quantum system. This finding allows us to discuss the relations between the entanglement and the coherence. Further, we discuss in detail the relations among the coherence, the discord and the deficit in the bipartite quantum system. We show that, the one-way quantum deficit is equal to the sum between quantum discord and the relative entropy of coherence of measured subsystem. PMID:26094795

  4. Estimators in Cryptography

    Directory of Open Access Journals (Sweden)

    CONSTANTINESCU Nicolae

    2009-12-01

    Full Text Available One of the main problems in cryptography is to give criteria to provide good comparators of cipher systems. The security of a cipher system must include the security of the algorithm, the security of the key generator and management module (see [BM94], [CM97],[Mau92a] and the security of the cryptographic key agreement protocol (see [Mau93a],[MC94],[Mau93b],[Mau92b]. This paper gives show the necessary mathematical background to estimate the most important cryptographic measures of the key generators and of the unconditionally key agreement protocols. These cryptographic measures are the Shannon entropy (for the key generator module and Renyi entropy of order  for the key agreement protocol.

  5. Controllability of Quantum Systems

    CERN Document Server

    Schirmer, S G; Solomon, A I

    2003-01-01

    An overview and synthesis of results and criteria for open-loop controllability of Hamiltonian quantum systems obtained using Lie group and Lie algebra techniques is presented. Negative results for open-loop controllability of dissipative systems are discussed, and the superiority of closed-loop (feedback) control for quantum systems is established.

  6. Quantum system identification.

    Science.gov (United States)

    Burgarth, Daniel; Yuasa, Kazuya

    2012-02-24

    The aim of quantum system identification is to estimate the ingredients inside a black box, in which some quantum-mechanical unitary process takes place, by just looking at its input-output behavior. Here we establish a basic and general framework for quantum system identification, that allows us to classify how much knowledge about the quantum system is attainable, in principle, from a given experimental setup. We show that controllable closed quantum systems can be estimated up to unitary conjugation. Prior knowledge on some elements of the black box helps the system identification. We present an example in which a Bell measurement is more efficient to identify the system. When the topology of the system is known, the framework enables us to establish a general criterion for the estimability of the coupling constants in its Hamiltonian.

  7. Introduction to cryptography

    CERN Document Server

    Buchmann, Johannes A

    2004-01-01

    Cryptography is a key technology in electronic key systems. It is used to keep data secret, digitally sign documents, access control, etc. Therefore, users should not only know how its techniques work, but they must also be able to estimate their efficiency and security. For this new edition, the author has updated the discussion of the security of encryption and signature schemes and recent advances in factoring and computing discrete logarithms. He has also added descriptions of time-memory trade of attacks and algebraic attacks on block ciphers, the Advanced Encryption Standard, the Secure Hash Algorithm, secret sharing schemes, and undeniable and blind signatures. Johannes A. Buchmann is a Professor of Computer Science and Mathematics at the Technical University of Darmstadt, and the Associate Editor of the Journal of Cryptology. In 1985, he received the Feodor Lynen Fellowship of the Alexander von Humboldt Foundation. Furthermore, he has received the most prestigious award in science in Germany, the Leib...

  8. Quantum identification system

    OpenAIRE

    Dusek, Miloslav; Haderka, Ondrej; Hendrych, Martin; Myska, Robert

    1998-01-01

    A secure quantum identification system combining a classical identification procedure and quantum key distribution is proposed. Each identification sequence is always used just once and new sequences are ``refuelled'' from a shared provably secret key transferred through the quantum channel. Two identification protocols are devised. The first protocol can be applied when legitimate users have an unjammable public channel at their disposal. The deception probability is derived for the case of ...

  9. Quantum system identification

    CERN Document Server

    Raginsky, M

    2003-01-01

    We formulate and study, in general terms, the problem of quantum system identification, i.e., the determination (or estimation) of unknown quantum channels through their action on suitably chosen input density operators. We also present a quantitative analysis of the worst-case performance of these schemes.

  10. Quantum System Identification

    CERN Document Server

    Burgarth, Daniel

    2011-01-01

    The aim of quantum system identification is to estimate the ingredients inside a black box, in which some quantum-mechanical unitary process takes place, by just looking at its input-output behavior. Here we establish a basic and general framework for quantum system identification, that allows us to classify how much knowledge about the quantum system is attainable, in principle, from a given experimental setup. Prior knowledge on some elements of the black box helps the system identification. We present an example in which a Bell measurement is more efficient to identify the system. When the topology of the system is known, the framework enables us to establish a general criterion for the estimability of the coupling constants in its Hamiltonian.

  11. Halftone visual cryptography.

    Science.gov (United States)

    Zhou, Zhi; Arce, Gonzalo R; Di Crescenzo, Giovanni

    2006-08-01

    Visual cryptography encodes a secret binary image (SI) into n shares of random binary patterns. If the shares are xeroxed onto transparencies, the secret image can be visually decoded by superimposing a qualified subset of transparencies, but no secret information can be obtained from the superposition of a forbidden subset. The binary patterns of the n shares, however, have no visual meaning and hinder the objectives of visual cryptography. Extended visual cryptography [1] was proposed recently to construct meaningful binary images as shares using hypergraph colourings, but the visual quality is poor. In this paper, a novel technique named halftone visual cryptography is proposed to achieve visual cryptography via halftoning. Based on the blue-noise dithering principles, the proposed method utilizes the void and cluster algorithm [2] to encode a secret binary image into n halftone shares (images) carrying significant visual information. The simulation shows that the visual quality of the obtained halftone shares are observably better than that attained by any available visual cryptography method known to date.

  12. Quantum Dissipative Systems

    CERN Document Server

    Weiss, Ulrich

    2008-01-01

    Major advances in the quantum theory of macroscopic systems, in combination with stunning experimental achievements, have brightened the field and brought it to the attention of the general community in natural sciences. Today, working knowledge of dissipative quantum mechanics is an essential tool for many physicists. This book - originally published in 1990 and republished in 1999 as an enlarged second edition - delves much deeper than ever before into the fundamental concepts, methods, and applications of quantum dissipative systems, including the most recent developments. In this third edi

  13. Quantum dissipative systems

    CERN Document Server

    Weiss, Ulrich

    1993-01-01

    This book deals with the statistical mechanics and dynamics of open quantum systems moving irreversibly under the influence of a dissipative environment. The basic concepts and methods are described on the basis of a microscopic description with emphasis on the functional integral approach. The general theory for the time evolution of the density matrix of the damped system is developed. Many of the sophisticated ideas in the field are explained with simple models. The discussion includes, among others, the interplay between thermal and quantum fluctuations, quantum statistical decay, macrosco

  14. Quantum many body systems

    Energy Technology Data Exchange (ETDEWEB)

    Rivasseau, Vincent [Paris-Sud Univ. Orsay (France). Laboratoire de Physique Theorique; Seiringer, Robert [McGill Univ., Montreal, QC (Canada). Dept. of Mathematics and Statistics; Solovej, Jan Philip [Copenhagen Univ. (Denmark). Dept. of Mathematics; Spencer, Thomas [Institute for Advanced Study, Princeton, NJ (United States). School of Mathematics

    2012-11-01

    The book is based on the lectures given at the CIME school ''Quantum many body systems'' held in the summer of 2010. It provides a tutorial introduction to recent advances in the mathematics of interacting systems, written by four leading experts in the field: V. Rivasseau illustrates the applications of constructive Quantum Field Theory to 2D interacting electrons and their relation to quantum gravity; R. Seiringer describes a proof of Bose-Einstein condensation in the Gross-Pitaevski limit and explains the effects of rotating traps and the emergence of lattices of quantized vortices; J.-P. Solovej gives an introduction to the theory of quantum Coulomb systems and to the functional analytic methods used to prove their thermodynamic stability; finally, T. Spencer explains the supersymmetric approach to Anderson localization and its relation to the theory of random matrices. All the lectures are characterized by their mathematical rigor combined with physical insights.

  15. Gröbner Bases, Coding, and Cryptography

    CERN Document Server

    Sala, Massimiliano; Perret, Ludovic

    2009-01-01

    Coding theory and cryptography allow secure and reliable data transmission, which is at the heart of modern communication. This book offers a comprehensive overview on the application of commutative algebra to coding theory and cryptography. It analyzes important properties of algebraic/geometric coding systems individually.

  16. Random Oracles in a Quantum World

    NARCIS (Netherlands)

    Boneh, D.; Dagdelen, O.; Fischlin, M.; Lehmann, D.; Schaffner, C.; Zhandry, M.

    2012-01-01

    The interest in post-quantum cryptography - classical systems that remain secure in the presence of a quantum adversary - has generated elegant proposals for new cryptosystems. Some of these systems are set in the random oracle model and are proven secure relative to adversaries that have classical

  17. A Study of Hyperelliptic Curves in Cryptography

    Directory of Open Access Journals (Sweden)

    Reza Alimoradi

    2016-08-01

    Full Text Available Elliptic curves are some specific type of curves known as hyper elliptic curves. Compared to the integer factorization problem(IFP based systems, using elliptic curve based cryptography will significantly decrease key size of the encryption. Therefore, application of this type of cryptography in systems that need high security and smaller key size has found great attention. Hyperelliptic curves help to make key length shorter. Many investigations are done with regard to improving computations, hardware and software implementation of these curves, their security and resistance against attacks. This paper studies and analyzes researches done about security and efficiency of hyperelliptic curves.

  18. Quantum degenerate systems

    Energy Technology Data Exchange (ETDEWEB)

    Micheli, Fiorenza de [Centro de Estudios Cientificos, Arturo Prat 514, Valdivia (Chile); Instituto de Fisica, Pontificia Universidad Catolica de Valparaiso, Casilla 4059, Valparaiso (Chile); Zanelli, Jorge [Centro de Estudios Cientificos, Arturo Prat 514, Valdivia (Chile); Universidad Andres Bello, Av. Republica 440, Santiago (Chile)

    2012-10-15

    A degenerate dynamical system is characterized by a symplectic structure whose rank is not constant throughout phase space. Its phase space is divided into causally disconnected, nonoverlapping regions in each of which the rank of the symplectic matrix is constant, and there are no classical orbits connecting two different regions. Here the question of whether this classical disconnectedness survives quantization is addressed. Our conclusion is that in irreducible degenerate systems-in which the degeneracy cannot be eliminated by redefining variables in the action-the disconnectedness is maintained in the quantum theory: there is no quantum tunnelling across degeneracy surfaces. This shows that the degeneracy surfaces are boundaries separating distinct physical systems, not only classically, but in the quantum realm as well. The relevance of this feature for gravitation and Chern-Simons theories in higher dimensions cannot be overstated.

  19. GSM Security Using Identity-based Cryptography

    CERN Document Server

    Agarwal, Animesh; Das, Manik Lal

    2009-01-01

    Current security model in Global System for Mobile Communications (GSM) predominantly use symmetric key cryptography. The rapid advancement of Internet technology facilitates online trading, banking, downloading, emailing using resource-constrained handheld devices such as personal digital assistants and cell phones. However, these applications require more security than the present GSM supports. Consequently, a careful design of GSM security using both symmetric and asymmetric key cryptography would make GSM security more adaptable in security intensive applications. This paper presents a secure and efficient protocol for GSM security using identity based cryptography. The salient features of the proposed protocol are (i) authenticated key exchange; (ii) mutual authentication amongst communicating entities; and (iii) user anonymity. The security analysis of the protocol shows its strength against some known threats observed in conventional GSM security.

  20. Quantum Cybernetics and Complex Quantum Systems Science - A Quantum Connectionist Exploration

    OpenAIRE

    Gonçalves, Carlos Pedro

    2014-01-01

    Quantum cybernetics and its connections to complex quantum systems science is addressed from the perspective of complex quantum computing systems. In this way, the notion of an autonomous quantum computing system is introduced in regards to quantum artificial intelligence, and applied to quantum artificial neural networks, considered as autonomous quantum computing systems, which leads to a quantum connectionist framework within quantum cybernetics for complex quantum computing systems. Sever...

  1. Quantum Cybernetics and Complex Quantum Systems Science - A Quantum Connectionist Exploration

    OpenAIRE

    Gonçalves, Carlos Pedro

    2014-01-01

    Quantum cybernetics and its connections to complex quantum systems science is addressed from the perspective of complex quantum computing systems. In this way, the notion of an autonomous quantum computing system is introduced in regards to quantum artificial intelligence, and applied to quantum artificial neural networks, considered as autonomous quantum computing systems, which leads to a quantum connectionist framework within quantum cybernetics for complex quantum computing systems. Sever...

  2. Scheme of thinking quantum systems

    CERN Document Server

    Yukalov, V I

    2009-01-01

    A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field.

  3. Scheme of thinking quantum systems

    Science.gov (United States)

    Yukalov, V. I.; Sornette, D.

    2009-11-01

    A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field.

  4. Quantum Computation and Information From Theory to Experiment

    CERN Document Server

    Imai, Hiroshi

    2006-01-01

    Recently, the field of quantum computation and information has been developing through a fusion of results from various research fields in theoretical and practical areas. This book consists of the reviews of selected topics charterized by great progress and cover the field from theoretical areas to experimental ones. It contains fundamental areas, quantum query complexity, quantum statistical inference, quantum cloning, quantum entanglement, additivity. It treats three types of quantum security system, quantum public key cryptography, quantum key distribution, and quantum steganography. A photonic system is highlighted for the realization of quantum information processing.

  5. Quantum iterated function systems.

    Science.gov (United States)

    Łoziński, Artur; Zyczkowski, Karol; Słomczyński, Wojciech

    2003-10-01

    An iterated function system (IFS) is defined by specifying a set of functions in a classical phase space, which act randomly on an initial point. In an analogous way, we define a quantum IFS (QIFS), where functions act randomly with prescribed probabilities in the Hilbert space. In a more general setting, a QIFS consists of completely positive maps acting in the space of density operators. This formalism is designed to describe certain problems of nonunitary quantum dynamics. We present exemplary classical IFSs, the invariant measure of which exhibits fractal structure, and study properties of the corresponding QIFSs and their invariant states.

  6. New Eavesdropper Detection Method in Quantum Cryptograph

    Directory of Open Access Journals (Sweden)

    Cătălin Anghel

    2011-12-01

    Full Text Available ecurity of quantum cryptographic algorithms is one of the main research directions in quantum cryptography. Security growth of the quantum key distribution systems can be realized by detecting the eavesdropper quickly, precisely and without letting any secret information in the hands of the enemy. This paper proposes a new method, named QBTT, to detect the enemy who try to tap the communication channel. The QBTT method can be implemented in every type of quantum key distribution scheme.

  7. Number Theory and Public-Key Cryptography.

    Science.gov (United States)

    Lefton, Phyllis

    1991-01-01

    Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)

  8. Quantum critical points in quantum impurity systems

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Hyun Jung [Theoretische Physik III, Elektronische Korrelationen und Magnetismus, Universitaet Augsburg (Germany); Bulla, Ralf [Theoretische Physik III, Elektronische Korrelationen und Magnetismus, Universitaet Augsburg (Germany)]. E-mail: bulla@cpfs.mpg.de

    2005-04-30

    The numerical renormalization group method is used to investigate zero-temperature phase transitions in quantum impurity systems, in particular in the soft-gap Anderson model, where an impurity couples to a non-trivial fermionic bath. In this case, zero-temperature phase transitions occur between two different phases whose fixed points can be built up of non-interacting single-particle states. However, the quantum critical point cannot be described by non-interacting fermionic or bosonic excitations.

  9. Quantum critical points in quantum impurity systems

    Science.gov (United States)

    Lee, Hyun Jung; Bulla, Ralf

    2005-04-01

    The numerical renormalization group method is used to investigate zero-temperature phase transitions in quantum impurity systems, in particular in the soft-gap Anderson model, where an impurity couples to a non-trivial fermionic bath. In this case, zero-temperature phase transitions occur between two different phases whose fixed points can be built up of non-interacting single-particle states. However, the quantum critical point cannot be described by non-interacting fermionic or bosonic excitations.

  10. Quantum entanglement

    CERN Document Server

    Horodecki, R; Horodecki, M; Horodecki, K; Horodecki, Ryszard; Horodecki, Pawel; Horodecki, Michal; Horodecki, Karol

    2007-01-01

    All our former experience with application of quantum theory seems to say: {\\it what is predicted by quantum formalism must occur in laboratory}. But the essence of quantum formalism - entanglement, recognized by Einstein, Podolsky, Rosen and Schr\\"odinger - waited over 70 years to enter to laboratories as a new resource as real as energy. This holistic property of compound quantum systems, which involves nonclassical correlations between subsystems, is a potential for many quantum processes, including ``canonical'' ones: quantum cryptography, quantum teleportation and dense coding. However, it appeared that this new resource is very complex and difficult to detect. Being usually fragile to environment, it is robust against conceptual and mathematical tools, the task of which is to decipher its rich structure. This article reviews basic aspects of entanglement including its characterization, detection, distillation and quantifying. In particular, the authors discuss various manifestations of entanglement via ...

  11. Evaluation of correlation in optical encryption by using visual cryptography

    Science.gov (United States)

    Yi, Sang-Yi; Ryu, Chung-Sang; Ryu, Dae-Hyun; Lee, Seung-Hyun

    2001-03-01

    Visual cryptography made it possible to decrypt the information encrypted by thresholding scheme not with digital system but with human vision system. This method, however, has some limit in it because of the rack of resolution in both the spatial and amplitude domain. Optical visual cryptography, which used laser system instead of human eyesight, was proposed by conjunction of the optical theory with the cryptography. However, it also had some difficulties because it did not overcome the existing problem of visual cryptography completely. The problems occurred in the process of transferring data processing system from visual to optics. Therefore, it is appropriate to approach these problems in terms of optics. The results show that the optical visual cryptograph system has both the effectiveness and reliability as well as real-time implementation property.

  12. Cryptography and computational number theory

    CERN Document Server

    Shparlinski, Igor; Wang, Huaxiong; Xing, Chaoping; Workshop on Cryptography and Computational Number Theory, CCNT'99

    2001-01-01

    This volume contains the refereed proceedings of the Workshop on Cryptography and Computational Number Theory, CCNT'99, which has been held in Singapore during the week of November 22-26, 1999. The workshop was organized by the Centre for Systems Security of the Na­ tional University of Singapore. We gratefully acknowledge the financial support from the Singapore National Science and Technology Board under the grant num­ ber RP960668/M. The idea for this workshop grew out of the recognition of the recent, rapid development in various areas of cryptography and computational number the­ ory. The event followed the concept of the research programs at such well-known research institutions as the Newton Institute (UK), Oberwolfach and Dagstuhl (Germany), and Luminy (France). Accordingly, there were only invited lectures at the workshop with plenty of time for informal discussions. It was hoped and successfully achieved that the meeting would encourage and stimulate further research in information and computer s...

  13. Real-time FPGA-based Non-Cryptography System for Wireless Network

    Directory of Open Access Journals (Sweden)

    Mostafa Abutaleb

    2012-05-01

    Full Text Available Traditional privacy techniques for wireless communications are facing great challenges, due to the open radio propagation environment and limited options of transmission techniques. A new bilateral pilot aided protocol is presented, with single-tone based burst transmission over slow time varying flat fading wireless channels, and is investigated to enhance the security of quadrature amplitude modulation (QAM system. In this paper, a real-time and link privacy method with FPGA-based design is proposed, which is based on the characteristics of radio channel including randomness and privacy. For the proposed approach, the unique instant channel state information (CSI of channel can be estimated in real-time by a proposed FPGA-based circuit to be used in giving confidentiality for transmitted data. The proposed approach is adequate for most real-time wireless communication systems.

  14. Device-independence for two-party cryptography and position verification

    DEFF Research Database (Denmark)

    Ribeiro, Jeremy; Thinh, Le Phuc; Kaniewski, Jedrzej;

    Quantum communication has demonstrated its usefulness for quantum cryptography far beyond quantum key distribution. One domain is two-party cryptography, whose goal is to allow two parties who may not trust each other to solve joint tasks. Another interesting application is position......-based cryptography whose goal is to use the geographical location of an entity as its only identifying credential. Unfortunately, security of these protocols is not possible against an all powerful adversary. However, if we impose some realistic physical constraints on the adversary, there exist protocols for which...... security can be proven, but these so far relied on the knowledge of the quantum operations performed during the protocols. In this work we give device-independent security proofs of two-party cryptography and Position Verification for memoryless devices under different physical constraints on the adversary...

  15. Quantum Iterated Function Systems

    CERN Document Server

    Lozinski, A; Slomczynski, W; Lozinski, Artur; Zyczkowski, Karol; Slomczynski, Wojciech

    2003-01-01

    Iterated functions system (IFS) is defined by specifying a set of functions in a classical phase space, which act randomly on the initial point. In an analogous way, we define quantum iterated functions system (QIFS), where functions act randomly with prescribed probabilities in the Hilbert space. In a more general setting a QIFS consists of completely positive maps acting in the space of density operators. We present exemplary classical IFSs, the invariant measure of which exhibits fractal structure, and study properties of the corresponding QIFSs and their invariant state.

  16. Applied Cryptography Using Chaos Function for Fast Digital Logic-Based Systems in Ubiquitous Computing

    Directory of Open Access Journals (Sweden)

    Piyush Kumar Shukla

    2015-03-01

    Full Text Available Recently, chaotic dynamics-based data encryption techniques for wired and wireless networks have become a topic of active research in computer science and network security such as robotic systems, encryption, and communication. The main aim of deploying a chaos-based cryptosystem is to provide encryption with several advantages over traditional encryption algorithms such as high security, speed, and reasonable computational overheads and computational power requirements. These challenges have motivated researchers to explore novel chaos-based data encryption techniques with digital logics dealing with hiding information for fast secure communication networks. This work provides an overview of how traditional data encryption techniques are revised and improved to achieve good performance in a secure communication network environment. A comprehensive survey of existing chaos-based data encryption techniques and their application areas are presented. The comparative tables can be used as a guideline to select an encryption technique suitable for the application at hand. Based on the limitations of the existing techniques, an adaptive chaos based data encryption framework of secure communication for future research is proposed

  17. Introduction to quantum information science

    Energy Technology Data Exchange (ETDEWEB)

    Hayashi, Masahito [Nagoya Univ. (Japan). Graduate School of Mathematics; Ishizaka, Satoshi [Hiroshima Univ., Higashi-Hiroshima (Japan). Graduate School of Integrated Arts and Sciences; Kawachi, Akinori [Tokyo Institute of Technology (Japan). Dept. of Mathematical and Computing Sciences; Kimura, Gen [Shibaura Institute of Technology, Saitama (Japan). College of Systems Engineering and Science; Ogawa, Tomohiro [Univ. of Electro-Communications, Tokyo (Japan). Graduate School of Information Systems

    2015-04-01

    Presents the mathematical foundation for quantum information in a very didactic way. Summarizes all required mathematical knowledge in linear algebra. Supports teaching and learning with more than 100 exercises with solutions. Includes brief descriptions to recent results with references. This book presents the basics of quantum information, e.g., foundation of quantum theory, quantum algorithms, quantum entanglement, quantum entropies, quantum coding, quantum error correction and quantum cryptography. The required knowledge is only elementary calculus and linear algebra. This way the book can be understood by undergraduate students. In order to study quantum information, one usually has to study the foundation of quantum theory. This book describes it from more an operational viewpoint which is suitable for quantum information while traditional textbooks of quantum theory lack this viewpoint. The current book bases on Shor's algorithm, Grover's algorithm, Deutsch-Jozsa's algorithm as basic algorithms. To treat several topics in quantum information, this book covers several kinds of information quantities in quantum systems including von Neumann entropy. The limits of several kinds of quantum information processing are given. As important quantum protocols,this book contains quantum teleportation, quantum dense coding, quantum data compression. In particular conversion theory of entanglement via local operation and classical communication are treated too. This theory provides the quantification of entanglement, which coincides with von Neumann entropy. The next part treats the quantum hypothesis testing. The decision problem of two candidates of the unknown state are given. The asymptotic performance of this problem is characterized by information quantities. Using this result, the optimal performance of classical information transmission via noisy quantum channel is derived. Quantum information transmission via noisy quantum channel by quantum error

  18. Darwinism in Quantum Systems?

    CERN Document Server

    Iqbal, A

    2002-01-01

    We find quantum mechanics playing a role in evolutionary dynamics described by the notion of an Evolutionary Stable Strategy (ESS). An ESS being a refinement of Nash equilibrium concept is a stable strategy in an evolutionary game with replicator dynamic as the underlying process. We investigate ESSs in two and three player symmetric quantum games played by the proposed scheme of applying $^{\\prime}$identity$^{\\prime}$ and $^{\\prime}$Pauli spin-flip$^{\\prime}$ operators on an initial state with classical probabilities. The mixed Nash equilibrium (NE) we search for is not affected by a switchover between two forms of the game, one quantized and other classical, however it is an ESS when the game is played classically.We show no such mixed NE exists for two player games but there is a class of three player games where they do exist.Our results imply that an evolutionary approach originating with Darwin's idea of natural selection can be used even for quantum systems. It also indicates the possibility of genetic...

  19. Trojan horse attacks on counterfactual quantum key distribution

    Science.gov (United States)

    Yang, Xiuqing; Wei, Kejin; Ma, Haiqiang; Sun, Shihai; Du, Yungang; Wu, Lingan

    2016-04-01

    There has been much interest in "counterfactual quantum cryptography" (T.-G. Noh, 2009 [10]). It seems that the counterfactual quantum key distribution protocol without any photon carrier through the quantum channel provides practical security advantages. However, we show that it is easy to break counterfactual quantum key distribution systems in practical situations. We introduce the two types of Trojan horse attacks that are available for the two-way protocol and become possible for practical counterfactual systems with our eavesdropping schemes.

  20. Duality quantum algorithm efficiently simulates open quantum systems

    OpenAIRE

    Shi-Jie Wei; Dong Ruan; Gui-Lu Long

    2016-01-01

    Because of inevitable coupling with the environment, nearly all practical quantum systems are open system, where the evolution is not necessarily unitary. In this paper, we propose a duality quantum algorithm for simulating Hamiltonian evolution of an open quantum system. In contrast to unitary evolution in a usual quantum computer, the evolution operator in a duality quantum computer is a linear combination of unitary operators. In this duality quantum algorithm, the time evolution of the op...

  1. Quantum fluctuations in mesoscopic systems

    Science.gov (United States)

    Benatti, F.; Carollo, F.; Floreanini, R.; Narnhofer, H.

    2017-10-01

    Recent experimental results point to the existence of coherent quantum phenomena in systems made of a large number of particles, despite the fact that for many-body systems the presence of decoherence is hardly negligible and emerging classicality is expected. This behaviour hinges on collective observables, named quantum fluctuations, that retain a quantum character even in the thermodynamic limit: they provide useful tools for studying properties of many-body systems at the mesoscopic level, in-between the quantum microscopic scale and the classical macroscopic one. We herein present the general theory of quantum fluctuations in mesoscopic systems, and study their dynamics in a quantum open system setting, taking into account the unavoidable effects of dissipation and noise induced by the external environment. As in the case of microscopic systems, decoherence is not always the only dominating effect at the mesoscopic scale: certain types of environment can provide means for entangling collective fluctuations through a purely noisy mechanism.

  2. Quantum Effects in Biological Systems

    CERN Document Server

    2016-01-01

    Since the last decade the study of quantum mechanical phenomena in biological systems has become a vibrant field of research. Initially sparked by evidence of quantum effects in energy transport that is instrumental for photosynthesis, quantum biology asks the question of how methods and models from quantum theory can help us to understand fundamental mechanisms in living organisms. This approach entails a paradigm change challenging the related disciplines: The successful framework of quantum theory is taken out of its low-temperature, microscopic regimes and applied to hot and dense macroscopic environments, thereby extending the toolbox of biology and biochemistry at the same time. The Quantum Effects in Biological Systems conference is a platform for researchers from biology, chemistry and physics to present and discuss the latest developments in the field of quantum biology. After meetings in Lisbon (2009), Harvard (2010), Ulm (2011), Berkeley (2012), Vienna (2013), Singapore (2014) and Florence (2015),...

  3. Device-independent two-party cryptography secure against sequential attacks

    Science.gov (United States)

    Kaniewski, Jędrzej; Wehner, Stephanie

    2016-05-01

    The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy-storage model by sending more signals than the adversary can store in a certain time frame. Here, we initiate the study of device-independent (DI) protocols for two-party cryptography in the noisy-storage model. Specifically, we present a relatively easy to implement protocol for a cryptographic building block known as weak string erasure and prove its security even if the devices used in the protocol are prepared by the dishonest party. DI two-party cryptography is made challenging by the fact that Alice and Bob do not trust each other, which requires new techniques to establish security. We fully analyse the case of memoryless devices (for which sequential attacks are optimal) and the case of sequential attacks for arbitrary devices. The key ingredient of the proof, which might be of independent interest, is an explicit (and tight) relation between the violation of the Clauser-Horne-Shimony-Holt inequality observed by Alice and Bob and uncertainty generated by Alice against Bob who is forced to measure his system before finding out Alice’s setting (guessing with postmeasurement information). In particular, we show that security is possible for arbitrarily small violation.

  4. Data Authentication Using Cryptography

    Directory of Open Access Journals (Sweden)

    Sagar Chouksey

    2013-06-01

    Full Text Available We present a novel approach using cryptographyfor data authentication. The key idea is to provide aencoded quantized data projection as authenticationdata. This can be correctly decoded with the help ofan authentic data using as side information.Cryptography source coding provides the desiredrobustness against legitimate variations whiledetecting illegitimate modification. Additionaladjustments might not change the meaning of thecontent, but could be misclassified as tampering.Users might also beinterested in localizingtampered regions. Distinguishing legitimateencodings with possible adjustments fromtampering and localizing tampering are thechallenges addressed in this paper. We applycryptography source coding and statistical methodsto solve the data authentication problem.Experimental results have been presented for dataauthentication.

  5. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  6. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  7. Darwinism in quantum systems?

    Science.gov (United States)

    Iqbal, A.; Toor, A. H.

    2002-03-01

    We investigate the role of quantum mechanical effects in the central stability concept of evolutionary game theory, i.e., an evolutionarily stable strategy (ESS). Using two and three-player symmetric quantum games we show how the presence of quantum phenomenon of entanglement can be crucial to decide the course of evolutionary dynamics in a population of interacting individuals.

  8. Asymmetric cryptography based on wavefront sensing.

    Science.gov (United States)

    Peng, Xiang; Wei, Hengzheng; Zhang, Peng

    2006-12-15

    A system of asymmetric cryptography based on wavefront sensing (ACWS) is proposed for the first time to our knowledge. One of the most significant features of the asymmetric cryptography is that a trapdoor one-way function is required and constructed by analogy to wavefront sensing, in which the public key may be derived from optical parameters, such as the wavelength or the focal length, while the private key may be obtained from a kind of regular point array. The ciphertext is generated by the encoded wavefront and represented with an irregular array. In such an ACWS system, the encryption key is not identical to the decryption key, which is another important feature of an asymmetric cryptographic system. The processes of asymmetric encryption and decryption are formulized mathematically and demonstrated with a set of numerical experiments.

  9. Feedback control of quantum system

    Institute of Scientific and Technical Information of China (English)

    DONG Dao-yi; CHEN Zong-hai; ZHANG Chen-bin; CHEN Chun-lin

    2006-01-01

    Feedback is a significant strategy for the control of quantum system.Information acquisition is the greatest difficulty in quantum feedback applications.After discussing several basic methods for information acquisition,we review three kinds of quantum feedback control strategies:quantum feedback control with measurement,coherent quantum feedback,and quantum feedback control based on cloning and recognition.The first feedback strategy can effectively acquire information,but it destroys the coherence in feedback loop.On the contrary,coherent quantum feedback does not destroy the coherence,but the capability of information acquisition is limited.However,the third feedback scheme gives a compromise between information acquisition and measurement disturbance.

  10. Quantum point contacts in quantum wire systems

    Energy Technology Data Exchange (ETDEWEB)

    Sternemann, E.; Buchholz, S.S.; Fischer, S.F.; Kunze, U. [Werkstoffe und Nanoelektronik, Ruhr-Universitaet Bochum (Germany); Reuter, D.; Wieck, A.D. [Angewandte Festkoerperphysik, Ruhr-Universitaet Bochum (Germany)

    2010-07-01

    Quantum point contacts (QPCs) attract high interest for applications as magnetic focussing, beam splitting (quantum Hall edge states), spin filtering and electron thermometry. Here, we investigate QPCs in complex quantum wire (QWR) systems such as quantum rings. The QPCs were realized by lithographical definition of a short (150 nm) constriction (170 nm width) in (a) a 540 nm wide QWR and (b) 520 nm wide QWR leads of a QWR ring as in. Nanogates on top of the constrictions allow for the control of occupied modes in the QPCs. The devices are based on a GaAs/AlGaAs heterostructure with a 2DEG 55 nm below the surface, patterned by electron beam lithography and wet-chemical etching. Two- and four-terminal conductance measurements at temperatures between 23 mK and 4.2 K were performed using lock-in technique. Our measurements reveal that QPCs in 1D nanostructures can be prepared to show subband separations of 6 meV, clear conductance quantization as well as the 0.7 anomaly. We further show that electron injection across a QPC into a QWR ring allows for electron interference (Aharonov-Bohm effect).

  11. Quantum computer for dummies (in Russian)

    OpenAIRE

    Grozin, Andrey

    2011-01-01

    An introduction (in Russian) to quantum computers, quantum cryptography, and quantum teleportation for students who have no previous knowledge of these subjects, but know quantum mechanics. Several simple examples are considered in detail using the quantum computer emulator QCL.

  12. Quantum Effects in Biological Systems

    Science.gov (United States)

    Roy, Sisir

    2014-07-01

    The debates about the trivial and non-trivial effects in biological systems have drawn much attention during the last decade or so. What might these non-trivial sorts of quantum effects be? There is no consensus so far among the physicists and biologists regarding the meaning of "non-trivial quantum effects". However, there is no doubt about the implications of the challenging research into quantum effects relevant to biology such as coherent excitations of biomolecules and photosynthesis, quantum tunneling of protons, van der Waals forces, ultrafast dynamics through conical intersections, and phonon-assisted electron tunneling as the basis for our sense of smell, environment assisted transport of ions and entanglement in ion channels, role of quantum vacuum in consciousness. Several authors have discussed the non-trivial quantum effects and classified them into four broad categories: (a) Quantum life principle; (b) Quantum computing in the brain; (c) Quantum computing in genetics; and (d) Quantum consciousness. First, I will review the above developments. I will then discuss in detail the ion transport in the ion channel and the relevance of quantum theory in brain function. The ion transport in the ion channel plays a key role in information processing by the brain.

  13. Decoherence in quantum spin systems

    NARCIS (Netherlands)

    De Raedt, H; Dobrovitski, VV; Landau, DP; Lewis, SP; Schuttler, HB

    2003-01-01

    Computer simulations of decoherence in quantum spin systems require the solution of the time-dependent Schrodinger equation for interacting quantum spin systems over extended periods of time. We use exact diagonalization, the Chebyshev polynomial technique, four Suzuki-formula algorithms, and the sh

  14. Efficient Quantum Pseudorandomness

    Science.gov (United States)

    Brandão, Fernando G. S. L.; Harrow, Aram W.; Horodecki, Michał

    2016-04-01

    Randomness is both a useful way to model natural systems and a useful tool for engineered systems, e.g., in computation, communication, and control. Fully random transformations require exponential time for either classical or quantum systems, but in many cases pseudorandom operations can emulate certain properties of truly random ones. Indeed, in the classical realm there is by now a well-developed theory regarding such pseudorandom operations. However, the construction of such objects turns out to be much harder in the quantum case. Here, we show that random quantum unitary time evolutions ("circuits") are a powerful source of quantum pseudorandomness. This gives for the first time a polynomial-time construction of quantum unitary designs, which can replace fully random operations in most applications, and shows that generic quantum dynamics cannot be distinguished from truly random processes. We discuss applications of our result to quantum information science, cryptography, and understanding the self-equilibration of closed quantum dynamics.

  15. Efficient Quantum Pseudorandomness.

    Science.gov (United States)

    Brandão, Fernando G S L; Harrow, Aram W; Horodecki, Michał

    2016-04-29

    Randomness is both a useful way to model natural systems and a useful tool for engineered systems, e.g., in computation, communication, and control. Fully random transformations require exponential time for either classical or quantum systems, but in many cases pseudorandom operations can emulate certain properties of truly random ones. Indeed, in the classical realm there is by now a well-developed theory regarding such pseudorandom operations. However, the construction of such objects turns out to be much harder in the quantum case. Here, we show that random quantum unitary time evolutions ("circuits") are a powerful source of quantum pseudorandomness. This gives for the first time a polynomial-time construction of quantum unitary designs, which can replace fully random operations in most applications, and shows that generic quantum dynamics cannot be distinguished from truly random processes. We discuss applications of our result to quantum information science, cryptography, and understanding the self-equilibration of closed quantum dynamics.

  16. Quantum Positioning System

    CERN Document Server

    Bahder, T B

    2004-01-01

    A quantum positioning system (QPS) is proposed that can provide a user with all four of his space-time coordinates. The user must carry a corner cube reflector, a good clock, and have a two-way classical channel of communication with the origin of the reference frame. Four pairs of entangled photons (biphotons) are sent through four interferometers: three interferometers are used to determine the user's spatial position, and an additional interferometer is used to synchronize the user's clock to coordinate time in the reference frame. The spatial positioning part of the QPS is similar to a classical time-of-arrival (TOA) system, however, a classical TOA system (such as GPS) must have synchronized clocks that keep coordinate time and therefore the clocks must have long-term stability, whereas in the QPS only a photon coincidence counter is needed and the clocks need only have short-term stability. Several scenarios are considered for a QPS: one is a terrestrial system and another is a space-based-system compos...

  17. Quantum technologies with hybrid systems.

    Science.gov (United States)

    Kurizki, Gershon; Bertet, Patrice; Kubo, Yuimaru; Mølmer, Klaus; Petrosyan, David; Rabl, Peter; Schmiedmayer, Jörg

    2015-03-31

    An extensively pursued current direction of research in physics aims at the development of practical technologies that exploit the effects of quantum mechanics. As part of this ongoing effort, devices for quantum information processing, secure communication, and high-precision sensing are being implemented with diverse systems, ranging from photons, atoms, and spins to mesoscopic superconducting and nanomechanical structures. Their physical properties make some of these systems better suited than others for specific tasks; thus, photons are well suited for transmitting quantum information, weakly interacting spins can serve as long-lived quantum memories, and superconducting elements can rapidly process information encoded in their quantum states. A central goal of the envisaged quantum technologies is to develop devices that can simultaneously perform several of these tasks, namely, reliably store, process, and transmit quantum information. Hybrid quantum systems composed of different physical components with complementary functionalities may provide precisely such multitasking capabilities. This article reviews some of the driving theoretical ideas and first experimental realizations of hybrid quantum systems and the opportunities and challenges they present and offers a glance at the near- and long-term perspectives of this fascinating and rapidly expanding field.

  18. Quantum technologies with hybrid systems

    Science.gov (United States)

    Kurizki, Gershon; Bertet, Patrice; Kubo, Yuimaru; Mølmer, Klaus; Petrosyan, David; Rabl, Peter; Schmiedmayer, Jörg

    2015-01-01

    An extensively pursued current direction of research in physics aims at the development of practical technologies that exploit the effects of quantum mechanics. As part of this ongoing effort, devices for quantum information processing, secure communication, and high-precision sensing are being implemented with diverse systems, ranging from photons, atoms, and spins to mesoscopic superconducting and nanomechanical structures. Their physical properties make some of these systems better suited than others for specific tasks; thus, photons are well suited for transmitting quantum information, weakly interacting spins can serve as long-lived quantum memories, and superconducting elements can rapidly process information encoded in their quantum states. A central goal of the envisaged quantum technologies is to develop devices that can simultaneously perform several of these tasks, namely, reliably store, process, and transmit quantum information. Hybrid quantum systems composed of different physical components with complementary functionalities may provide precisely such multitasking capabilities. This article reviews some of the driving theoretical ideas and first experimental realizations of hybrid quantum systems and the opportunities and challenges they present and offers a glance at the near- and long-term perspectives of this fascinating and rapidly expanding field. PMID:25737558

  19. Noncommutative mathematics for quantum systems

    CERN Document Server

    Franz, Uwe

    2016-01-01

    Noncommutative mathematics is a significant new trend of mathematics. Initially motivated by the development of quantum physics, the idea of 'making theory noncommutative' has been extended to many areas of pure and applied mathematics. This book is divided into two parts. The first part provides an introduction to quantum probability, focusing on the notion of independence in quantum probability and on the theory of quantum stochastic processes with independent and stationary increments. The second part provides an introduction to quantum dynamical systems, discussing analogies with fundamental problems studied in classical dynamics. The desire to build an extension of the classical theory provides new, original ways to understand well-known 'commutative' results. On the other hand the richness of the quantum mathematical world presents completely novel phenomena, never encountered in the classical setting. This book will be useful to students and researchers in noncommutative probability, mathematical physi...

  20. Decoherence in infinite quantum systems

    Energy Technology Data Exchange (ETDEWEB)

    Blanchard, Philippe; Hellmich, Mario [Faculty of Physics, University of Bielefeld, Universitaetsstr. 25, 33615 Bielefeld (Germany); Bundesamt fuer Strahlenschutz (Federal Office for Radiation Protection), Willy-Brandt-Strasse 5, 38226 Salzgitter (Germany)

    2012-09-01

    We review and discuss a notion of decoherence formulated in the algebraic framework of quantum physics. Besides presenting some sufficient conditions for the appearance of decoherence in the case of Markovian time evolutions we provide an overview over possible decoherence scenarios. The framework for decoherence we establish is sufficiently general to accommodate quantum systems with infinitely many degrees of freedom.

  1. Cryptography Engineering Design Principles and Practical Applications

    CERN Document Server

    Ferguson, Niels; Kohno, Tadayoshi

    2012-01-01

    The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical chan

  2. Understanding and applying cryptography and data security

    CERN Document Server

    Elbirt, Adam J

    2009-01-01

    Introduction A Brief History of Cryptography and Data Security Cryptography and Data Security in the Modern World Existing Texts Book Organization Symmetric-Key Cryptography Cryptosystem Overview The Modulo Operator Greatest Common Divisor The Ring ZmHomework ProblemsSymmetric-Key Cryptography: Substitution Ciphers Basic Cryptanalysis Shift Ciphers Affine Ciphers Homework ProblemsSymmetric-Key Cryptography: Stream Ciphers Random Numbers The One-Time Pad Key Stream GeneratorsReal-World ApplicationsHomework ProblemsSymmetric-Key Cryptography: Block Ciphers The Data Encryption StandardThe Advance

  3. Quantum dissipation in unbounded systems.

    Science.gov (United States)

    Maddox, Jeremy B; Bittner, Eric R

    2002-02-01

    In recent years trajectory based methodologies have become increasingly popular for evaluating the time evolution of quantum systems. A revival of the de Broglie--Bohm interpretation of quantum mechanics has spawned several such techniques for examining quantum dynamics from a hydrodynamic perspective. Using techniques similar to those found in computational fluid dynamics one can construct the wave function of a quantum system at any time from the trajectories of a discrete ensemble of hydrodynamic fluid elements (Bohm particles) which evolve according to nonclassical equations of motion. Until very recently these schemes have been limited to conservative systems. In this paper, we present our methodology for including the effects of a thermal environment into the hydrodynamic formulation of quantum dynamics. We derive hydrodynamic equations of motion from the Caldeira-Leggett master equation for the reduced density matrix and give a brief overview of our computational scheme that incorporates an adaptive Lagrangian mesh. Our applications focus upon the dissipative dynamics of open unbounded quantum systems. Using both the Wigner phase space representation and the linear entropy, we probe the breakdown of the Markov approximation of the bath dynamics at low temperatures. We suggest a criteria for rationalizing the validity of the Markov approximation in open unbound systems and discuss decoherence, energy relaxation, and quantum/classical correspondence in the context of the Bohmian paths.

  4. Preconditioned quantum linear system algorithm.

    Science.gov (United States)

    Clader, B D; Jacobs, B C; Sprouse, C R

    2013-06-21

    We describe a quantum algorithm that generalizes the quantum linear system algorithm [Harrow et al., Phys. Rev. Lett. 103, 150502 (2009)] to arbitrary problem specifications. We develop a state preparation routine that can initialize generic states, show how simple ancilla measurements can be used to calculate many quantities of interest, and integrate a quantum-compatible preconditioner that greatly expands the number of problems that can achieve exponential speedup over classical linear systems solvers. To demonstrate the algorithm's applicability, we show how it can be used to compute the electromagnetic scattering cross section of an arbitrary target exponentially faster than the best classical algorithm.

  5. Screening in quantum charged systems

    Science.gov (United States)

    Martin, Ph. A.; Gruber, Ch.

    1984-07-01

    For stationary states of quantum charged systems in ν dimensions, ν>=2, it is proven that the reduced-density matrices satisfy a set of sum rules whenever the clustering is faster than |x|-(ν+l). These sum rules, describing the screening properties, are analogous to those previously derived for classical systems. For neutral quantum fluids, it is shown that the clustering cannot be faster than the decay of the force.

  6. Quantum contextuality in complex systems

    CERN Document Server

    Cabello, Adan

    2010-01-01

    We show that, for a system of several qubits, there is an inequality for the correlations between three compatible dichotomic measurements which must be satisfied by any noncontextual theory, but is violated by any quantum state. Remarkably, the violation grows exponentially with the number of qubits, and the tolerated error per correlation also increases with the number of qubits, showing that state-independent quantum contextuality is experimentally observable in complex systems.

  7. Universal blind quantum computation for hybrid system

    Science.gov (United States)

    Huang, He-Liang; Bao, Wan-Su; Li, Tan; Li, Feng-Guang; Fu, Xiang-Qun; Zhang, Shuo; Zhang, Hai-Long; Wang, Xiang

    2017-08-01

    As progress on the development of building quantum computer continues to advance, first-generation practical quantum computers will be available for ordinary users in the cloud style similar to IBM's Quantum Experience nowadays. Clients can remotely access the quantum servers using some simple devices. In such a situation, it is of prime importance to keep the security of the client's information. Blind quantum computation protocols enable a client with limited quantum technology to delegate her quantum computation to a quantum server without leaking any privacy. To date, blind quantum computation has been considered only for an individual quantum system. However, practical universal quantum computer is likely to be a hybrid system. Here, we take the first step to construct a framework of blind quantum computation for the hybrid system, which provides a more feasible way for scalable blind quantum computation.

  8. Coding Theory, Cryptography and Related Areas

    DEFF Research Database (Denmark)

    Buchmann, Johannes; Stichtenoth, Henning; Tapia-Recillas, Horacio

    Proceedings of anInternational Conference on Coding Theory, Cryptography and Related Areas, held in Guanajuato, Mexico. in april 1998......Proceedings of anInternational Conference on Coding Theory, Cryptography and Related Areas, held in Guanajuato, Mexico. in april 1998...

  9. Quantum Dot Systems: a versatile platform for quantum simulations

    NARCIS (Netherlands)

    Barthelemy, P.J.C.; Vandersypen, L.M.K.

    2013-01-01

    Quantum mechanics often results in extremely complex phenomena, especially when the quantum system under consideration is composed of many interacting particles. The states of these many-body systems live in a space so large that classical numerical calculations cannot compute them. Quantum simulati

  10. Quantum Dot Systems: a versatile platform for quantum simulations

    NARCIS (Netherlands)

    Barthelemy, P.J.C.; Vandersypen, L.M.K.

    2013-01-01

    Quantum mechanics often results in extremely complex phenomena, especially when the quantum system under consideration is composed of many interacting particles. The states of these many-body systems live in a space so large that classical numerical calculations cannot compute them. Quantum

  11. Experimental quantum multiparty communication protocols

    Science.gov (United States)

    Smania, Massimiliano; Elhassan, Ashraf M.; Tavakoli, Armin; Bourennane, Mohamed

    2016-06-01

    Quantum information science breaks limitations of conventional information transfer, cryptography and computation by using quantum superpositions or entanglement as resources for information processing. Here we report on the experimental realisation of three-party quantum communication protocols using single three-level quantum system (qutrit) communication: secret-sharing, detectable Byzantine agreement and communication complexity reduction for a three-valued function. We have implemented these three schemes using the same optical fibre interferometric setup. Our realisation is easily scalable without compromising on detection efficiency or generating extremely complex many-particle entangled states.

  12. Conditions for monogamy of quantum correlations in multipartite systems

    Science.gov (United States)

    Kumar, Asutosh

    2016-09-01

    Monogamy of quantum correlations is a vibrant area of research because of its potential applications in several areas in quantum information ranging from quantum cryptography to co-operative phenomena in many-body physics. In this paper, we investigate conditions under which monogamy is preserved for functions of quantum correlation measures. We prove that a monogamous measure remains monogamous on raising its power, and a non-monogamous measure remains non-monogamous on lowering its power. We also prove that monogamy of a convex quantum correlation measure for arbitrary multipartite pure quantum state leads to its monogamy for mixed states in the same Hilbert space. Monogamy of squared negativity for mixed states and that of entanglement of formation follow as corollaries of our results.

  13. Fast, parallel and secure cryptography algorithm using Lorenz's attractor

    CERN Document Server

    Marco, Anderson Gonçalves; Bruno, Odemir Martinez; 10.1142/S0129183110015166

    2012-01-01

    A novel cryptography method based on the Lorenz's attractor chaotic system is presented. The proposed algorithm is secure and fast, making it practical for general use. We introduce the chaotic operation mode, which provides an interaction among the password, message and a chaotic system. It ensures that the algorithm yields a secure codification, even if the nature of the chaotic system is known. The algorithm has been implemented in two versions: one sequential and slow and the other, parallel and fast. Our algorithm assures the integrity of the ciphertext (we know if it has been altered, which is not assured by traditional algorithms) and consequently its authenticity. Numerical experiments are presented, discussed and show the behavior of the method in terms of security and performance. The fast version of the algorithm has a performance comparable to AES, a popular cryptography program used commercially nowadays, but it is more secure, which makes it immediately suitable for general purpose cryptography ...

  14. Introduction to quantum spin systems

    Directory of Open Access Journals (Sweden)

    A. Langari

    2008-06-01

    Full Text Available This manuscript is the collection of lectures given in the summer school on strongly correlated electron systems held at Isfahan university of technology, June 2007. A short overview on quantum magnetism and spin systems is presented. The numerical exact diagonalization (Lanczos alghorithm is explained in a pedagogical ground. This is a method to get some ground state properties on finite cluster of lattice models. Two extensions of Lanczos method to get the excited states and also finite temperature properties of quantum models are also explained. The basic notions of quantum phase transition is discussed in term of Ising model in transverse field. Its phase diagram and critical properties are explained using the quantum renormalization group approach. Most of the topics are in tutorial level with hints to recent research activities.

  15. Coding, cryptography and combinatorics

    CERN Document Server

    Niederreiter, Harald; Xing, Chaoping

    2004-01-01

    It has long been recognized that there are fascinating connections between cod­ ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi­ natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the conference had to be cancelled in the interest of the health of the participants. The SARS epidemic posed too serious a threat. At the time of the cancellation, the organization of the conference was at an advanced stage: all invited speakers had been selected and all abstracts of contributed talks had been screened by the p...

  16. Duality quantum algorithm efficiently simulates open quantum systems.

    Science.gov (United States)

    Wei, Shi-Jie; Ruan, Dong; Long, Gui-Lu

    2016-07-28

    Because of inevitable coupling with the environment, nearly all practical quantum systems are open system, where the evolution is not necessarily unitary. In this paper, we propose a duality quantum algorithm for simulating Hamiltonian evolution of an open quantum system. In contrast to unitary evolution in a usual quantum computer, the evolution operator in a duality quantum computer is a linear combination of unitary operators. In this duality quantum algorithm, the time evolution of the open quantum system is realized by using Kraus operators which is naturally implemented in duality quantum computer. This duality quantum algorithm has two distinct advantages compared to existing quantum simulation algorithms with unitary evolution operations. Firstly, the query complexity of the algorithm is O(d(3)) in contrast to O(d(4)) in existing unitary simulation algorithm, where d is the dimension of the open quantum system. Secondly, By using a truncated Taylor series of the evolution operators, this duality quantum algorithm provides an exponential improvement in precision compared with previous unitary simulation algorithm.

  17. Duality quantum algorithm efficiently simulates open quantum systems

    Science.gov (United States)

    Wei, Shi-Jie; Ruan, Dong; Long, Gui-Lu

    2016-07-01

    Because of inevitable coupling with the environment, nearly all practical quantum systems are open system, where the evolution is not necessarily unitary. In this paper, we propose a duality quantum algorithm for simulating Hamiltonian evolution of an open quantum system. In contrast to unitary evolution in a usual quantum computer, the evolution operator in a duality quantum computer is a linear combination of unitary operators. In this duality quantum algorithm, the time evolution of the open quantum system is realized by using Kraus operators which is naturally implemented in duality quantum computer. This duality quantum algorithm has two distinct advantages compared to existing quantum simulation algorithms with unitary evolution operations. Firstly, the query complexity of the algorithm is O(d3) in contrast to O(d4) in existing unitary simulation algorithm, where d is the dimension of the open quantum system. Secondly, By using a truncated Taylor series of the evolution operators, this duality quantum algorithm provides an exponential improvement in precision compared with previous unitary simulation algorithm.

  18. Quantum dynamics in open quantum-classical systems.

    Science.gov (United States)

    Kapral, Raymond

    2015-02-25

    Often quantum systems are not isolated and interactions with their environments must be taken into account. In such open quantum systems these environmental interactions can lead to decoherence and dissipation, which have a marked influence on the properties of the quantum system. In many instances the environment is well-approximated by classical mechanics, so that one is led to consider the dynamics of open quantum-classical systems. Since a full quantum dynamical description of large many-body systems is not currently feasible, mixed quantum-classical methods can provide accurate and computationally tractable ways to follow the dynamics of both the system and its environment. This review focuses on quantum-classical Liouville dynamics, one of several quantum-classical descriptions, and discusses the problems that arise when one attempts to combine quantum and classical mechanics, coherence and decoherence in quantum-classical systems, nonadiabatic dynamics, surface-hopping and mean-field theories and their relation to quantum-classical Liouville dynamics, as well as methods for simulating the dynamics.

  19. A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States

    Institute of Scientific and Technical Information of China (English)

    张盛; 王剑; 唐朝京; 张权

    2011-01-01

    It is established that a single quantum cryptography protocol usually cooperates with other cryptographic systems, such as an authentication system, in the real world. However, few protocols have been proposed on how to combine two or more quantum protocols. To fill this gap, we propose a composed quantum protocol, containing both quantum identity authentication and quantum key distribution, using squeezed states. Hence, not only the identity can be verified, but also a new private key can be generated by our new protocol. We also analyze the security under an optimal attack, and the efficiency, which is defined by the threshold of the tolerant error rate, using Gaussian error function.

  20. Quantum random number generators

    Science.gov (United States)

    Herrero-Collantes, Miguel; Garcia-Escartin, Juan Carlos

    2017-01-01

    Random numbers are a fundamental resource in science and engineering with important applications in simulation and cryptography. The inherent randomness at the core of quantum mechanics makes quantum systems a perfect source of entropy. Quantum random number generation is one of the most mature quantum technologies with many alternative generation methods. This review discusses the different technologies in quantum random number generation from the early devices based on radioactive decay to the multiple ways to use the quantum states of light to gather entropy from a quantum origin. Randomness extraction and amplification and the notable possibility of generating trusted random numbers even with untrusted hardware using device-independent generation protocols are also discussed.

  1. An introduction to mathematical cryptography

    CERN Document Server

    Hoffstein, Jeffrey; Silverman, Joseph H

    2014-01-01

    This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required of the reader; techniques from algebra, number theory, and probability are introduced and developed as required. This text provides an ideal introduction for mathematics and computer science students to the mathematical foundations of modern cryptography. The book includes an extensive bibliography and index; supplementary materials are available online. The book covers a variety of topics that are considered central to mathematical cryptography. Key topics include: classical cryptographic constructions, such as Diffie–Hellmann key exchange, discrete logarithm-based cryptosystems, the RSA cryptosystem, and digital signatures; fundamental mathematical tools for cr...

  2. Quantum energy teleportation in a quantum Hall system

    Energy Technology Data Exchange (ETDEWEB)

    Yusa, Go; Izumida, Wataru; Hotta, Masahiro [Department of Physics, Tohoku University, Sendai 980-8578 (Japan)

    2011-09-15

    We propose an experimental method for a quantum protocol termed quantum energy teleportation (QET), which allows energy transportation to a remote location without physical carriers. Using a quantum Hall system as a realistic model, we discuss the physical significance of QET and estimate the order of energy gain using reasonable experimental parameters.

  3. Quantum Linear Systems Theory

    Science.gov (United States)

    2013-02-15

    Matthew James, Andre Carvalho and Michael Hush completed some work analyzing cross-phase modulation using single photon quantum filtering techniques...ANU Michael Hush January – June, 2012, Postdoc, ANU Matthew R. James Professor, Australian National University Ian R. Petersen Professor...appear, IEEE Trans. Aut. Control., 2013. A. R. R. Carvalho, M. R. Hush , and M. R. James, “Cavity driven by a single photon: Conditional dynamics and

  4. Quantum Communication Systems

    Science.gov (United States)

    2008-03-15

    Standard Form 298 (Rev. 8/98) Prescribed by ANSI Std. Z39-18 Publications: 1) W. Wasilewski and...K. Banaszek, Protecting an optical qubit against photon loss, Phys. Rev. A 75, 042316 (2007) 2) K. Banaszek and W. Wasilewski , Linear-optics...manipulations of photon-loss codes, Proceedings of NATO Advanced Research Workshop "Quantum Communication and Security" 3) W. Wasilewski , P. Kolenderski

  5. Effective Constraints for Quantum Systems

    CERN Document Server

    Bojowald, Martin; Skirzewski, Aureliano; Tsobanjan, Artur

    2008-01-01

    An effective formalism for quantum constrained systems is presented which allows manageable derivations of solutions and observables, including a treatment of physical reality conditions without requiring full knowledge of the physical inner product. Instead of a state equation from a constraint operator, an infinite system of constraint functions on the quantum phase space of expectation values and moments of states is used. The examples of linear constraints as well as the free non-relativistic particle in parameterized form illustrate how standard problems of constrained systems can be dealt with in this framework.

  6. Hypothesis testing with open quantum systems.

    Science.gov (United States)

    Mølmer, Klaus

    2015-01-30

    Using a quantum circuit model we derive the maximal ability to distinguish which of several candidate Hamiltonians describe an open quantum system. This theory, in particular, provides the maximum information retrievable from continuous quantum measurement records, available when a quantum system is perturbatively coupled to a broadband quantized environment.

  7. Open Quantum Systems An Introduction

    CERN Document Server

    Rivas, ´Angel

    2012-01-01

    In this volume the fundamental theory of open quantum systems is revised in the light of modern developments in the field. A unified approach to the quantum evolution of open systems is presented by merging concepts and methods traditionally employed by different communities, such as quantum optics, condensed matter, chemical physics and mathematical physics. The mathematical structure and the general properties of the dynamical maps underlying open system dynamics are explained in detail. The microscopic derivation of dynamical equations, including both Markovian and non-Markovian evolutions, is also discussed. Because of the step-by-step explanations, this work is a useful reference to novices in this field. However, experienced researches can also benefit from the presentation of recent results.

  8. Quantum cloning attacks against PUF-based quantum authentication systems

    Science.gov (United States)

    Yao, Yao; Gao, Ming; Li, Mo; Zhang, Jian

    2016-08-01

    With the advent of physical unclonable functions (PUFs), PUF-based quantum authentication systems have been proposed for security purposes, and recently, proof-of-principle experiment has been demonstrated. As a further step toward completing the security analysis, we investigate quantum cloning attacks against PUF-based quantum authentication systems and prove that quantum cloning attacks outperform the so-called challenge-estimation attacks. We present the analytical expression of the false-accept probability by use of the corresponding optimal quantum cloning machines and extend the previous results in the literature. In light of these findings, an explicit comparison is made between PUF-based quantum authentication systems and quantum key distribution protocols in the context of cloning attacks. Moreover, from an experimental perspective, a trade-off between the average photon number and the detection efficiency is discussed in detail.

  9. A New Visual Cryptography Scheme for Color Images

    Directory of Open Access Journals (Sweden)

    B.SaiChandana,

    2010-06-01

    Full Text Available Visual cryptography is a method for protecting image-based secrets that has a computation-free decoding process. In this paper, we proposed a visual cryptographic system which can be used to hide the original image information from an intruder or an unwanted user. The images can be in any standard format. The encrypted image is sent to the destination through the network and then the image is decrypted. We used symmetric key cryptography. Experimental results indicate the proposed method is a simple, practical and effective cryptographicsystem.

  10. Dynamics of complex quantum systems

    CERN Document Server

    Akulin, Vladimir M

    2014-01-01

    This book gathers together a range of similar problems that can be encountered in different fields of modern quantum physics and that have common features with regard to multilevel quantum systems. The main motivation was to examine from a uniform standpoint various models and approaches that have been developed in atomic, molecular, condensed matter, chemical, laser and nuclear physics in various contexts. The book should help senior-level undergraduate, graduate students and researchers putting particular problems in these fields into a broader scientific context and thereby taking advantage of well-established techniques used in adjacent fields. This second edition has been expanded to include substantial new material (e.g. new sections on Dynamic Localization and on Euclidean Random Matrices and new chapters on Entanglement, Open Quantum Systems, and Coherence Protection). It is based on the author’s lectures at the Moscow Institute of Physics and Technology, at the CNRS Aimé Cotton Laboratory, and on ...

  11. Conditions for monogamy of quantum correlations in multipartite systems

    Energy Technology Data Exchange (ETDEWEB)

    Kumar, Asutosh, E-mail: asukumar@hri.res.in

    2016-09-07

    Highlights: • Monogamy of quantum correlations. • Monogamous quantum correlation measures remain so on raising of power. • Non-monogamous quantum correlations remain so on lowering of power. • Monogamy of a convex quantum correlation measure for an arbitrary multipartite pure quantum state leads to its monogamy for the mixed states. • A new monogamy inequality for quantum correlations, stronger than the standard one. - Abstract: Monogamy of quantum correlations is a vibrant area of research because of its potential applications in several areas in quantum information ranging from quantum cryptography to co-operative phenomena in many-body physics. In this paper, we investigate conditions under which monogamy is preserved for functions of quantum correlation measures. We prove that a monogamous measure remains monogamous on raising its power, and a non-monogamous measure remains non-monogamous on lowering its power. We also prove that monogamy of a convex quantum correlation measure for arbitrary multipartite pure quantum state leads to its monogamy for mixed states in the same Hilbert space. Monogamy of squared negativity for mixed states and that of entanglement of formation follow as corollaries of our results.

  12. Finding Cryptography in Object Code

    Energy Technology Data Exchange (ETDEWEB)

    Jason L. Wright

    2008-10-01

    Finding and identifying Cryptography is a growing concern in the malware analysis community. In this paper, a heuristic method for determining the likelihood that a given function contains a cryptographic algorithm is discussed and the results of applying this method in various environments is shown. The algorithm is based on frequency analysis of opcodes that make up each function within a binary.

  13. Lightweight cryptography for constrained devices

    DEFF Research Database (Denmark)

    Alippi, Cesare; Bogdanov, Andrey; Regazzoni, Francesco

    2014-01-01

    Lightweight cryptography is a rapidly evolving research field that responds to the request for security in resource constrained devices. This need arises from crucial pervasive IT applications, such as those based on RFID tags where cost and energy constraints drastically limit the solution...

  14. Cryptography as a Pedagogical Tool

    Science.gov (United States)

    Kaur, Manmohan

    2008-01-01

    In order to get undergraduates interested in mathematics, it is necessary to motivate them, give them good reasons to spend time on a subject that requires hard work, and, if possible, involve them in undergraduate research. This article discusses how cryptography can be used for all these purposes. In particular, a special topics course on…

  15. Influence of satellite motion on polarization qubits in a Space-Earth quantum communication link.

    Science.gov (United States)

    Bonato, Cristian; Aspelmeyer, Markus; Jennewein, Thomas; Pernechele, Claudio; Villoresi, Paolo; Zeilinger, Anton

    2006-10-16

    In a Space quantum-cryptography experiment a satellite pointing system is needed to send single photons emitted by the source on the satellite to the polarization analysis apparatus on Earth. In this paper a simulation is presented regarding how the satellite pointing systems affect the polarization state of the single photons, to help designing a proper compensation system.

  16. Quantum Indeterminacy of Cosmic Systems

    Energy Technology Data Exchange (ETDEWEB)

    Hogan, Craig J. [Fermi National Accelerator Laboratory (FNAL), Batavia, IL (United States)

    2013-12-30

    It is shown that quantum uncertainty of motion in systems controlled mainly by gravity generally grows with orbital timescale $H^{-1}$, and dominates classical motion for trajectories separated by distances less than $\\approx H^{-3/5}$ in Planck units. For example, the cosmological metric today becomes indeterminate at macroscopic separations, $H_0^{-3/5}\\approx 60$ meters. Estimates suggest that entangled non-localized quantum states of geometry and matter may significantly affect fluctuations during inflation, and connect the scale of dark energy to that of strong interactions.

  17. Quantum Indeterminacy of Cosmic Systems

    Energy Technology Data Exchange (ETDEWEB)

    Hogan, Craig J. [Fermi National Accelerator Laboratory (FNAL), Batavia, IL (United States)

    2013-12-30

    It is shown that quantum uncertainty of motion in systems controlled mainly by gravity generally grows with orbital timescale $H^{-1}$, and dominates classical motion for trajectories separated by distances less than $\\approx H^{-3/5}$ in Planck units. For example, the cosmological metric today becomes indeterminate at macroscopic separations, $H_0^{-3/5}\\approx 60$ meters. Estimates suggest that entangled non-localized quantum states of geometry and matter may significantly affect fluctuations during inflation, and connect the scale of dark energy to that of strong interactions.

  18. Enhancing Undergraduate Mathematics Curriculum via Coding Theory and Cryptography

    Science.gov (United States)

    Aydin, Nuh

    2009-01-01

    The theory of error-correcting codes and cryptography are two relatively recent applications of mathematics to information and communication systems. The mathematical tools used in these fields generally come from algebra, elementary number theory, and combinatorics, including concepts from computational complexity. It is possible to introduce the…

  19. A "proof-reading" of Some Issues in Cryptography

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    2007-01-01

    In this paper, we identify some issues in the interplay between practice and theory in cryptography, issues that have repeatedly appeared in different incarnations over the years. These issues are related to fundamental concepts in the eld, e.g., to what extent we can prove that a system is secure...

  20. Polygamy of entanglement in multipartite quantum systems

    Science.gov (United States)

    Kim, Jeong San

    2009-08-01

    We show that bipartite entanglement distribution (or entanglement of assistance) in multipartite quantum systems is by nature polygamous. We first provide an analytical upper bound for the concurrence of assistance in bipartite quantum systems and derive a polygamy inequality of multipartite entanglement in arbitrary-dimensional quantum systems.

  1. Quantum phase transitions in constrained Bose systems

    OpenAIRE

    Bonnes, Lars

    2011-01-01

    This doctoral thesis studies low dimensional quantum systems that can be realized in recent cold atom experiments. From the viewpoint of quantum statistical mechanics, the main emphasis is on the detailed study of the different quantum and thermal phases and their transitions using numerical methods, such as quantum Monte Carlo and the Tensor Network Renormalization Group. The first part of this work deals with a lattice Boson model subject to strong three-body losses. In a quantum-Zeno li...

  2. Practical Quantum Key Distribution with Polarization-Entangled Photons

    CERN Document Server

    Poppe, A; Lorünser, T; Maurhardt, O; Ursin, R; Boehm, H R; Peev, M; Suda, M; Jennewein, T; Zeilinger, Anton

    2004-01-01

    We present an entangled state quantum cryptography system that operated for the first time in a real world application scenario. The full key generation protocol was performed in real time between two distributed embedded hardware devices, which were connected by 1.45 km of optical fiber, installed for this experiment in the Vienna sewage system. The generated quantum key was immediately handed over and used by a secure communication application.

  3. Overview of progress in quantum systems control

    Institute of Scientific and Technical Information of China (English)

    CONG Shuang; ZHENG Yisong; JI Beichen; DAI Yi

    2007-01-01

    The development of the theory on quantum systems control in the last 20 years is reviewed in detail.The research on the controllability of quantum systems is first introduced,then the study on the quantum open-loop control methods often used for controlling simple quantum systems is analyzed briefly.The learning control method and the feedback control method are mainly discussed for they are two important methods in quantum systems control and their advantages and disadvantages are presented.According to the trends in quantum systems control development,the paper predicts the future trends of its development and applications.A complete design procedure necessary for the quantum control system is presented.Finally,several vital problems hindering the advancement of quantum control are pointed out.

  4. Understanding quantum work in a quantum many-body system.

    Science.gov (United States)

    Wang, Qian; Quan, H T

    2017-03-01

    Based on previous studies in a single-particle system in both the integrable [Jarzynski, Quan, and Rahav, Phys. Rev. X 5, 031038 (2015)2160-330810.1103/PhysRevX.5.031038] and the chaotic systems [Zhu, Gong, Wu, and Quan, Phys. Rev. E 93, 062108 (2016)1539-375510.1103/PhysRevE.93.062108], we study the the correspondence principle between quantum and classical work distributions in a quantum many-body system. Even though the interaction and the indistinguishability of identical particles increase the complexity of the system, we find that for a quantum many-body system the quantum work distribution still converges to its classical counterpart in the semiclassical limit. Our results imply that there exists a correspondence principle between quantum and classical work distributions in an interacting quantum many-body system, especially in the large particle number limit, and further justify the definition of quantum work via two-point energy measurements in quantum many-body systems.

  5. Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation

    Science.gov (United States)

    Zhang, Yichen; Li, Zhengyu; Zhao, Yijia; Yu, Song; Guo, Hong

    2017-02-01

    We analyze the security of the two-way continuous-variable quantum key distribution protocol in reverse reconciliation against general two-mode attacks, which represent all accessible attacks at fixed channel parameters. Rather than against one specific attack model, the expression of secret key rates of the two-way protocol are derived against all accessible attack models. It is found that there is an optimal two-mode attack to minimize the performance of the protocol in terms of both secret key rates and maximal transmission distances. We identify the optimal two-mode attack, give the specific attack model of the optimal two-mode attack and show the performance of the two-way protocol against the optimal two-mode attack. Even under the optimal two-mode attack, the performances of two-way protocol are still better than the corresponding one-way protocol, which shows the advantage of making double use of the quantum channel and the potential of long-distance secure communication using a two-way protocol.

  6. Quantum Information Processing in Disordered and Complex Quantum Systems

    CERN Document Server

    De, A S; Ahufinger, V; Briegel, H J; Sanpera, A; Lewenstein, M; De, Aditi Sen; Sen, Ujjwal; Ahufinger, Veronica; Briegel, Hans J.; Sanpera, Anna; Lewenstein, Maciej

    2005-01-01

    We investigate quantum information processing and manipulations in disordered systems of ultracold atoms and trapped ions. First, we demonstrate generation of entanglement and local realization of quantum gates in a quantum spin glass system. Entanglement in such systems attains significantly high values, after quenched averaging, and has a stable positive value for arbitrary times. Complex systems with long range interactions, such as ion chains or dipolar atomic gases, can be modeled by neural network Hamiltonians. In such systems, we find the characteristic time of persistence of quenched averaged entanglement, and also find the time of its revival.

  7. Quantum Computing in Solid State Systems

    CERN Document Server

    Ruggiero, B; Granata, C

    2006-01-01

    The aim of Quantum Computation in Solid State Systems is to report on recent theoretical and experimental results on the macroscopic quantum coherence of mesoscopic systems, as well as on solid state realization of qubits and quantum gates. Particular attention has been given to coherence effects in Josephson devices. Other solid state systems, including quantum dots, optical, ion, and spin devices which exhibit macroscopic quantum coherence are also discussed. Quantum Computation in Solid State Systems discusses experimental implementation of quantum computing and information processing devices, and in particular observations of quantum behavior in several solid state systems. On the theoretical side, the complementary expertise of the contributors provides models of the various structures in connection with the problem of minimizing decoherence.

  8. Eigenfunctions in chaotic quantum systems

    Energy Technology Data Exchange (ETDEWEB)

    Baecker, Arnd

    2007-07-01

    The structure of wavefunctions of quantum systems strongly depends on the underlying classical dynamics. In this text a selection of articles on eigenfunctions in systems with fully chaotic dynamics and systems with a mixed phase space is summarized. Of particular interest are statistical properties like amplitude distribution and spatial autocorrelation function and the implication of eigenfunction structures on transport properties. For systems with a mixed phase space the separation into regular and chaotic states does not always hold away from the semiclassical limit, such that chaotic states may completely penetrate into the region of the regular island. The consequences of this flooding are discussed and universal aspects highlighted. (orig.)

  9. Perturbative approach to Markovian open quantum systems.

    Science.gov (United States)

    Li, Andy C Y; Petruccione, F; Koch, Jens

    2014-05-08

    The exact treatment of Markovian open quantum systems, when based on numerical diagonalization of the Liouville super-operator or averaging over quantum trajectories, is severely limited by Hilbert space size. Perturbation theory, standard in the investigation of closed quantum systems, has remained much less developed for open quantum systems where a direct application to the Lindblad master equation is desirable. We present such a perturbative treatment which will be useful for an analytical understanding of open quantum systems and for numerical calculation of system observables which would otherwise be impractical.

  10. A Diffusion Equation for Quantum Adiabatic Systems

    CERN Document Server

    Jain, S R

    1998-01-01

    For ergodic adiabatic quantum systems, we study the evolution of energy distribution as the system evolves in time. Starting from the von Neumann equation for the density operator, we obtain the quantum analogue of the Smoluchowski equation on coarse-graining over the energy spectrum. This result brings out the precise notion of quantum diffusion.

  11. Logical entropy of quantum dynamical systems

    Directory of Open Access Journals (Sweden)

    Ebrahimzadeh Abolfazl

    2016-01-01

    Full Text Available This paper introduces the concepts of logical entropy and conditional logical entropy of hnite partitions on a quantum logic. Some of their ergodic properties are presented. Also logical entropy of a quantum dynamical system is dehned and ergodic properties of dynamical systems on a quantum logic are investigated. Finally, the version of Kolmogorov-Sinai theorem is proved.

  12. Everyday cryptography fundamental principles and applications

    CERN Document Server

    Martin, Keith M

    2012-01-01

    Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient currenttechnologies and over-whelming theoretical research.Everyday Cryptography is a self-contained and widely accessible in

  13. Concept of chemical bond and aromaticity based on quantum information theory

    CERN Document Server

    Szilvási, T; Legeza, Ö

    2015-01-01

    Quantum information theory (QIT) emerged in physics as standard technique to extract relevant information from quantum systems. It has already contributed to the development of novel fields like quantum computing, quantum cryptography, and quantum complexity. This arises the question what information is stored according to QIT in molecules which are inherently quantum systems as well. Rigorous analysis of the central quantities of QIT on systematic series of molecules offered the introduction of the concept of chemical bond and aromaticity directly from physical principles and notions. We identify covalent bond, donor-acceptor dative bond, multiple bond, charge-shift bond, and aromaticity indicating unified picture of fundamental chemical models from ab initio.

  14. Cryptography with DNA binary strands.

    Science.gov (United States)

    Leier, A; Richter, C; Banzhaf, W; Rauhe, H

    2000-06-01

    Biotechnological methods can be used for cryptography. Here two different cryptographic approaches based on DNA binary strands are shown. The first approach shows how DNA binary strands can be used for steganography, a technique of encryption by information hiding, to provide rapid encryption and decryption. It is shown that DNA steganography based on DNA binary strands is secure under the assumption that an interceptor has the same technological capabilities as sender and receiver of encrypted messages. The second approach shown here is based on steganography and a method of graphical subtraction of binary gel-images. It can be used to constitute a molecular checksum and can be combined with the first approach to support encryption. DNA cryptography might become of practical relevance in the context of labelling organic and inorganic materials with DNA 'barcodes'.

  15. Resonances in open quantum systems

    Science.gov (United States)

    Eleuch, Hichem; Rotter, Ingrid

    2017-02-01

    The Hamilton operator of an open quantum system is non-Hermitian. Its eigenvalues are generally complex and provide not only the energies but also the lifetimes of the states of the system. The states may couple via the common environment of scattering wave functions into which the system is embedded. This causes an external mixing (EM) of the states. Mathematically, EM is related to the existence of singular (the so-called exceptional) points. The eigenfunctions of a non-Hermitian operator are biorthogonal, in contrast to the orthogonal eigenfunctions of a Hermitian operator. A quantitative measure for the ratio between biorthogonality and orthogonality is the phase rigidity of the wave functions. At and near an exceptional point (EP), the phase rigidity takes its minimum value. The lifetimes of two nearby eigenstates of a quantum system bifurcate under the influence of an EP. At the parameter value of maximum width bifurcation, the phase rigidity approaches the value one, meaning that the two eigenfunctions become orthogonal. However, the eigenfunctions are externally mixed at this parameter value. The S matrix and therewith the cross section do contain, in the one-channel case, almost no information on the EM of the states. The situation is completely different in the case with two (or more) channels where the resonance structure is strongly influenced by the EM of the states and interesting features of non-Hermitian quantum physics are revealed. We provide numerical results for two and three nearby eigenstates of a non-Hermitian Hamilton operator that are embedded in one common continuum and are influenced by two adjoining EPs. The results are discussed. They are of interest for an experimental test of the non-Hermitian quantum physics as well as for applications.

  16. Quantum chaotic attractor in a dissipative system

    CERN Document Server

    Liu, W V; Schieve, William C.

    1997-01-01

    A dissipative quantum system is treated here by coupling it with a heat bath of harmonic oscillators. Through quantum Langevin equations and Ehrenfest's theorem, we establish explicitly the quantum Duffing equations with a double-well potential chosen. A quantum noise term appears the only driving force in dynamics. Numerical studies show that the chaotic attractor exists in this system while chaos is certainly forbidden in the classical counterpart.

  17. Dissipative properties of quantum systems.

    Science.gov (United States)

    Grecos, A P; Prigogine, I

    1972-06-01

    We consider the dissipative properties of large quantum systems from the point of view of kinetic theory. The existence of a nontrivial collision operator imposes restrictions on the possible collisional invariants of the system. We consider a model in which a discrete level is coupled to a set of quantum states and which, in the limit of a large "volume," becomes the Friedrichs model. Because of its simplicity this model allows a direct calculation of the collision operator as well as of related operators and the constants of the motion. For a degenerate spectrum the calculations become more involved but the conclusions remain simple. The special role played by the invariants that are functions of the Hamiltonion is shown to be a direct consequence of the existence of a nonvanishing collision operator. For a class of observables we obtain ergodic behavior, and this reformulation of the ergodic problem may be used in statistical mechanics to study the ergodicity of large quantum systems containing a small physical parameter such as the coupling constant or the concentration.

  18. Measures and applications of quantum correlations

    CERN Document Server

    Adesso, Gerardo; Cianciaruso, Marco

    2016-01-01

    Quantum information theory is built upon the realisation that quantum resources like coherence and entanglement can be exploited for novel or enhanced ways of transmitting and manipulating information, such as quantum cryptography, teleportation, and quantum computing. We now know that there is potentially much more than entanglement behind the power of quantum information processing. There exist more general forms of non-classical correlations, stemming from fundamental principles such as the necessary disturbance induced by a local measurement, or the persistence of quantum coherence in all possible local bases. These signatures can be identified and are resilient in almost all quantum states, and have been linked to the enhanced performance of certain quantum protocols over classical ones in noisy conditions. Their presence represents, among other things, one of the most essential manifestations of quantumness in cooperative systems, from the subatomic to the macroscopic domain. In this work we give an ove...

  19. Quantum state engineering in hybrid open quantum systems

    Science.gov (United States)

    Joshi, Chaitanya; Larson, Jonas; Spiller, Timothy P.

    2016-04-01

    We investigate a possibility to generate nonclassical states in light-matter coupled noisy quantum systems, namely, the anisotropic Rabi and Dicke models. In these hybrid quantum systems, a competing influence of coherent internal dynamics and environment-induced dissipation drives the system into nonequilibrium steady states (NESSs). Explicitly, for the anisotropic Rabi model, the steady state is given by an incoherent mixture of two states of opposite parities, but as each parity state displays light-matter entanglement, we also find that the full state is entangled. Furthermore, as a natural extension of the anisotropic Rabi model to an infinite spin subsystem, we next explored the NESS of the anisotropic Dicke model. The NESS of this linearized Dicke model is also an inseparable state of light and matter. With an aim to enrich the dynamics beyond the sustainable entanglement found for the NESS of these hybrid quantum systems, we also propose to combine an all-optical feedback strategy for quantum state protection and for establishing quantum control in these systems. Our present work further elucidates the relevance of such hybrid open quantum systems for potential applications in quantum architectures.

  20. A Content Monitoring System Based on Watermarking and Cryptography%基于水印和密码的内容监控管理系统

    Institute of Scientific and Technical Information of China (English)

    吴果; 孟强; 房礼国; 易青松

    2011-01-01

    Based on an in-depth study of watermarking and cryptography, a new monitoring and management program is proposed for monitoring the outdoor LED advertisement content. In this program, the watermark of copyright is bind for the advertisement content before frequency-domain encryption. Under the premise of ensuring the authoritativeness, fairness and practicality, the overall system security is improved and the legitimate rights of the advertising company is safeguarded. A content monitoring and management system of the outdoor LED advertisement is constructed based on the program. Through the establishment of a data center and a monitoring center, the system enhances the management of the outdoor advertisement prior to its broadcast, and the management of the actual content of the advertisement. The outdoor LED can only play the audited content, and perform video recording comparisons to prevent vulnerabilities.%在对水印和密码技术进行深入研究的基础上,针对户外LED广告内容监控问题,本文提出一种新的监控管理方案.该方案对视频数据嵌入版权保护的水印信息再进行频域加密,在没有降低权威性、公平性、实用性的前提下,提高了整个方案的安全性,维护了广告商的合法权益.基于该方案构建户外LED广告内容监控管理系统,该系统通过建立数据中心和监控中心,加强对广告公司户外广告播出前期审核管理,播出实际内容的监控管理,监督广告公司户外LED的播放内容只能播出审核过的内容,并对播放电脑和户外监控录像对比记录,防止漏洞.

  1. Simulation of n-qubit quantum systems. III. Quantum operations

    Science.gov (United States)

    Radtke, T.; Fritzsche, S.

    2007-05-01

    During the last decade, several quantum information protocols, such as quantum key distribution, teleportation or quantum computation, have attracted a lot of interest. Despite the recent success and research efforts in quantum information processing, however, we are just at the beginning of understanding the role of entanglement and the behavior of quantum systems in noisy environments, i.e. for nonideal implementations. Therefore, in order to facilitate the investigation of entanglement and decoherence in n-qubit quantum registers, here we present a revised version of the FEYNMAN program for working with quantum operations and their associated (Jamiołkowski) dual states. Based on the implementation of several popular decoherence models, we provide tools especially for the quantitative analysis of quantum operations. Apart from the implementation of different noise models, the current program extension may help investigate the fragility of many quantum states, one of the main obstacles in realizing quantum information protocols today. Program summaryTitle of program: Feynman Catalogue identifier: ADWE_v3_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADWE_v3_0 Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Licensing provisions: None Operating systems: Any system that supports MAPLE; tested under Microsoft Windows XP, SuSe Linux 10 Program language used:MAPLE 10 Typical time and memory requirements: Most commands that act upon quantum registers with five or less qubits take ⩽10 seconds of processor time (on a Pentium 4 processor with ⩾2 GHz or equivalent) and 5-20 MB of memory. Especially when working with symbolic expressions, however, the memory and time requirements critically depend on the number of qubits in the quantum registers, owing to the exponential dimension growth of the associated Hilbert space. For example, complex (symbolic) noise models (with several Kraus operators) for multi-qubit systems

  2. Could nanostructure be unspeakable quantum system?

    CERN Document Server

    Aristov, V V

    2010-01-01

    Heisenberg, Bohr and others were forced to renounce on the description of the objective reality as the aim of physics because of the paradoxical quantum phenomena observed on the atomic level. The contemporary quantum mechanics created on the base of their positivism point of view must divide the world into speakable apparatus which amplifies microscopic events to macroscopic consequences and unspeakable quantum system. Examination of the quantum phenomena corroborates the confidence expressed by creators of quantum theory that the renunciation of realism should not apply on our everyday macroscopic world. Nanostructures may be considered for the present as a boundary of realistic description for all phenomena including the quantum one.

  3. Revealing of photon-number splitting attack on quantum key distribution system by photon-number resolving devices

    Science.gov (United States)

    Gaidash, A. A.; Egorov, V. I.; Gleim, A. V.

    2016-08-01

    Quantum cryptography allows distributing secure keys between two users so that any performed eavesdropping attempt would be immediately discovered. However, in practice an eavesdropper can obtain key information from multi-photon states when attenuated laser radiation is used as a source of quantum states. In order to prevent actions of an eavesdropper, it is generally suggested to implement special cryptographic protocols, like decoy states or SARG04. In this paper, we describe an alternative method based on monitoring photon number statistics after detection. We provide a useful rule of thumb to estimate approximate order of difference of expected distribution and distribution in case of attack. Formula for calculating a minimum value of total pulses or time-gaps to resolve attack is shown. Also formulas for actual fraction of raw key known to Eve were derived. This method can therefore be used with any system and even combining with mentioned special protocols.

  4. Optimal Control of Finite Dimensional Quantum Systems

    CERN Document Server

    Mendonca, Paulo E M F

    2009-01-01

    This thesis addresses the problem of developing a quantum counter-part of the well established classical theory of control. We dwell on the fundamental fact that quantum states are generally not perfectly distinguishable, and quantum measurements typically introduce noise in the system being measured. Because of these, it is generally not clear whether the central concept of the classical control theory -- that of observing the system and then applying feedback -- is always useful in the quantum setting. We center our investigations around the problem of transforming the state of a quantum system into a given target state, when the system can be prepared in different ways, and the target state depends on the choice of preparation. We call this the "quantum tracking problem" and show how it can be formulated as an optimization problem that can be approached both numerically and analytically. This problem provides a simple route to the characterization of the quantum trade-off between information gain and distu...

  5. Past Quantum States of a Monitored System

    DEFF Research Database (Denmark)

    Gammelmark, Søren; Julsgaard, Brian; Mølmer, Klaus

    2013-01-01

    A density matrix ρ(t) yields probabilistic information about the outcome of measurements on a quantum system. We introduce here the past quantum state, which, at time T, accounts for the state of a quantum system at earlier times tstate Ξ(t) is composed of two objects, ρ......(t) and E(t), conditioned on the dynamics and the probing of the system until t and in the time interval [t, T], respectively. The past quantum state is characterized by its ability to make better predictions for the unknown outcome of any measurement at t than the conventional quantum state at that time....... On the one hand, our formalism shows how smoothing procedures for estimation of past classical signals by a quantum probe [M. Tsang, Phys. Rev. Lett. 102 250403 (2009)] apply also to describe the past state of the quantum system itself. On the other hand, it generalizes theories of pre- and postselected...

  6. Classical equations for quantum systems

    Energy Technology Data Exchange (ETDEWEB)

    Gell-Mann, M. (Theoretical Astrophysics Group (T-6), Los Alamos National Laboratory, Los Alamos, New Mexico 87545) (United States) (Santa Fe Institute, 1660 Old Pecos Trail, Santa Fe, New Mexico 87501); Hartle, J.B. (Department of Physics, University of California enSanta Barbara, Santa Barbara, (California) 93106)

    1993-04-15

    The origin of the phenomenological deterministic laws that approximately govern the quasiclassical domain of familiar experience is considered in the context of the quantum mechanics of closed systems such as the universe as a whole. A formulation of quantum mechanics is used that predicts probabilities for the individual members of a set of alternative coarse-grained histories that [ital decohere], which means that there is negligible quantum interference between the individual histories in the set. We investigate the requirements for coarse grainings to yield decoherent sets of histories that are quasiclassical, i.e., such that the individual histories obey, with high probability, effective classical equations of motion interrupted continually by small fluctuations and occasionally by large ones. We discuss these requirements generally but study them specifically for coarse grainings of the type that follows a distinguished subset of a complete set of variables while ignoring the rest. More coarse graining is needed to achieve decoherence than would be suggested by naive arguments based on the uncertainty principle. Even coarser graining is required in the distinguished variables for them to have the necessary inertia to approach classical predictability in the presence of the noise consisting of the fluctuations that typical mechanisms of decoherence produce. We describe the derivation of phenomenological equations of motion explicitly for a particular class of models.

  7. Security, Privacy, and Applied Cryptography Engineering

    DEFF Research Database (Denmark)

    This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied Cryptography Engineering held in Chennai, India, in November 2012. The 11 papers presented were carefully reviewed and selected from 61 submissions. The papers are organized...... and applications, high-performance computing in cryptology and cryptography in ubiquitous devices....

  8. Prospects for quantum computation with trapped ions

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, R.J.; James, D.F.V.

    1997-12-31

    Over the past decade information theory has been generalized to allow binary data to be represented by two-state quantum mechanical systems. (A single two-level system has come to be known as a qubit in this context.) The additional freedom introduced into information physics with quantum systems has opened up a variety of capabilities that go well beyond those of conventional information. For example, quantum cryptography allows two parties to generate a secret key even in the presence of eavesdropping. But perhaps the most remarkable capabilities have been predicted in the field of quantum computation. Here, a brief survey of the requirements for quantum computational hardware, and an overview of the in trap quantum computation project at Los Alamos are presented. The physical limitations to quantum computation with trapped ions are discussed.

  9. Home and Clinical Cardiovascular Care Center (H4C: a Framework for Integrating Body Sensor Networks and QTRU Cryptography System

    Directory of Open Access Journals (Sweden)

    Ali Zakerolhosseini

    2013-09-01

    Full Text Available Quick responds to heart attack patients before arriving to hospital is a very important factor. In this paper, a combined model of Body Sensor Network and Personal Digital Access using QTRU cipher algorithm in Wifi networks is presented to efficiently overcome these life threatening attacks. The algorithm for optimizing the routing paths between sensor nodes and an algorithm for reducing the power consumption are also applied for achieving the best performance by this model. This system is consumes low power and has encrypting and decrypting processes. It also has an efficient routing path in a fast manner

  10. Home and Clinical Cardiovascular Care Center (H4C): a Framework for Integrating Body Sensor Networks and QTRU Cryptography System.

    Science.gov (United States)

    Zakerolhosseini, Ali; Sokouti, Massoud; Pezeshkian, Massoud

    2013-01-01

    Quick responds to heart attack patients before arriving to hospital is a very important factor. In this paper, a combined model of Body Sensor Network and Personal Digital Access using QTRU cipher algorithm in Wifi networks is presented to efficiently overcome these life threatening attacks. The algorithm for optimizing the routing paths between sensor nodes and an algorithm for reducing the power consumption are also applied for achieving the best performance by this model. This system is consumes low power and has encrypting and decrypting processes. It also has an efficient routing path in a fast manner.

  11. Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging

    Science.gov (United States)

    Yuan, Sheng; Yao, Jianbin; Liu, Xuemei; Zhou, Xin; Li, Zhongyang

    2016-04-01

    Optical cryptography based on computational ghost imaging (CGI) has attracted much attention of researchers because it encrypts plaintext into a random intensity vector rather than complexed-valued function. This promising feature of the CGI-based cryptography reduces the amount of data to be transmitted and stored and therefore brings convenience in practice. However, we find that this cryptography is vulnerable to chosen-plaintext attack because of the linear relationship between the input and output of the encryption system, and three feasible strategies are proposed to break it in this paper. Even though a large number of plaintexts need to be chosen in these attack methods, it means that this cryptography still exists security risks. To avoid these attacks, a security enhancement method utilizing an invertible matrix modulation is further discussed and the feasibility is verified by numerical simulations.

  12. Quantum Information in Space and Time

    CERN Document Server

    Volovich, I V

    2001-01-01

    Many important results in modern quantum information theory have been obtained for an idealized situation when the spacetime dependence of quantum phenomena is neglected. However the transmission and processing of (quantum) information is a physical process in spacetime. Therefore such basic notions in quantum information theory as the notions of composite systems, entangled states and the channel should be formulated in space and time. We emphasize the importance of the investigation of quantum information in space and time. Entangled states in space and time are considered. A modification of Bell`s equation which includes the spacetime variables is suggested. A general relation between quantum theory and theory of classical stochastic processes is proposed. It expresses the condition of local realism in the form of a {\\it noncommutative spectral theorem}. Applications of this relation to the security of quantum key distribution in quantum cryptography are considered.

  13. The DARPA Quantum Network

    CERN Document Server

    Elliott, C

    2004-01-01

    A team from BBN Technologies, Boston University, and Harvard University has recently built and begun to operate the world's first Quantum Key Distribution (QKD)network under DARPA sponsorship. The DARPA Quantum Network became fully operational on October 23, 2003 in BBN's laboratories, and in June 2004 was fielded through dark fiber under the streets of Cambridge, Mass., to link our campuses with non-stop quantum cryptography, twenty-four hours per day. As of December 2004, it consists of six nodes. Four are 5 MHz, BBN-built BB84 systems designed for telecommunications fiber and inter-connected by a photonic switch. Two are the electronics subsystems for a high speed free-space system designed and built by NIST. This paper describes the motivation for our work, the current status of the DARPA Quantum Network, its unique optical switching and key relay protocols, and our future plans.

  14. Quantum mechanics in complex systems

    Science.gov (United States)

    Hoehn, Ross Douglas

    This document should be considered in its separation; there are three distinct topics contained within and three distinct chapters within the body of works. In a similar fashion, this abstract should be considered in three parts. Firstly, we explored the existence of multiply-charged atomic ions by having developed a new set of dimensional scaling equations as well as a series of relativistic augmentations to the standard dimensional scaling procedure and to the self-consistent field calculations. Secondly, we propose a novel method of predicting drug efficacy in hopes to facilitate the discovery of new small molecule therapeutics by modeling the agonist-protein system as being similar to the process of Inelastic Electron Tunneling Spectroscopy. Finally, we facilitate the instruction in basic quantum mechanical topics through the use of quantum games; this method of approach allows for the generation of exercises with the intent of conveying the fundamental concepts within a first year quantum mechanics classroom. Furthermore, no to be mentioned within the body of the text, yet presented in appendix form, certain works modeling the proliferation of cells types within the confines of man-made lattices for the purpose of facilitating artificial vascular transplants. In Chapter 2, we present a theoretical framework which describes multiply-charged atomic ions, their stability within super-intense laser fields, also lay corrections to the systems due to relativistic effects. Dimensional scaling calculations with relativistic corrections for systems: H, H-, H 2-, He, He-, He2-, He3- within super-intense laser fields were completed. Also completed were three-dimensional self consistent field calculations to verify the dimensionally scaled quantities. With the aforementioned methods the system's ability to stably bind 'additional' electrons through the development of multiple isolated regions of high potential energy leading to nodes of high electron density is shown

  15. Joint system quantum descriptions arising from local quantumness

    CERN Document Server

    Cooney, Tom; Navascues, Miguel; Perez-Garcia, David; Villanueva, Ignacio

    2012-01-01

    Bipartite correlations generated by non-signalling physical systems that admit a finite-dimensional local quantum description cannot exceed the quantum limits, i.e., they can always be interpreted as distant measurements of a bipartite quantum state. Here we consider the effect of dropping the assumption of finite dimensionality. Remarkably, we find that the same result holds provided that we relax the tensor structure of space-like separated measurements to mere commutativity. We argue why an extension of this result to tensor representations seems unlikely.

  16. Cryptography in constant parallel time

    CERN Document Server

    Applebaum, Benny

    2013-01-01

    Locally computable (NC0) functions are 'simple' functions for which every bit of the output can be computed by reading a small number of bits of their input. The study of locally computable cryptography attempts to construct cryptographic functions that achieve this strong notion of simplicity and simultaneously provide a high level of security. Such constructions are highly parallelizable and they can be realized by Boolean circuits of constant depth.This book establishes, for the first time, the possibility of local implementations for many basic cryptographic primitives such as one-way func

  17. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  18. A study of Quantum Correlations in Open Quantum Systems

    CERN Document Server

    Chakrabarty, Indranil; Siddharth, Nana

    2010-01-01

    In this work, we study quantum correlations in mixed states. The states studied are modelled by a two-qubit system interacting with its environment via a quantum nondemolition (purely dephasing) as well as dissipative type of interaction. The entanglement dynamics of this two qubit system is analyzed and the existence of entangled states which do not violate Bell's inequality, but can still be useful as a potential resource for teleportation are reported. In addition, a comparative study of various measures of quantum correlations, like Concurrence, Bell's inequality, Discord and Teleportation fidelity, is made on these states, generated by the above evolutions. Interestingly, examples are found, of states, where entanglement is vanishing, but discord is non-vanishing, bringing out the fact that entanglement is a subset of quantum correlations.

  19. An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography.

    Science.gov (United States)

    Chaudhry, Shehzad Ashraf; Mahmood, Khalid; Naqvi, Husnain; Khan, Muhammad Khurram

    2015-11-01

    Telecare medicine information system (TMIS) offers the patients convenient and expedite healthcare services remotely anywhere. Patient security and privacy has emerged as key issues during remote access because of underlying open architecture. An authentication scheme can verify patient's as well as TMIS server's legitimacy during remote healthcare services. To achieve security and privacy a number of authentication schemes have been proposed. Very recently Lu et al. (J. Med. Syst. 39(3):1-8, 2015) proposed a biometric based three factor authentication scheme for TMIS to confiscate the vulnerabilities of Arshad et al.'s (J. Med. Syst. 38(12):136, 2014) scheme. Further, they emphasized the robustness of their scheme against several attacks. However, in this paper we establish that Lu et al.'s scheme is vulnerable to numerous attacks including (1) Patient anonymity violation attack, (2) Patient impersonation attack, and (3) TMIS server impersonation attack. Furthermore, their scheme does not provide patient untraceability. We then, propose an improvement of Lu et al.'s scheme. We have analyzed the security of improved scheme using popular automated tool ProVerif. The proposed scheme while retaining the plusses of Lu et al.'s scheme is also robust against known attacks.

  20. Quantum speed limits in open system dynamics.

    Science.gov (United States)

    del Campo, A; Egusquiza, I L; Plenio, M B; Huelga, S F

    2013-02-01

    Bounds to the speed of evolution of a quantum system are of fundamental interest in quantum metrology, quantum chemical dynamics, and quantum computation. We derive a time-energy uncertainty relation for open quantum systems undergoing a general, completely positive, and trace preserving evolution which provides a bound to the quantum speed limit. When the evolution is of the Lindblad form, the bound is analogous to the Mandelstam-Tamm relation which applies in the unitary case, with the role of the Hamiltonian being played by the adjoint of the generator of the dynamical semigroup. The utility of the new bound is exemplified in different scenarios, ranging from the estimation of the passage time to the determination of precision limits for quantum metrology in the presence of dephasing noise.

  1. Quantum ratchets in dissipative chaotic systems.

    Science.gov (United States)

    Carlo, Gabriel G; Benenti, Giuliano; Casati, Giulio; Shepelyansky, Dima L

    2005-04-29

    Using the method of quantum trajectories, we study a quantum chaotic dissipative ratchet appearing for particles in a pulsed asymmetric potential in the presence of a dissipative environment. The system is characterized by directed transport emerging from a quantum strange attractor. This model exhibits, in the limit of small effective Planck constant, a transition from quantum to classical behavior, in agreement with the correspondence principle. We also discuss parameter values suitable for the implementation of the quantum ratchet effect with cold atoms in optical lattices.

  2. Hybrid quantum systems of atoms and ions

    CERN Document Server

    Zipkes, Christoph; Palzer, Stefan; Sias, Carlo; Köhl, Michael

    2010-01-01

    In recent years, ultracold atoms have emerged as an exceptionally controllable experimental system to investigate fundamental physics, ranging from quantum information science to simulations of condensed matter models. Here we go one step further and explore how cold atoms can be combined with other quantum systems to create new quantum hybrids with tailored properties. Coupling atomic quantum many-body states to an independently controllable single-particle gives access to a wealth of novel physics and to completely new detection and manipulation techniques. We report on recent experiments in which we have for the first time deterministically placed a single ion into an atomic Bose Einstein condensate. A trapped ion, which currently constitutes the most pristine single particle quantum system, can be observed and manipulated at the single particle level. In this single-particle/many-body composite quantum system we show sympathetic cooling of the ion and observe chemical reactions of single particles in situ...

  3. Hybrid quantum systems of atoms and ions

    Energy Technology Data Exchange (ETDEWEB)

    Zipkes, Christoph; Ratschbacher, Lothar; Palzer, Stefan; Sias, Carlo; Koehl, Michael [Cavendish Laboratory, University of Cambridge, JJ Thomson Avenue, Cambridge CB3 0HE (United Kingdom)

    2011-01-10

    In recent years, ultracold atoms have emerged as an exceptionally controllable experimental system to investigate fundamental physics, ranging from quantum information science to simulations of condensed matter models. Here we go one step further and explore how cold atoms can be combined with other quantum systems to create new quantum hybrids with tailored properties. Coupling atomic quantum many-body states to an independently controllable single-particle gives access to a wealth of novel physics and to completely new detection and manipulation techniques. We report on recent experiments in which we have for the first time deterministically placed a single ion into an atomic Bose Einstein condensate. A trapped ion, which currently constitutes the most pristine single particle quantum system, can be observed and manipulated at the single particle level. In this single-particle/many-body composite quantum system we show sympathetic cooling of the ion and observe chemical reactions of single particles in situ.

  4. Quantum Q systems: from cluster algebras to quantum current algebras

    Science.gov (United States)

    Di Francesco, Philippe; Kedem, Rinat

    2017-02-01

    This paper gives a new algebraic interpretation for the algebra generated by the quantum cluster variables of the A_r quantum Q-system (Di Francesco and Kedem in Int Math Res Not IMRN 10:2593-2642, 2014). We show that the algebra can be described as a quotient of the localization of the quantum algebra U_{√{q}}({n}[u,u^{-1}])subset U_{√{q}}(widehat{{sl}}_2), in the Drinfeld presentation. The generating current is made up of a subset of the cluster variables which satisfy the Q-system, which we call fundamental. The other cluster variables are given by a quantum determinant-type formula, and are polynomials in the fundamental generators. The conserved quantities of the discrete evolution (Di Francesco and Kedem in Adv Math 228(1):97-152, 2011) described by quantum Q-system generate the Cartan currents at level 0, in a non-standard polarization. The rest of the quantum affine algebra is also described in terms of cluster variables.

  5. Quantum Q systems: from cluster algebras to quantum current algebras

    Science.gov (United States)

    Di Francesco, Philippe; Kedem, Rinat

    2016-11-01

    This paper gives a new algebraic interpretation for the algebra generated by the quantum cluster variables of the A_r quantum Q-system (Di Francesco and Kedem in Int Math Res Not IMRN 10:2593-2642, 2014). We show that the algebra can be described as a quotient of the localization of the quantum algebra U_{√{q}}({{n}}[u,u^{-1}])subset U_{√{q}}(widehat{{{sl}}}_2) , in the Drinfeld presentation. The generating current is made up of a subset of the cluster variables which satisfy the Q-system, which we call fundamental. The other cluster variables are given by a quantum determinant-type formula, and are polynomials in the fundamental generators. The conserved quantities of the discrete evolution (Di Francesco and Kedem in Adv Math 228(1):97-152, 2011) described by quantum Q-system generate the Cartan currents at level 0, in a non-standard polarization. The rest of the quantum affine algebra is also described in terms of cluster variables.

  6. Quantum chaos in open systems a quantum state diffusion analysis

    CERN Document Server

    Brun, T A; Schack, R; Brun, Todd A; Percival, Ian C; Schack, Rudiger

    1995-01-01

    Except for the universe, all quantum systems are open, and according to quantum state diffusion theory, many systems localize to wave packets in the neighborhood of phase space points. This is due to decoherence from the interaction with the environment, and makes the quasiclassical limit of such systems both more realistic and simpler in many respects than the more familiar quasiclassical limit for closed systems. A linearized version of this theory leads to the correct classical dynamics in the macroscopic limit, even for nonlinear and chaotic systems. We apply the theory to the forced, damped Duffing oscillator, comparing the numerical results of the full and linearized equations, and argue that this can be used to make explicit calculations in the decoherent histories formalism of quantum mechanics.

  7. Device-independent two-party cryptography secure against sequential attacks

    DEFF Research Database (Denmark)

    Kaniewski, Jedrzej; Wehner, Stephanie

    2016-01-01

    The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy......-storage model by sending more signals than the adversary can store in a certain time frame. Here, we initiate the study of device-independent (DI) protocols for two-party cryptography in the noisy-storage model. Specifically, we present a relatively easy to implement protocol for a cryptographic building block...... known as weak string erasure and prove its security even if the devices used in the protocol are prepared by the dishonest party. DI two-party cryptography is made challenging by the fact that Alice and Bob do not trust each other, which requires new techniques to establish security. We fully analyse...

  8. Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing

    Directory of Open Access Journals (Sweden)

    James (Jong Hyuk Park

    2016-09-01

    Full Text Available Entropy is a basic and important concept in information theory. It is also often used as a measure of the unpredictability of a cryptographic key in cryptography research areas. Ubiquitous computing (Ubi-comp has emerged rapidly as an exciting new paradigm. In this special issue, we mainly selected and discussed papers related with ore theories based on the graph theory to solve computational problems on cryptography and security, practical technologies; applications and services for Ubi-comp including secure encryption techniques, identity and authentication; credential cloning attacks and countermeasures; switching generator with resistance against the algebraic and side channel attacks; entropy-based network anomaly detection; applied cryptography using chaos function, information hiding and watermark, secret sharing, message authentication, detection and modeling of cyber attacks with Petri Nets, and quantum flows for secret key distribution, etc.

  9. Device-independent two-party cryptography secure against sequential attacks

    DEFF Research Database (Denmark)

    Kaniewski, Jedrzej; Wehner, Stephanie

    2016-01-01

    The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy......-storage model by sending more signals than the adversary can store in a certain time frame. Here, we initiate the study of device-independent (DI) protocols for two-party cryptography in the noisy-storage model. Specifically, we present a relatively easy to implement protocol for a cryptographic building block...... known as weak string erasure and prove its security even if the devices used in the protocol are prepared by the dishonest party. DI two-party cryptography is made challenging by the fact that Alice and Bob do not trust each other, which requires new techniques to establish security. We fully analyse...

  10. Quasi-Periodically Driven Quantum Systems

    Science.gov (United States)

    Verdeny, Albert; Puig, Joaquim; Mintert, Florian

    2016-10-01

    Floquet theory provides rigorous foundations for the theory of periodically driven quantum systems. In the case of non-periodic driving, however, the situation is not so well understood. Here, we provide a critical review of the theoretical framework developed for quasi-periodically driven quantum systems. Although the theoretical footing is still under development, we argue that quasi-periodically driven quantum systems can be treated with generalisations of Floquet theory in suitable parameter regimes. Moreover, we provide a generalisation of the Floquet-Magnus expansion and argue that quasi-periodic driving offers a promising route for quantum simulations.

  11. Adiabatic Quantum Search in Open Systems.

    Science.gov (United States)

    Wild, Dominik S; Gopalakrishnan, Sarang; Knap, Michael; Yao, Norman Y; Lukin, Mikhail D

    2016-10-07

    Adiabatic quantum algorithms represent a promising approach to universal quantum computation. In isolated systems, a key limitation to such algorithms is the presence of avoided level crossings, where gaps become extremely small. In open quantum systems, the fundamental robustness of adiabatic algorithms remains unresolved. Here, we study the dynamics near an avoided level crossing associated with the adiabatic quantum search algorithm, when the system is coupled to a generic environment. At zero temperature, we find that the algorithm remains scalable provided the noise spectral density of the environment decays sufficiently fast at low frequencies. By contrast, higher order scattering processes render the algorithm inefficient at any finite temperature regardless of the spectral density, implying that no quantum speedup can be achieved. Extensions and implications for other adiabatic quantum algorithms will be discussed.

  12. Tailoring superradiance to design artificial quantum systems

    Science.gov (United States)

    Longo, Paolo; Keitel, Christoph H.; Evers, Jörg

    2016-03-01

    Cooperative phenomena arising due to the coupling of individual atoms via the radiation field are a cornerstone of modern quantum and optical physics. Recent experiments on x-ray quantum optics added a new twist to this line of research by exploiting superradiance in order to construct artificial quantum systems. However, so far, systematic approaches to deliberately design superradiance properties are lacking, impeding the desired implementation of more advanced quantum optical schemes. Here, we develop an analytical framework for the engineering of single-photon superradiance in extended media applicable across the entire electromagnetic spectrum, and show how it can be used to tailor the properties of an artificial quantum system. This “reverse engineering” of superradiance not only provides an avenue towards non-linear and quantum mechanical phenomena at x-ray energies, but also leads to a unified view on and a better understanding of superradiance across different physical systems.

  13. Tailoring superradiance to design artificial quantum systems.

    Science.gov (United States)

    Longo, Paolo; Keitel, Christoph H; Evers, Jörg

    2016-03-24

    Cooperative phenomena arising due to the coupling of individual atoms via the radiation field are a cornerstone of modern quantum and optical physics. Recent experiments on x-ray quantum optics added a new twist to this line of research by exploiting superradiance in order to construct artificial quantum systems. However, so far, systematic approaches to deliberately design superradiance properties are lacking, impeding the desired implementation of more advanced quantum optical schemes. Here, we develop an analytical framework for the engineering of single-photon superradiance in extended media applicable across the entire electromagnetic spectrum, and show how it can be used to tailor the properties of an artificial quantum system. This "reverse engineering" of superradiance not only provides an avenue towards non-linear and quantum mechanical phenomena at x-ray energies, but also leads to a unified view on and a better understanding of superradiance across different physical systems.

  14. Adiabatic Quantum Search in Open Systems

    Science.gov (United States)

    Wild, Dominik S.; Gopalakrishnan, Sarang; Knap, Michael; Yao, Norman Y.; Lukin, Mikhail D.

    2016-10-01

    Adiabatic quantum algorithms represent a promising approach to universal quantum computation. In isolated systems, a key limitation to such algorithms is the presence of avoided level crossings, where gaps become extremely small. In open quantum systems, the fundamental robustness of adiabatic algorithms remains unresolved. Here, we study the dynamics near an avoided level crossing associated with the adiabatic quantum search algorithm, when the system is coupled to a generic environment. At zero temperature, we find that the algorithm remains scalable provided the noise spectral density of the environment decays sufficiently fast at low frequencies. By contrast, higher order scattering processes render the algorithm inefficient at any finite temperature regardless of the spectral density, implying that no quantum speedup can be achieved. Extensions and implications for other adiabatic quantum algorithms will be discussed.

  15. Quantum random number generation

    Science.gov (United States)

    Ma, Xiongfeng; Yuan, Xiao; Cao, Zhu; Qi, Bing; Zhang, Zhen

    2016-06-01

    Quantum physics can be exploited to generate true random numbers, which have important roles in many applications, especially in cryptography. Genuine randomness from the measurement of a quantum system reveals the inherent nature of quantumness—coherence, an important feature that differentiates quantum mechanics from classical physics. The generation of genuine randomness is generally considered impossible with only classical means. On the basis of the degree of trustworthiness on devices, quantum random number generators (QRNGs) can be grouped into three categories. The first category, practical QRNG, is built on fully trusted and calibrated devices and typically can generate randomness at a high speed by properly modelling the devices. The second category is self-testing QRNG, in which verifiable randomness can be generated without trusting the actual implementation. The third category, semi-self-testing QRNG, is an intermediate category that provides a tradeoff between the trustworthiness on the device and the random number generation speed.

  16. Secure Antnet Routing Algorithm for Scalable Adhoc Networks Using Elliptic Curve Cryptography

    Directory of Open Access Journals (Sweden)

    V. Vijayalakshmi

    2007-01-01

    Full Text Available The secure end-to-end route discovery in the decentralized Mobile Adhoc Networks (MANETs should have to meet the requirements of prevention of DoS attacks on data traffic, should be adaptive and fault tolerant and must have high speed, low energy overhead and scalability for future development. In this research a secure routing using antnet mechanism and mutual authentication using Elliptic Curve Cryptography (ECC has been proposed to meet the above requirements. The common perception of public key cryptography is that it is not well suited for adhoc networks as they are very complex and slow. Against this popular belief, this research implements Elliptic Curve Cryptography -a public key cryptography scheme. ECC provides a similar level of security to conventional integer-based public-key algorithms, but with much shorter keys. Because of the shorter keys ECC algorithms run faster, require less space and consume less energy. These advantages make ECC a better choice of public key cryptography, especially for a resource constrained systems like MANETs. Using the antnet routing algorithm, the highly trustable route will be selected for data transfer and each Mobile Node (MN in MANET maintains the trust value of its one-hop neighbors. The mutual authentication between source and destination is done by master key exchange using Elliptic Curve Cryptography (ECC. v

  17. Geometric quenches in quantum integrable systems

    NARCIS (Netherlands)

    Mossel, J.; Palacios, G.; Caux, J.S.

    2010-01-01

    We consider the generic problem of suddenly changing the geometry of an integrable, one-dimensional many-body quantum system. We show how the physics of an initial quantum state released into a bigger system can be completely described within the framework of the algebraic Bethe ansatz, by providing

  18. Linear response theory for quantum open systems

    OpenAIRE

    Wei, J. H.; Yan, YiJing

    2011-01-01

    Basing on the theory of Feynman's influence functional and its hierarchical equations of motion, we develop a linear response theory for quantum open systems. Our theory provides an effective way to calculate dynamical observables of a quantum open system at its steady-state, which can be applied to various fields of non-equilibrium condensed matter physics.

  19. BANDWIDTH OF QUANTUM OPTICAL COMMUNICATION SYSTEM

    Directory of Open Access Journals (Sweden)

    I. R. Gulakov

    2012-01-01

    Full Text Available Impact of registered optical radiation intensity, overvoltage, dimensions of photosensitive surface, structure of p-n junction and avalanche photodetectors dead time operating in the photon counting mode on quantum optical system capacity has been carried out in this investigation. As a result, the quantum optical system maximum capacity of 81 kbit/s has been obtained.

  20. Quantum information theory with Gaussian systems

    Energy Technology Data Exchange (ETDEWEB)

    Krueger, O.

    2006-04-06

    This thesis applies ideas and concepts from quantum information theory to systems of continuous-variables such as the quantum harmonic oscillator. The focus is on three topics: the cloning of coherent states, Gaussian quantum cellular automata and Gaussian private channels. Cloning was investigated both for finite-dimensional and for continuous-variable systems. We construct a private quantum channel for the sequential encryption of coherent states with a classical key, where the key elements have finite precision. For the case of independent one-mode input states, we explicitly estimate this precision, i.e. the number of key bits needed per input state, in terms of these parameters. (orig.)

  1. Basic concepts in quantum computation

    CERN Document Server

    Ekert, A K; Inamori, H; Ekert, Artur; Hayden, Patrick; Inamori, Hitoshi

    2000-01-01

    Section headings: 1 Qubits, gates and networks 2 Quantum arithmetic and function evaluations 3 Algorithms and their complexity 4 From interferometers to computers 5 The first quantum algorithms 6 Quantum search 7 Optimal phase estimation 8 Periodicity and quantum factoring 9 Cryptography 10 Conditional quantum dynamics 11 Decoherence and recoherence 12 Concluding remarks

  2. Quantum Advantage in Communication Networks

    CERN Document Server

    De, Aditi Sen

    2011-01-01

    Quantum channels are known to provide qualitatively better information transfer capacities over their classical counterparts. Examples include quantum cryptography, quantum dense coding, and quantum teleportation. This is a short review on paradigmatic quantum communication protocols in both bipartite as well as multipartite scenarios.

  3. Classical Equations for Quantum Systems

    CERN Document Server

    Gell-Mann, Murray; Gell-Mann, Murray; Hartle, James B.

    1993-01-01

    The origin of the phenomenological deterministic laws that approximately govern the quasiclassical domain of familiar experience is considered in the context of the quantum mechanics of closed systems such as the universe as a whole. We investigate the requirements for coarse grainings to yield decoherent sets of histories that are quasiclassical, i.e. such that the individual histories obey, with high probability, effective classical equations of motion interrupted continually by small fluctuations and occasionally by large ones. We discuss these requirements generally but study them specifically for coarse grainings of the type that follows a distinguished subset of a complete set of variables while ignoring the rest. More coarse graining is needed to achieve decoherence than would be suggested by naive arguments based on the uncertainty principle. Even coarser graining is required in the distinguished variables for them to have the necessary inertia to approach classical predictability in the presence of t...

  4. Coherent Dynamics of Complex Quantum Systems

    CERN Document Server

    Akulin, Vladimir M

    2006-01-01

    A large number of modern problems in physics, chemistry, and quantum electronics require a consideration of population dynamics in complex multilevel quantum systems. The purpose of this book is to provide a systematic treatment of these questions and to present a number of exactly solvable problems. It considers the different dynamical problems frequently encountered in different areas of physics from the same perspective, based mainly on the fundamental ideas of group theory and on the idea of ensemble average. Also treated are concepts of complete quantum control and correction of decoherence induced errors that are complementary to the idea of ensemble average. "Coherent Dynamics of Complex Quantum Systems" is aimed at senior-level undergraduate students in the areas of Atomic, Molecular, and Laser Physics, Physical Chemistry, Quantum Optics and Quantum Informatics. It should help them put particular problems in these fields into a broader scientific context and thereby take advantage of the well-elabora...

  5. Quantum Dynamics of Nonlinear Cavity Systems

    OpenAIRE

    Nation, Paul D.

    2010-01-01

    We investigate the quantum dynamics of three different configurations of nonlinear cavity systems. To begin, we carry out a quantum analysis of a dc superconducting quantum interference device (SQUID) mechanical displacement detector comprised of a SQUID with a mechanically compliant loop segment. The SQUID is approximated by a nonlinear current-dependent inductor, inducing a flux tunable nonlinear Duffing term in the cavity equation of motion. Expressions are derived for the detector signal ...

  6. Survey of Multiple Information Hiding Techniques using Visual Cryptography

    Directory of Open Access Journals (Sweden)

    Bijoy Chhetri

    2015-10-01

    Full Text Available Information now a day‟s seems to have become abundant and the secure transmission and visualization of it has been a challenge. The major security concerns are of Authentication, Confidentiality and Data Integrity.  In regard to this, the various security methodologies have been introduced and Cryptography is one of the schemes where the information is transferred in the disguise form and only authentic user can reveal the exact information. Various Cryptographic techniques has played a very vital role in this regard, among which Visual Cryptographic System(VCS is one of such kind  where the secret data (image, text etc is encoded into multiple images and decoded using Human Visual System(HVS without having to tedious calculations and sound  knowledge of Cryptography. VC  is one of such methodology where the secret information is bifurcated into many disguise images and on super imposing these images, the original secret information is revealed, using Human Visual System(HVS unlike the traditional cryptography where lot of complex mathematical and time consuming calculation are to be performed. In this paper study of various VC techniques has been done based on number of shares, number of secret messages and types of shares in the cases of Grayscale Image.

  7. Region Incrementing Visual Cryptography Scheme with Same Contrast

    Institute of Scientific and Technical Information of China (English)

    LI Shundong; LI Jiliang; WANG Daoshun

    2016-01-01

    In binary Region increm enting visual cryptography schemes (RIVCSs), the secrets of multi-ple secrecy regions can be gradually revealed by hu-man visual system. A characteristic of the existing binary RIVCSs different from traditional binary Visual cryptog-raphy schemes (VCSs) is that, the contrasts for different revealed regions are different while traditional binary VCSs have same contrast. To keep the quality (contrast) of re-covered image compatible with the traditional VCS, we use integer linear programming to design a binary (k,n)-RIVCS with same contrast for all secrecy regions in this paper. Experimental results demonstrate that our method is feasible and effective. The trade-off is that our schem e involves a larger pixel expansion.

  8. Quantum equilibria for macroscopic systems

    Energy Technology Data Exchange (ETDEWEB)

    Grib, A [Department of Theoretical Physics and Astronomy, Russian State Pedagogical University, St. Petersburg (Russian Federation); Khrennikov, A [Centre for Mathematical Modelling in Physics and Cognitive Sciences Vaexjoe University (Sweden); Parfionov, G [Department of Mathematics, St. Petersburg State University of Economics and Finances (Russian Federation); Starkov, K [Department of Mathematics, St. Petersburg State University of Economics and Finances (Russian Federation)

    2006-06-30

    Nash equilibria are found for some quantum games with particles with spin-1/2 for which two spin projections on different directions in space are measured. Examples of macroscopic games with the same equilibria are given. Mixed strategies for participants of these games are calculated using probability amplitudes according to the rules of quantum mechanics in spite of the macroscopic nature of the game and absence of Planck's constant. A possible role of quantum logical lattices for the existence of macroscopic quantum equilibria is discussed. Some examples for spin-1 cases are also considered.

  9. Non-perturbative description of quantum systems

    CERN Document Server

    Feranchuk, Ilya; Le, Van-Hoang; Ulyanenkov, Alexander

    2015-01-01

    This book introduces systematically the operator method for the solution of the Schrödinger equation. This method permits to describe the states of quantum systems in the entire range of parameters of Hamiltonian with a predefined accuracy. The operator method is unique compared with other non-perturbative methods due to its ability to deliver in zeroth approximation the uniformly suitable estimate for both ground and excited states of quantum system. The method has been generalized for the application to quantum statistics and quantum field theory.  In this book, the numerous applications of operator method for various physical systems are demonstrated. Simple models are used to illustrate the basic principles of the method which are further used for the solution of complex problems of quantum theory for many-particle systems. The results obtained are supplemented by numerical calculations, presented as tables and figures.

  10. Simulation of n-qubit quantum systems. V. Quantum measurements

    Science.gov (United States)

    Radtke, T.; Fritzsche, S.

    2010-02-01

    The FEYNMAN program has been developed during the last years to support case studies on the dynamics and entanglement of n-qubit quantum registers. Apart from basic transformations and (gate) operations, it currently supports a good number of separability criteria and entanglement measures, quantum channels as well as the parametrizations of various frequently applied objects in quantum information theory, such as (pure and mixed) quantum states, hermitian and unitary matrices or classical probability distributions. With the present update of the FEYNMAN program, we provide a simple access to (the simulation of) quantum measurements. This includes not only the widely-applied projective measurements upon the eigenspaces of some given operator but also single-qubit measurements in various pre- and user-defined bases as well as the support for two-qubit Bell measurements. In addition, we help perform generalized and POVM measurements. Knowing the importance of measurements for many quantum information protocols, e.g., one-way computing, we hope that this update makes the FEYNMAN code an attractive and versatile tool for both, research and education. New version program summaryProgram title: FEYNMAN Catalogue identifier: ADWE_v5_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADWE_v5_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.html No. of lines in distributed program, including test data, etc.: 27 210 No. of bytes in distributed program, including test data, etc.: 1 960 471 Distribution format: tar.gz Programming language: Maple 12 Computer: Any computer with Maple software installed Operating system: Any system that supports Maple; the program has been tested under Microsoft Windows XP and Linux Classification: 4.15 Catalogue identifier of previous version: ADWE_v4_0 Journal reference of previous version: Comput. Phys. Commun

  11. Cryptographie quantique à variables continues

    Science.gov (United States)

    Bencheikh, K.; Jankovic, A.; Symul, T.; Levenson, J. A.

    2002-06-01

    Nous avons élaboré un protocole de cryptographie quantique qui permet de générer et de distribuer une clé secrète aléatoire. Le protocole repose sur l'utilisation de paires de champs électromagnétiques dont les quadratures présentent des corrélations quantiques de type Einstein-Podolsky-Rosen. Les fluctuations quantiques instantanése constituent les bits aléatoires de la clé secrète, et la dégradation irréversible des corrélations quantiques des quadratures causée par une tierce personne permet de la détecter et de garantir la sécurité d'échange.

  12. Cheating prevention in visual cryptography.

    Science.gov (United States)

    Hu, Chih-Ming; Tzeng, Wen-Guey

    2007-01-01

    Visual cryptography (VC) is a method of encrypting a secret image into shares such that stacking a sufficient number of shares reveals the secret image. Shares are usually presented in transparencies. Each participant holds a transparency. Most of the previous research work on VC focuses on improving two parameters: pixel expansion and contrast. In this paper, we studied the cheating problem in VC and extended VC. We considered the attacks of malicious adversaries who may deviate from the scheme in any way. We presented three cheating methods and applied them on attacking existent VC or extended VC schemes. We improved one cheat-preventing scheme. We proposed a generic method that converts a VCS to another VCS that has the property of cheating prevention. The overhead of the conversion is near optimal in both contrast degression and pixel expansion.

  13. Bent functions results and applications to cryptography

    CERN Document Server

    Tokareva, Natalia

    2015-01-01

    Bent Functions: Results and Applications to Cryptography offers a unique survey of the objects of discrete mathematics known as Boolean bent functions. As these maximal, nonlinear Boolean functions and their generalizations have many theoretical and practical applications in combinatorics, coding theory, and cryptography, the text provides a detailed survey of their main results, presenting a systematic overview of their generalizations and applications, and considering open problems in classification and systematization of bent functions. The text is appropriate for novices and advanced

  14. Classical introduction to cryptography exercise book

    CERN Document Server

    Baigneres, Thomas; Lu, Yi

    2007-01-01

    This is a companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security (0-387-25464-1). Coverage includes symmetric or public-key cryptography, cryptographic protocols, design, cryptanalysis, and implementation of cryptosystems. Readers should be comfortable with basic facts of discrete probability theory, discrete mathematics, calculus, algebra, and computer science. However, the exercises do not require an extensive background in mathematics, since the most important notions are introduced and discussed in many of them. Exercises

  15. Limit cycles in quantum systems

    Energy Technology Data Exchange (ETDEWEB)

    Niemann, Patrick

    2015-04-27

    In this thesis we investigate Limit Cycles in Quantum Systems. Limit cycles are a renormalization group (RG) topology. When degrees of freedom are integrated out, the coupling constants flow periodically in a closed curve. The presence of limit cycles is restricted by the necessary condition of discrete scale invariance. A signature of discrete scale invariance and limit cycles is log-periodic behavior. The first part of this thesis is concerned with the study of limit cycles with the similarity renormalization group (SRG). Limit cycles are mainly investigated within conventional renormalization group frameworks, where degrees of freedom, which are larger than a given cutoff, are integrated out. In contrast, in the SRG potentials are unitarily transformed and thereby obtain a band-diagonal structure. The width of the band structure can be regarded as an effective cutoff. We investigate the appearance of limit cycles in the SRG evolution. Our aim is to extract signatures as well as the scaling factor of the limit cycle. We consider the 1/R{sup 2}-potential in a two-body system and a three-body system with large scattering lengths. Both systems display a limit cycle. Besides the frequently used kinetic energy generator we apply the exponential and the inverse generator. In the second part of this thesis, Limit Cycles at Finite Density, we examine the pole structure of the scattering amplitude for distinguishable fermions at zero temperature in the medium. Unequal masses and a filled Fermi sphere for each fermion species are considered. We focus on negative scattering lengths and the unitary limit. The properties of the three-body spectrum in the medium and implications for the phase structure of ultracold Fermi gases are discussed.

  16. Quantum key distribution in 50-km optic fibers

    Institute of Scientific and Technical Information of China (English)

    ZHOU Chunyuan; WU Guang; CHEN Xiuliang; LI Hexiang; ZENG Heping

    2004-01-01

    In this paper, we report our recent experiment of long-distance fiber-optic "plug and play" quantum cryptography system wherein a Faraday-Mirror was used to compensate for the polarization mode dispersion and phase drifts. The pulse-biased coincident gate single-photon detection technique was used to effectively reduce the noises from the detrimental Rayleigh backscattering. We have achieved a quantum key distribution system with the working distance of 50 km, which was tested to be stable in more than 6 hours' continuous work. And we also demonstrated the practical quantum communication in a local area network using the TCP protocol.

  17. High-dimensional quantum cloning and applications to quantum hacking.

    Science.gov (United States)

    Bouchard, Frédéric; Fickler, Robert; Boyd, Robert W; Karimi, Ebrahim

    2017-02-01

    Attempts at cloning a quantum system result in the introduction of imperfections in the state of the copies. This is a consequence of the no-cloning theorem, which is a fundamental law of quantum physics and the backbone of security for quantum communications. Although perfect copies are prohibited, a quantum state may be copied with maximal accuracy via various optimal cloning schemes. Optimal quantum cloning, which lies at the border of the physical limit imposed by the no-signaling theorem and the Heisenberg uncertainty principle, has been experimentally realized for low-dimensional photonic states. However, an increase in the dimensionality of quantum systems is greatly beneficial to quantum computation and communication protocols. Nonetheless, no experimental demonstration of optimal cloning machines has hitherto been shown for high-dimensional quantum systems. We perform optimal cloning of high-dimensional photonic states by means of the symmetrization method. We show the universality of our technique by conducting cloning of numerous arbitrary input states and fully characterize our cloning machine by performing quantum state tomography on cloned photons. In addition, a cloning attack on a Bennett and Brassard (BB84) quantum key distribution protocol is experimentally demonstrated to reveal the robustness of high-dimensional states in quantum cryptography.

  18. High-dimensional quantum cloning and applications to quantum hacking

    Science.gov (United States)

    Bouchard, Frédéric; Fickler, Robert; Boyd, Robert W.; Karimi, Ebrahim

    2017-01-01

    Attempts at cloning a quantum system result in the introduction of imperfections in the state of the copies. This is a consequence of the no-cloning theorem, which is a fundamental law of quantum physics and the backbone of security for quantum communications. Although perfect copies are prohibited, a quantum state may be copied with maximal accuracy via various optimal cloning schemes. Optimal quantum cloning, which lies at the border of the physical limit imposed by the no-signaling theorem and the Heisenberg uncertainty principle, has been experimentally realized for low-dimensional photonic states. However, an increase in the dimensionality of quantum systems is greatly beneficial to quantum computation and communication protocols. Nonetheless, no experimental demonstration of optimal cloning machines has hitherto been shown for high-dimensional quantum systems. We perform optimal cloning of high-dimensional photonic states by means of the symmetrization method. We show the universality of our technique by conducting cloning of numerous arbitrary input states and fully characterize our cloning machine by performing quantum state tomography on cloned photons. In addition, a cloning attack on a Bennett and Brassard (BB84) quantum key distribution protocol is experimentally demonstrated to reveal the robustness of high-dimensional states in quantum cryptography. PMID:28168219

  19. Quantum Simulation for Open-System Dynamics

    Science.gov (United States)

    Wang, Dong-Sheng; de Oliveira, Marcos Cesar; Berry, Dominic; Sanders, Barry

    2013-03-01

    Simulations are essential for predicting and explaining properties of physical and mathematical systems yet so far have been restricted to classical and closed quantum systems. Although forays have been made into open-system quantum simulation, the strict algorithmic aspect has not been explored yet is necessary to account fully for resource consumption to deliver bounded-error answers to computational questions. An open-system quantum simulator would encompass classical and closed-system simulation and also solve outstanding problems concerning, e.g. dynamical phase transitions in non-equilibrium systems, establishing long-range order via dissipation, verifying the simulatability of open-system dynamics on a quantum Turing machine. We construct an efficient autonomous algorithm for designing an efficient quantum circuit to simulate many-body open-system dynamics described by a local Hamiltonian plus decoherence due to separate baths for each particle. The execution time and number of gates for the quantum simulator both scale polynomially with the system size. DSW funded by USARO. MCO funded by AITF and Brazilian agencies CNPq and FAPESP through Instituto Nacional de Ciencia e Tecnologia-Informacao Quantica (INCT-IQ). DWB funded by ARC Future Fellowship (FT100100761). BCS funded by AITF, CIFAR, NSERC and USARO.

  20. Workshop on quantum stochastic differential equations for the quantum simulation of physical systems

    Science.gov (United States)

    2016-09-22

    SECURITY CLASSIFICATION OF: This is a report on the “Workshop on quantum stochastic differential equations for the quantum simulation of physical ...mathematical tools to the quantum simulation of physical systems of interest to the Army. There were participants from US Government agencies, industry, and... quantum stochastic differential equations for the quantum simulation of physical systems Report Title This is a report on the “Workshop on quantum

  1. Quantum entanglement in condensed matter systems

    Energy Technology Data Exchange (ETDEWEB)

    Laflorencie, Nicolas, E-mail: laflo@irsamc.ups-tlse.fr

    2016-08-03

    This review focuses on the field of quantum entanglement applied to condensed matter physics systems with strong correlations, a domain which has rapidly grown over the last decade. By tracing out part of the degrees of freedom of correlated quantum systems, useful and non-trivial information can be obtained through the study of the reduced density matrix, whose eigenvalue spectrum (the entanglement spectrum) and the associated Rényi entropies are now well recognized to contain key features. In particular, the celebrated area law for the entanglement entropy of ground-states will be discussed from the perspective of its subleading corrections which encode universal details of various quantum states of matter, e.g. symmetry breaking states or topological order. Going beyond entropies, the study of the low-lying part of the entanglement spectrum also allows to diagnose topological properties or give a direct access to the excitation spectrum of the edges, and may also raise significant questions about the underlying entanglement Hamiltonian. All these powerful tools can be further applied to shed some light on disordered quantum systems where impurity/disorder can conspire with quantum fluctuations to induce non-trivial effects. Disordered quantum spin systems, the Kondo effect, or the many-body localization problem, which have all been successfully (re)visited through the prism of quantum entanglement, will be discussed in detail. Finally, the issue of experimental access to entanglement measurement will be addressed, together with its most recent developments.

  2. Quantum entanglement in condensed matter systems

    Science.gov (United States)

    Laflorencie, Nicolas

    2016-08-01

    This review focuses on the field of quantum entanglement applied to condensed matter physics systems with strong correlations, a domain which has rapidly grown over the last decade. By tracing out part of the degrees of freedom of correlated quantum systems, useful and non-trivial information can be obtained through the study of the reduced density matrix, whose eigenvalue spectrum (the entanglement spectrum) and the associated Rényi entropies are now well recognized to contain key features. In particular, the celebrated area law for the entanglement entropy of ground-states will be discussed from the perspective of its subleading corrections which encode universal details of various quantum states of matter, e.g. symmetry breaking states or topological order. Going beyond entropies, the study of the low-lying part of the entanglement spectrum also allows to diagnose topological properties or give a direct access to the excitation spectrum of the edges, and may also raise significant questions about the underlying entanglement Hamiltonian. All these powerful tools can be further applied to shed some light on disordered quantum systems where impurity/disorder can conspire with quantum fluctuations to induce non-trivial effects. Disordered quantum spin systems, the Kondo effect, or the many-body localization problem, which have all been successfully (re)visited through the prism of quantum entanglement, will be discussed in detail. Finally, the issue of experimental access to entanglement measurement will be addressed, together with its most recent developments.

  3. An Application of Quantum Finite Automata to Interactive Proof Systems

    CERN Document Server

    Nishimura, H; Nishimura, Harumichi; Yamakami, Tomoyuki

    2004-01-01

    Quantum finite automata have been studied intensively since their introduction in late 1990s as a natural model of a quantum computer with finite-dimensional quantum memory space. This paper seeks their direct application to interactive proof systems in which a mighty quantum prover communicates with a quantum-automaton verifier through a common communication cell. Our quantum interactive proof systems are juxtaposed to Dwork-Stockmeyer's classical interactive proof systems whose verifiers are two-way probabilistic automata. We demonstrate strengths and weaknesses of our systems and further study how various restrictions on the behaviors of quantum-automaton verifiers affect the power of quantum interactive proof systems.

  4. Emergent "Quantum" Theory in Complex Adaptive Systems.

    Science.gov (United States)

    Minic, Djordje; Pajevic, Sinisa

    2016-04-30

    Motivated by the question of stability, in this letter we argue that an effective quantum-like theory can emerge in complex adaptive systems. In the concrete example of stochastic Lotka-Volterra dynamics, the relevant effective "Planck constant" associated with such emergent "quantum" theory has the dimensions of the square of the unit of time. Such an emergent quantum-like theory has inherently non-classical stability as well as coherent properties that are not, in principle, endangered by thermal fluctuations and therefore might be of crucial importance in complex adaptive systems.

  5. Open quantum systems and error correction

    Science.gov (United States)

    Shabani Barzegar, Alireza

    Quantum effects can be harnessed to manipulate information in a desired way. Quantum systems which are designed for this purpose are suffering from harming interaction with their surrounding environment or inaccuracy in control forces. Engineering different methods to combat errors in quantum devices are highly demanding. In this thesis, I focus on realistic formulations of quantum error correction methods. A realistic formulation is the one that incorporates experimental challenges. This thesis is presented in two sections of open quantum system and quantum error correction. Chapters 2 and 3 cover the material on open quantum system theory. It is essential to first study a noise process then to contemplate methods to cancel its effect. In the second chapter, I present the non-completely positive formulation of quantum maps. Most of these results are published in [Shabani and Lidar, 2009b,a], except a subsection on geometric characterization of positivity domain of a quantum map. The real-time formulation of the dynamics is the topic of the third chapter. After introducing the concept of Markovian regime, A new post-Markovian quantum master equation is derived, published in [Shabani and Lidar, 2005a]. The section of quantum error correction is presented in three chapters of 4, 5, 6 and 7. In chapter 4, we introduce a generalized theory of decoherence-free subspaces and subsystems (DFSs), which do not require accurate initialization (published in [Shabani and Lidar, 2005b]). In Chapter 5, we present a semidefinite program optimization approach to quantum error correction that yields codes and recovery procedures that are robust against significant variations in the noise channel. Our approach allows us to optimize the encoding, recovery, or both, and is amenable to approximations that significantly improve computational cost while retaining fidelity (see [Kosut et al., 2008] for a published version). Chapter 6 is devoted to a theory of quantum error correction (QEC

  6. Distinguishability and accessible information in quantum theory

    CERN Document Server

    Fuchs, C

    1996-01-01

    This document focuses on translating various information-theoretic measures of distinguishability for probability distributions into measures of distin- guishability for quantum states. These measures should have important appli- cations in quantum cryptography and quantum computation theory. The results reported include the following. An exact expression for the quantum fidelity between two mixed states is derived. The optimal measurement that gives rise to it is studied in detail. Several upper and lower bounds on the quantum mutual information are derived via similar techniques and compared to each other. Of note is a simple derivation of the important upper bound first proved by Holevo and an explicit expression for another (tighter) upper bound that appears implicitly in the same derivation. Several upper and lower bounds to the quan- tum Kullback relative information are derived. The measures developed are also applied to ferreting out the extent to which quantum systems must be disturbed by information...

  7. Quantum computing with trapped ions

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, R.J.

    1998-01-01

    The significance of quantum computation for cryptography is discussed. Following a brief survey of the requirements for quantum computational hardware, an overview of the ion trap quantum computation project at Los Alamos is presented. The physical limitations to quantum computation with trapped ions are analyzed and an assessment of the computational potential of the technology is made.

  8. Quantum liquids in correlated systems

    Science.gov (United States)

    Kusminskiy, Silvia Viola

    Particular aspects of two different relevant systems in contemporary Condensed Matter Physics are studied: heavy fermion materials and the newly discovered graphene (an atom thick layer of graphite), specifically its bilayer. On one hand, the physics of heavy fermion materials under strong external magnetic fields is analyzed from a mean field point of view. The evolution of the heavy fermion ground state under the application of a magnetic field is investigated. A richer version of the usual hybridization mean field theory is presented, which allows for hybridization in both the singlet and triplet channels and incorporates a self-consistent Weiss field. It is shown that for a magnetic field strength B⋆, at a filling-dependent fraction of the zero-field hybridization gap, the spin up quasiparticle band becomes fully polarized---an event marked by a sudden jump in the magnetic susceptibility. The system exhibits a kind of quantum rigidity in which the susceptibility (and several other physical observables) are insensitive to further increases in field strength. This behavior ends abruptly with the collapse of the hybridization order parameter in a first-order transition to the normal metallic state. It is argued that the feature at B⋆ corresponds to the "metamagnetic transition" in YbRh2Si2. These results are in good agreement with recent experimental measurements. For the case of the graphene bilayer, the effect of electron-electron interactions on the properties of a graphene bilayer is studied within the Hartree-Fock-Thomas-Fermi theory. It is found that the electronic compressibility is rather different from those of either the two-dimensional electron gas or ordinary semiconductors. An inherent competition between the contributions coming from intra-band exchange interactions and inter-band interactions leads to a non-monotonic behavior of the compressibility as a function of carrier density. Also analyzed is the effect of the interactions on the

  9. Excess entropy production in quantum system: Quantum master equation approach

    OpenAIRE

    Nakajima, Satoshi; Tokura, Yasuhiro

    2016-01-01

    For open systems described by the quantum master equation (QME), we investigate the excess entropy production under quasistatic operations between nonequilibrium steady states. The average entropy production is composed of the time integral of the instantaneous steady entropy production rate and the excess entropy production. We define average entropy production rate using the average energy and particle currents, which are calculated by using the full counting statistics with QME. The excess...

  10. SHAMROCK: A Synthesizable High Assurance Cryptography and Key Management Coprocessor

    Science.gov (United States)

    2016-11-01

    cryptography; key management ; synthesizable. I. INTRODUCTION Modern cryptographic algorithms are designed with Kerckhoffs’ Principle in mind – that...LOCKMA supports good cryptography and key management practices . However, in general a software only solution is insufficient to guarantee the...1 SHAMROCK: A Synthesizable High Assurance Cryptography and Key Management Coprocessor David Whelihan, Michael Vai, Dan Utin, Roger Khazan, Karen

  11. An application of different dioids in public key cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Durcheva, Mariana I., E-mail: mdurcheva66@gmail.com [Technical University of Sofia, Faculty of Applied Mathematics and Informatics, 8 Kliment Ohridski St., Sofia 1000 (Bulgaria)

    2014-11-18

    Dioids provide a natural framework for analyzing a broad class of discrete event dynamical systems such as the design and analysis of bus and railway timetables, scheduling of high-throughput industrial processes, solution of combinatorial optimization problems, the analysis and improvement of flow systems in communication networks. They have appeared in several branches of mathematics such as functional analysis, optimization, stochastic systems and dynamic programming, tropical geometry, fuzzy logic. In this paper we show how to involve dioids in public key cryptography. The main goal is to create key – exchange protocols based on dioids. Additionally the digital signature scheme is presented.

  12. Formalization of Quantum Protocols using Coq

    Directory of Open Access Journals (Sweden)

    Jaap Boender

    2015-11-01

    Full Text Available Quantum Information Processing, which is an exciting area of research at the intersection of physics and computer science, has great potential for influencing the future development of information processing systems. The building of practical, general purpose Quantum Computers may be some years into the future. However, Quantum Communication and Quantum Cryptography are well developed. Commercial Quantum Key Distribution systems are easily available and several QKD networks have been built in various parts of the world. The security of the protocols used in these implementations rely on information-theoretic proofs, which may or may not reflect actual system behaviour. Moreover, testing of implementations cannot guarantee the absence of bugs and errors. This paper presents a novel framework for modelling and verifying quantum protocols and their implementations using the proof assistant Coq. We provide a Coq library for quantum bits (qubits, quantum gates, and quantum measurement. As a step towards verifying practical quantum communication and security protocols such as Quantum Key Distribution, we support multiple qubits, communication and entanglement. We illustrate these concepts by modelling the Quantum Teleportation Protocol, which communicates the state of an unknown quantum bit using only a classical channel.

  13. Noise management to achieve superiority in quantum information systems

    Science.gov (United States)

    Nemoto, Kae; Devitt, Simon; Munro, William J.

    2017-06-01

    Quantum information systems are expected to exhibit superiority compared with their classical counterparts. This superiority arises from the quantum coherences present in these quantum systems, which are obviously absent in classical ones. To exploit such quantum coherences, it is essential to control the phase information in the quantum state. The phase is analogue in nature, rather than binary. This makes quantum information technology fundamentally different from our classical digital information technology. In this paper, we analyse error sources and illustrate how these errors must be managed for the system to achieve the required fidelity and a quantum superiority. This article is part of the themed issue 'Quantum technology for the 21st century'.

  14. Quantum optical properties in plasmonic systems

    Science.gov (United States)

    Ooi, C. H. Raymond

    2015-04-01

    Plasmonic metallic particle (MP) can affect the optical properties of a quantum system (QS) in a remarkable way. We develop a general quantum nonlinear formalism with exact vectorial description for the scattered photons by the QS. The formalism enables us to study the variations of the dielectric function and photon spectrum of the QS with the particle distance between QS and MP, exciting laser direction, polarization and phase in the presence of surface plasmon resonance (SPR) in the MP. The quantum formalism also serves as a powerful tool for studying the effects of these parameters on the nonclassical properties of the scattered photons. The plasmonic effect of nanoparticles has promising possibilities as it provides a new way for manipulating quantum optical properties of light in nanophotonic systems.

  15. Quantum Information with Structured Light

    Science.gov (United States)

    Mirhosseini, Mohammad

    Quantum information science promises dramatic progress in a variety of fields such as cryptography, computation, and metrology. Although the proof-of-principle attempts for implementing quantum protocols have often relied on only a few qubits, the utilization of more sophisticated quantum systems is required for practical applications. In this thesis, we investigate the emerging role of high-dimensional optical states as a resource for encoding quantum information. We begin the first chapter with a review of orbital angular momentum (OAM) as a prime candidate for realizing multilevel quantum states and follow with a brief introduction to the quantum measurement theory. The second and the third chapters are dedicated to the application of OAM modes in quantum cryptography. In the second chapter, we discuss the challenges of projective measurement of OAM at the single-photon level, a crucial task required for quantum information processing. We then present our development of an efficient and accurate mode-sorting device that is capable of projectively measuring the orbital angular momentum of single photons. In the third chapter, we discuss the role of OAM modes in increasing the information capacity of quantum cryptography. We start this chapter by establishing the merits of encoding information on the quantum index of OAM modes in a free-space link. We then generalizing the BB-84 QKD protocol to the Hilbert space spanned by a finite number of OAM modes and outline our experimental realization. The last two chapters are dedicated to the tomography of structured light fields. We start the fourth chapter by applying the recently found method of direct measurement to the characterization of OAM superpositions. We find the quantum state in the Hilbert space spanned by 27 OAM modes by performing a weak measurement of orbital angular momentum (OAM) followed by a strong measurement of azimuthal angle. We then introduce the concept of compressive direct measurement (CDM

  16. Subcarrier Wave Quantum Key Distribution in Telecommunication Network with Bitrate 800 kbit/s

    Directory of Open Access Journals (Sweden)

    Gleim A.V.

    2015-01-01

    Full Text Available In the course of work on creating the first quantum communication network in Russia we demonstrated quantum key distribution in metropolitan optical network infrastructure. A single-pass subcarrier wave quantum cryptography scheme was used in the experiments. BB84 protocol with strong reference was chosen for performing key distribution. The registered sifted key rate in an optical cable with 1.5 dB loss was 800 Kbit/s. Signal visibility exceeded 98%, and quantum bit error rate value was 1%. The achieved result is a record for this type of systems.

  17. Subcarrier Wave Quantum Key Distribution in Telecommunication Network with Bitrate 800 kbit/s

    Science.gov (United States)

    Gleim, A. V.; Nazarov, Yu. V.; Egorov, V. I.; Smirnov, S. V.; Bannik, O. I.; Chistyakov, V. V.; Kynev, S. M.; Anisimov, A. A.; Kozlov, S. A.; Vasiliev, V. N.

    2015-09-01

    In the course of work on creating the first quantum communication network in Russia we demonstrated quantum key distribution in metropolitan optical network infrastructure. A single-pass subcarrier wave quantum cryptography scheme was used in the experiments. BB84 protocol with strong reference was chosen for performing key distribution. The registered sifted key rate in an optical cable with 1.5 dB loss was 800 Kbit/s. Signal visibility exceeded 98%, and quantum bit error rate value was 1%. The achieved result is a record for this type of systems.

  18. Note on quantum groups and integrable systems

    Science.gov (United States)

    Popolitov, A.

    2016-01-01

    The free-field formalism for quantum groups [preprint ITEP-M3/94, CRM-2202 hep-th/9409093] provides a special choice of coordinates on a quantum group. In these coordinates the construction of associated integrable system [arXiv:1207.1869] is especially simple. This choice also fits into general framework of cluster varieties [math.AG/0311245]—natural changes in coordinates are cluster mutations.

  19. Optical scanning cryptography for secure wireless transmission

    Science.gov (United States)

    Poon, Ting-Chung; Kim, Taegeun; Doh, Kyu

    2003-11-01

    We propose a method for secure wireless transmission of encrypted information. By use of an encryption key, an image or document is optically encrypted by optical heterodyne scanning and hence encryption is performed on the fly. We call this technique optical scanning cryptography. The output of the heterodyne encrypted signal is at radio frequency and can be directly sent through an antenna to a secure site for digital storage to be prepared for decryption. In the secure site, an identical optical scanning system to that used for encryption is used, together with a decryption key, to generate an electrical signal. The electrical signal is then processed and sent to a computer to be used for decryption. Utilizing the stored information received from the encryption stage and the electrical information from the secure site, a digital decryption unit performs a decryption algorithm. If the encryption key and the decryption key are matched, the decryption unit will decrypt the image or document faithfully. The overall cryptosystem can perform the incoherent optical processing counterpart of the well-known coherent double-random phase-encoding technique. We present computer simulations of the idea.

  20. QC-LDPC code-based cryptography

    CERN Document Server

    Baldi, Marco

    2014-01-01

    This book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density parity-check (QC-LDPC) codes, with a special focus on the use of these codes in public-key cryptosystems derived from the McEliece and Niederreiter schemes. In the first part of the book, the main characteristics of QC-LDPC codes are reviewed, and several techniques for their design are presented, while tools for assessing the error correction performance of these codes are also described. Some families of QC-LDPC codes that are best suited for use in cryptography are also presented. The second part of the book focuses on the McEliece and Niederreiter cryptosystems, both in their original forms and in some subsequent variants. The applicability of QC-LDPC codes in these frameworks is investigated by means of theoretical analyses and numerical tools, in order to assess their benefits and drawbacks in terms of system efficiency and security. Several examples of QC-LDPC code-based public key cryptosystems are prese...

  1. Optical scanning cryptography for secure wireless transmission.

    Science.gov (United States)

    Poon, Ting-Chung; Kim, Taegeun; Doh, Kyu

    2003-11-10

    We propose a method for secure wireless transmission of encrypted information. By use of an encryption key, an image or document is optically encrypted by optical heterodyne scanning and hence encryption is performed on the fly. We call this technique optical scanning cryptography. The output of the heterodyne encrypted signal is at radio frequency and can be directly sent through an antenna to a secure site for digital storage to be prepared for decryption. In the secure site, an identical optical scanning system to that used for encryption is used, together with a decryption key, to generate an electrical signal. The electrical signal is then processed and sent to a computer to be used for decryption. Utilizing the stored information received from the encryption stage and the electrical information from the secure site, a digital decryption unit performs a decryption algorithm. If the encryption key and the decryption key are matched, the decryption unit will decrypt the image or document faithfully. The overall cryptosystem can perform the incoherent optical processing counterpart of the well-known coherent double-random phase-encoding technique. We present computer simulations of the idea.

  2. Toward simulating complex systems with quantum effects

    Science.gov (United States)

    Kenion-Hanrath, Rachel Lynn

    Quantum effects like tunneling, coherence, and zero point energy often play a significant role in phenomena on the scales of atoms and molecules. However, the exact quantum treatment of a system scales exponentially with dimensionality, making it impractical for characterizing reaction rates and mechanisms in complex systems. An ongoing effort in the field of theoretical chemistry and physics is extending scalable, classical trajectory-based simulation methods capable of capturing quantum effects to describe dynamic processes in many-body systems; in the work presented here we explore two such techniques. First, we detail an explicit electron, path integral (PI)-based simulation protocol for predicting the rate of electron transfer in condensed-phase transition metal complex systems. Using a PI representation of the transferring electron and a classical representation of the transition metal complex and solvent atoms, we compute the outer sphere free energy barrier and dynamical recrossing factor of the electron transfer rate while accounting for quantum tunneling and zero point energy effects. We are able to achieve this employing only a single set of force field parameters to describe the system rather than parameterizing along the reaction coordinate. Following our success in describing a simple model system, we discuss our next steps in extending our protocol to technologically relevant materials systems. The latter half focuses on the Mixed Quantum-Classical Initial Value Representation (MQC-IVR) of real-time correlation functions, a semiclassical method which has demonstrated its ability to "tune'' between quantum- and classical-limit correlation functions while maintaining dynamic consistency. Specifically, this is achieved through a parameter that determines the quantumness of individual degrees of freedom. Here, we derive a semiclassical correction term for the MQC-IVR to systematically characterize the error introduced by different choices of simulation

  3. Color extended visual cryptography using error diffusion.

    Science.gov (United States)

    Kang, InKoo; Arce, Gonzalo R; Lee, Heung-Kyu

    2011-01-01

    Color visual cryptography (VC) encrypts a color secret message into n color halftone image shares. Previous methods in the literature show good results for black and white or gray scale VC schemes, however, they are not sufficient to be applied directly to color shares due to different color structures. Some methods for color visual cryptography are not satisfactory in terms of producing either meaningless shares or meaningful shares with low visual quality, leading to suspicion of encryption. This paper introduces the concept of visual information pixel (VIP) synchronization and error diffusion to attain a color visual cryptography encryption method that produces meaningful color shares with high visual quality. VIP synchronization retains the positions of pixels carrying visual information of original images throughout the color channels and error diffusion generates shares pleasant to human eyes. Comparisons with previous approaches show the superior performance of the new method.

  4. Classical Boolean logic gates with quantum systems

    Energy Technology Data Exchange (ETDEWEB)

    Renaud, N; Joachim, C, E-mail: n-renaud@northwestern.edu [Nanoscience Group and MANA Satellite CEMES/CNRS, 29 rue J Marvig, BP 94347, 31055 Toulouse Cedex (France)

    2011-04-15

    An analytical method is proposed to implement any classical Boolean function in a small quantum system by taking the advantage of its electronic transport properties. The logical input, {alpha} = {l_brace}{alpha}{sub 1}, ..., {alpha}{sub N}{r_brace}, is used to control well-identified parameters of the Hamiltonian of the system noted H{sub 0}({alpha}). The logical output is encoded in the tunneling current intensity passing through the quantum system when connected to conducting electrodes. It is demonstrated how to implement the six symmetric two-input/one-output Boolean functions in a quantum system. This system can be switched from one logic function to another by changing its structural parameters. The stability of the logic gates is discussed, perturbing the Hamiltonian with noise sources and studying the effect of decoherence.

  5. Open quantum systems far from equilibrium

    CERN Document Server

    Schaller, Gernot

    2014-01-01

    This monograph provides graduate students and also professional researchers aiming to understand the dynamics of open quantum systems with a valuable and self-contained toolbox. Special focus is laid on the link between microscopic models and the resulting open-system dynamics. This includes how to derive the celebrated Lindblad master equation without applying the rotating wave approximation. As typical representatives for non-equilibrium configurations it treats systems coupled to multiple reservoirs (including the description of quantum transport), driven systems, and feedback-controlled quantum systems. Each method is illustrated with easy-to-follow examples from recent research. Exercises and short summaries at the end of every chapter enable the reader to approach the frontiers of current research quickly and make the book useful for quick reference.

  6. Quantum hacking: attacking practical quantum key distribution systems

    Science.gov (United States)

    Qi, Bing; Fung, Chi-Hang Fred; Zhao, Yi; Ma, Xiongfeng; Tamaki, Kiyoshi; Chen, Christine; Lo, Hoi-Kwong

    2007-09-01

    Quantum key distribution (QKD) can, in principle, provide unconditional security based on the fundamental laws of physics. Unfortunately, a practical QKD system may contain overlooked imperfections and violate some of the assumptions in a security proof. Here, we report two types of eavesdropping attacks against a practical QKD system. The first one is "time-shift" attack, which is applicable to QKD systems with gated single photon detectors (SPDs). In this attack, the eavesdropper, Eve, exploits the time mismatch between the open windows of the two SPDs. She can acquire a significant amount of information on the final key by simply shifting the quantum signals forwards or backwards in time domain. Our experimental results in [9] with a commercial QKD system demonstrate that, under this attack, the original QKD system is breakable. This is the first experimental demonstration of a feasible attack against a commercial QKD system. This is a surprising result. The second one is "phase-remapping" attack [10]. Here, Eve exploits the fact that a practical phase modulator has a finite response time. In principle, Eve could change the encoded phase value by time-shifting the signal pulse relative to the reference pulse.

  7. Novel optical scanning cryptography using Fresnel telescope imaging.

    Science.gov (United States)

    Yan, Aimin; Sun, Jianfeng; Hu, Zhijuan; Zhang, Jingtao; Liu, Liren

    2015-07-13

    We propose a new method called modified optical scanning cryptography using Fresnel telescope imaging technique for encryption and decryption of remote objects. An image or object can be optically encrypted on the fly by Fresnel telescope scanning system together with an encryption key. For image decryption, the encrypted signals are received and processed with an optical coherent heterodyne detection system. The proposed method has strong performance through use of secure Fresnel telescope scanning with orthogonal polarized beams and efficient all-optical information processing. The validity of the proposed method is demonstrated by numerical simulations and experimental results.

  8. Witnessing Quantum Coherence: from solid-state to biological systems

    CERN Document Server

    Li, Che-Ming; Chen, Yueh-Nan; Chen, Guang-Yin; Nori, Franco; 10.1038/srep00885

    2012-01-01

    Quantum coherence is one of the primary non-classical features of quantum systems. While protocols such as the Leggett-Garg inequality (LGI) and quantum tomography can be used to test for the existence of quantum coherence and dynamics in a given system, unambiguously detecting inherent "quantumness" still faces serious obstacles in terms of experimental feasibility and efficiency, particularly in complex systems. Here we introduce two "quantum witnesses" to efficiently verify quantum coherence and dynamics in the time domain, without the expense and burden of non-invasive measurements or full tomographic processes. Using several physical examples, including quantum transport in solid-state nanostructures and in biological organisms, we show that these quantum witnesses are robust and have a much finer resolution in their detection window than the LGI has. These robust quantum indicators may assist in reducing the experimental overhead in unambiguously verifying quantum coherence in complex systems.

  9. Superconducting Quantum Arrays for Broadband RF Systems

    Science.gov (United States)

    Kornev, V.; Sharafiev, A.; Soloviev, I.; Kolotinskiy, N.; Mukhanov, O.

    2014-05-01

    Superconducting Quantum Arrays (SQAs), homogenous arrays of Superconducting Quantum Cells, are developed for implementation of broadband radio frequency (RF) systems capable of providing highly linear magnetic signal to voltage transfer with high dynamic range, including active electrically small antennas (ESAs). Among the proposed quantum cells which are bi-SQUID and Differential Quantum Cell (DQC), the latter delivered better performance for SQAs. A prototype of the transformer-less active ESA based on a 2D SQA with nonsuperconducting electric connection of the DQCs was fabricated using HYPRES niobium process with critical current density 4.5 kA/cm2. The measured voltage response is characterized by a peak-to-peak swing of ~100 mV and steepness of ~6500 μV/μT.

  10. Stochastic description for open quantum systems

    CERN Document Server

    Calzetta, E A; Verdaguer, E; Calzetta, Esteban; Roura, Albert; Verdaguer, Enric

    2000-01-01

    A linear open quantum system consisting of a harmonic oscillator coupled linearly to an infinite set of independent harmonic oscillators is considered; these oscillators have a general spectral density function and are initially in thermal equilibrium. Using the influence functional formalism a formal Langevin equation can be introduced to describe the system's fully quantum properties even beyond the semiclassical regime. It is shown that the reduced Wigner function for the system is exactly the formal distribution function resulting from averaging both over the initial conditions and the stochastic source of the formal Langevin equation. The master equation for the reduced density matrix is then obtained in the same way a Fokker-Planck equation can always be derived from a Langevin equation characterizing a stochastic process. We also show that the quantum correlation functions for the system can be deduced within the stochastic description provided by the Langevin equation. It is emphasized that when the s...

  11. Practical quantum key distribution over a 48-km optical fiber network

    CERN Document Server

    Hughes, R J; Peterson, C G; Hughes, Richard J.; Morgan, George L.

    1999-01-01

    The secure distribution of the secret random bit sequences known as "key" material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is a new technique for secure key distribution with single-photon transmissions: Heisenberg's uncertainty principle ensures that an adversary can neither successfully tap the key transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). We have developed experimental quantum cryptography systems based on the transmission of non-orthogonal photon states to generate shared key material over multi-kilometer optical fiber paths and over line-of-sight links. In both cases, key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. Here we report the most recent results...

  12. Quantum: information theory: technological challenge; Computacion Cuantica: un reto tecnologico

    Energy Technology Data Exchange (ETDEWEB)

    Calixto, M.

    2001-07-01

    The new Quantum Information Theory augurs powerful machines that obey the entangled logic of the subatomic world. Parallelism, entanglement, teleportation, no-cloning and quantum cryptography are typical peculiarities of this novel way of understanding computation. (Author) 24 refs.

  13. Quantum scaling in many-body systems

    CERN Document Server

    Continentino, Mucio A

    2001-01-01

    This book on quantum phase transitions has been written by one of the pioneers in the application of scaling ideas to many-body systems - a new and exciting subject that has relevance to many areas of condensed matter and theoretical physics. One of the few books on the subject, it emphasizes strongly correlated electronic systems. Although dealing with complex problems in statistical mechanics, it does not lose sight of the experiments and the actual physical systems which motivate the theoretical work. The book starts by presenting the scaling theory of quantum critical phenomena. Critical e

  14. An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images

    Directory of Open Access Journals (Sweden)

    Linju P.S

    2015-08-01

    Full Text Available Visual cryptography is a technique of cryptography in which secret images are divided into multiple shares and are distributed to different entities. Each secret can be reconstructed by superimposing these shares using different operations. Common traditional drawbacks of all existing methods are pixel expansion and noise at output. Another major issues that can occur in existing visual cryptography systems are Cheating between share holders and Share holders cheating owner. In order to overcome these limitations sealing algorithm is used with two applications of VC such as MIVC and EVC. Here two secret images can be send at the same time by converting them to halftone representations which in turn are partitioned as three shares in total.

  15. Two-out-of-two color matching based visual cryptography schemes.

    Science.gov (United States)

    Machizaud, Jacques; Fournel, Thierry

    2012-09-24

    Visual cryptography which consists in sharing a secret message between transparencies has been extended to color prints. In this paper, we propose a new visual cryptography scheme based on color matching. The stacked printed media reveal a uniformly colored message decoded by the human visual system. In contrast with the previous color visual cryptography schemes, the proposed one enables to share images without pixel expansion and to detect a forgery as the color of the message is kept secret. In order to correctly print the colors on the media and to increase the security of the scheme, we use spectral models developed for color reproduction describing printed colors from an optical point of view.

  16. On the Velocity of Moving Relativistic Unstable Quantum Systems

    Directory of Open Access Journals (Sweden)

    K. Urbanowski

    2015-01-01

    Full Text Available We study properties of moving relativistic quantum unstable systems. We show that in contrast to the properties of classical particles and quantum stable objects the velocity of freely moving relativistic quantum unstable systems cannot be constant in time. We show that this new quantum effect results from the fundamental principles of the quantum theory and physics: it is a consequence of the principle of conservation of energy and of the fact that the mass of the quantum unstable system is not defined. This effect can affect the form of the decay law of moving relativistic quantum unstable systems.

  17. Scattering theory for open quantum systems

    Energy Technology Data Exchange (ETDEWEB)

    Behrndt, Jussi [Technische Univ. Berlin (Germany). Inst. fuer Mathematik; Malamud, Mark M. [Donetsk National University (Ukraine). Dept. of Mathematics; Neidhardt, Hagen [Weierstrass-Institut fuer Angewandte Analysis und Stochastik (WIAS) im Forschungsverbund Berlin e.V. (Germany)

    2006-07-01

    Quantum systems which interact with their environment are often modeled by maximal dissipative operators or so-called Pseudo-Hamiltonians. In this paper the scattering theory for such open systems is considered. First it is assumed that a single maximal dissipative operator A{sub D} in a Hilbert space H is used to describe an open quantum system. In this case the minimal self-adjoint dilation K of A{sub D} can be regarded as the Hamiltonian of a closed system which contains the open system {l_brace}A{sub D},h{r_brace}, but since K is necessarily not semibounded from below, this model is difficult to interpret from a physical point of view. In the second part of the paper an open quantum system is modeled with a family {l_brace}A({mu}){r_brace} of maximal dissipative operators depending on energy {mu}, and it is shown that the open system can be embedded into a closed system where the Hamiltonian is semibounded. Surprisingly it turns out that the corresponding scattering matrix can be completely recovered from scattering matrices of single Pseudo-Hamiltonians as in the first part of the paper. The general results are applied to a class of Sturm-Liouville operators arising in dissipative and quantum transmitting Schroedinger-Poisson systems. (orig.)

  18. Statistical thermodynamics of polymer quantum systems

    CERN Document Server

    Chacón-Acosta, Guillermo; Dagdug, Leonardo; Morales-Técotl, Hugo A

    2011-01-01

    Polymer quantum systems are mechanical models quantized similarly as loop quantum gravity. It is actually in quantizing gravity that the polymer term holds proper as the quantum geometry excitations yield a reminiscent of a polymer material. In such an approach both non-singular cosmological models and a microscopic basis for the entropy of some black holes have arisen. Also important physical questions for these systems involve thermodynamics. With this motivation, in this work, we study the statistical thermodynamics of two one dimensional {\\em polymer} quantum systems: an ensemble of oscillators that describe a solid and a bunch of non-interacting particles in a box, which thus form an ideal gas. We first study the spectra of these polymer systems. It turns out useful for the analysis to consider the length scale required by the quantization and which we shall refer to as polymer length. The dynamics of the polymer oscillator can be given the form of that for the standard quantum pendulum. Depending on the...

  19. Heisenberg Picture Approach to the Stability of Quantum Markov Systems

    OpenAIRE

    Pan, Yu; Amini, Hadis; Miao, Zibo; Gough, John; Ugrinovskii, Valery; James, Matthew R.

    2014-01-01

    Quantum Markovian systems, modeled as unitary dilations in the quantum stochastic calculus of Hudson and Parthasarathy, have become standard in current quantum technological applications. This paper investigates the stability theory of such systems. Lyapunov-type conditions in the Heisenberg picture are derived in order to stabilize the evolution of system operators as well as the underlying dynamics of the quantum states. In particular, using the quantum Markov semigroup associated with this...

  20. On the velocity of moving relativistic unstable quantum systems

    CERN Document Server

    Urbanowski, K

    2015-01-01

    We study properties of moving relativistic quantum unstable systems. We show that in contrast to the properties of classical particles and quantum stable objects the velocity of moving freely relativistic quantum unstable systems can not be constant in time. We show that this effect results from the fundamental principles of the quantum theory and physics: It is a consequence of the principle of conservation of energy and of the fact that the mass of the quantum unstable system is not definite.

  1. The quantum human central neural system.

    Science.gov (United States)

    Alexiou, Athanasios; Rekkas, John

    2015-01-01

    In this chapter we present Excess Entropy Production for human aging system as the sum of their respective subsystems and electrophysiological status. Additionally, we support the hypothesis of human brain and central neural system quantumness and we strongly suggest the theoretical and philosophical status of human brain as one of the unknown natural Dirac magnetic monopoles placed in the center of a Riemann sphere.

  2. Quantum Aharonov-Bohm Billiard System

    CERN Document Server

    Chuu, D S; Chuu, Der-San; Lin, De-Hone

    1999-01-01

    The Green's functions of the two and three-dimensional relativistic Aharonov-Bohm (A-B) systems are given by the path integral approach. In addition the exact radial Green's functions of the spherical A-B quantum billiard system in two and three-dimensional are obtained via the perturbation techanique of $\\delta $-function.

  3. Effective operator formalism for open quantum systems

    DEFF Research Database (Denmark)

    Reiter, Florentin; Sørensen, Anders Søndberg

    2012-01-01

    We present an effective operator formalism for open quantum systems. Employing perturbation theory and adiabatic elimination of excited states for a weakly driven system, we derive an effective master equation which reduces the evolution to the ground-state dynamics. The effective evolution...

  4. Recent advances in quantum integrable systems

    Energy Technology Data Exchange (ETDEWEB)

    Amico, L.; Belavin, A.; Buffenoir, E.; Castro Alvaredo, A.; Caudrelier, V.; Chakrabarti, A.; Corrig, E.; Crampe, N.; Deguchi, T.; Dobrev, V.K.; Doikou, A.; Doyon, B.; Feher, L.; Fioravanti, D.; Gohmann, F.; Hallnas, M.; Jimbo, M.; Konno, N.C.H.; Korchemsky, G.; Kulish, P.; Lassalle, M.; Maillet, J.M.; McCoy, B.; Mintchev, M.; Pakuliak, S.; Quano, F.Y.Z.; Ragnisco, R.; Ravanini, F.; Rittenberg, V.; Rivasseau, V.; Rossi, M.; Satta, G.; Sedrakyan, T.; Shiraishi, J.; Suzuki, N.C.J.; Yamada, Y.; Zamolodchikov, A.; Ishimoto, Y.; Nagy, Z.; Posta, S.; Sedra, M.B.; Zuevskiy, A.; Gohmann, F

    2005-07-01

    This meeting was dedicated to different aspects of the theory of quantum integrable systems. The organizers have intended to concentrate on topics related to the study of correlation functions, to systems with boundaries and to models at roots of unity. This document gathers the abstracts of 32 contributions, most of the contributions are accompanied by the set of transparencies.

  5. Quantum Algorithm for the Toeplitz Systems

    CERN Document Server

    Wan, Lin-Chun; Pan, Shi-Jie; Gao, Fei; Wen, Qiao-Yan

    2016-01-01

    Solving the Toeplitz systems, which is to find the vector $x$ such that $T_nx = b$ given a $n\\times n$ Toeplitz matrix $T_n$ and a vector $b$, has a variety of applications in mathematics and engineering. In this paper, we present a quantum algorithm for solving the Toeplitz systems, in which a quantum state encoding the solution with error $\\epsilon$ is generated. It is shown that our algorithm's complexity is nearly linear in the condition number, and polylog in the dimensions $n$ and in the inverse error $\\epsilon^{-1}$. This implies our algorithm is exponentially faster than the best classical algorithm for the same problem if the condition number of $T_n$ is $O(\\textrm{poly}(\\textrm{log}\\,n))$. Since no assumption on the sparseness of $T_n$ is demanded in our algorithm, the algorithm can serve as an example of quantum algorithms for solving non-sparse linear systems.

  6. Adiabatic Theorem for Quantum Spin Systems

    Science.gov (United States)

    Bachmann, S.; De Roeck, W.; Fraas, M.

    2017-08-01

    The first proof of the quantum adiabatic theorem was given as early as 1928. Today, this theorem is increasingly applied in a many-body context, e.g., in quantum annealing and in studies of topological properties of matter. In this setup, the rate of variation ɛ of local terms is indeed small compared to the gap, but the rate of variation of the total, extensive Hamiltonian, is not. Therefore, applications to many-body systems are not covered by the proofs and arguments in the literature. In this Letter, we prove a version of the adiabatic theorem for gapped ground states of interacting quantum spin systems, under assumptions that remain valid in the thermodynamic limit. As an application, we give a mathematical proof of Kubo's linear response formula for a broad class of gapped interacting systems. We predict that the density of nonadiabatic excitations is exponentially small in the driving rate and the scaling of the exponent depends on the dimension.

  7. Heisenberg picture approach to the stability of quantum Markov systems

    Energy Technology Data Exchange (ETDEWEB)

    Pan, Yu, E-mail: yu.pan@anu.edu.au, E-mail: zibo.miao@anu.edu.au; Miao, Zibo, E-mail: yu.pan@anu.edu.au, E-mail: zibo.miao@anu.edu.au [Research School of Engineering, Australian National University, Canberra, ACT 0200 (Australia); Amini, Hadis, E-mail: nhamini@stanford.edu [Edward L. Ginzton Laboratory, Stanford University, Stanford, California 94305 (United States); Gough, John, E-mail: jug@aber.ac.uk [Institute of Mathematics and Physics, Aberystwyth University, SY23 3BZ Wales (United Kingdom); Ugrinovskii, Valery, E-mail: v.ugrinovskii@gmail.com [School of Engineering and Information Technology, University of New South Wales at ADFA, Canberra, ACT 2600 (Australia); James, Matthew R., E-mail: matthew.james@anu.edu.au [ARC Centre for Quantum Computation and Communication Technology, Research School of Engineering, Australian National University, Canberra, ACT 0200 (Australia)

    2014-06-15

    Quantum Markovian systems, modeled as unitary dilations in the quantum stochastic calculus of Hudson and Parthasarathy, have become standard in current quantum technological applications. This paper investigates the stability theory of such systems. Lyapunov-type conditions in the Heisenberg picture are derived in order to stabilize the evolution of system operators as well as the underlying dynamics of the quantum states. In particular, using the quantum Markov semigroup associated with this quantum stochastic differential equation, we derive sufficient conditions for the existence and stability of a unique and faithful invariant quantum state. Furthermore, this paper proves the quantum invariance principle, which extends the LaSalle invariance principle to quantum systems in the Heisenberg picture. These results are formulated in terms of algebraic constraints suitable for engineering quantum systems that are used in coherent feedback networks.

  8. Heisenberg picture approach to the stability of quantum Markov systems

    Science.gov (United States)

    Pan, Yu; Amini, Hadis; Miao, Zibo; Gough, John; Ugrinovskii, Valery; James, Matthew R.

    2014-06-01

    Quantum Markovian systems, modeled as unitary dilations in the quantum stochastic calculus of Hudson and Parthasarathy, have become standard in current quantum technological applications. This paper investigates the stability theory of such systems. Lyapunov-type conditions in the Heisenberg picture are derived in order to stabilize the evolution of system operators as well as the underlying dynamics of the quantum states. In particular, using the quantum Markov semigroup associated with this quantum stochastic differential equation, we derive sufficient conditions for the existence and stability of a unique and faithful invariant quantum state. Furthermore, this paper proves the quantum invariance principle, which extends the LaSalle invariance principle to quantum systems in the Heisenberg picture. These results are formulated in terms of algebraic constraints suitable for engineering quantum systems that are used in coherent feedback networks.

  9. Watermarking Scheme Based on Wavelet Transformation and Visual Cryptography

    Institute of Scientific and Technical Information of China (English)

    Young-Chang Hou; Shih-Chieh Wei; Hsin-Ju Liu; A-Yu Tseng

    2014-01-01

    Based on the principles of the visual cryptography and the law of large numbers, the unexpanded shares are generated during the processes of embedding and verifying the hidden watermark. The watermark embedding is done in the frequency domain, which can be decoded by the human visual system (HVS) without the necessity of any complicated computation and the help of the original image. Experimental results indicated that our method had a good robustness on darkening, lightening, blurring, sharpening, noise, distorting, jitter, joint photographic experts group (JPEG) compression, and crop attacks.

  10. Cyber Security for Smart Grid, Cryptography, and Privacy

    Directory of Open Access Journals (Sweden)

    Swapna Iyer

    2011-01-01

    Full Text Available The invention of “smart grid” promises to improve the efficiency and reliability of the power system. As smart grid is turning out to be one of the most promising technologies, its security concerns are becoming more crucial. The grid is susceptible to different types of attacks. This paper will focus on these threats and risks especially relating to cyber security. Cyber security is a vital topic, since the smart grid uses high level of computation like the IT. We will also see cryptography and key management techniques that are required to overcome these attacks. Privacy of consumers is another important security concern that this paper will deal with.

  11. Enhancing Information Security and Privacy by Combining Biometrics with Cryptography

    CERN Document Server

    Kanade, Sanjay

    2012-01-01

    This book deals with "crypto-biometrics", a relatively new and multi-disciplinary area of research (started in 1998). Combining biometrics and cryptography provides multiple advantages, such as, revocability, template diversity, better verification accuracy, and generation of cryptographically usable keys that are strongly linked to the user identity. In this text, a thorough review of the subject is provided and then some of the main categories are illustrated with recently proposed systems by the authors. Beginning with the basics, this text deals with various aspects of crypto-biometrics, i

  12. Relativistic quantum metrology in open system dynamics.

    Science.gov (United States)

    Tian, Zehua; Wang, Jieci; Fan, Heng; Jing, Jiliang

    2015-01-22

    Quantum metrology studies the ultimate limit of precision in estimating a physical quantity if quantum strategies are exploited. Here we investigate the evolution of a two-level atom as a detector which interacts with a massless scalar field using the master equation approach for open quantum system. We employ local quantum estimation theory to estimate the Unruh temperature when probed by a uniformly accelerated detector in the Minkowski vacuum. In particular, we evaluate the Fisher information (FI) for population measurement, maximize its value over all possible detector preparations and evolution times, and compare its behavior with that of the quantum Fisher information (QFI). We find that the optimal precision of estimation is achieved when the detector evolves for a long enough time. Furthermore, we find that in this case the FI for population measurement is independent of initial preparations of the detector and is exactly equal to the QFI, which means that population measurement is optimal. This result demonstrates that the achievement of the ultimate bound of precision imposed by quantum mechanics is possible. Finally, we note that the same configuration is also available to the maximum of the QFI itself.

  13. Time dilation in quantum systems and decoherence

    Science.gov (United States)

    Pikovski, Igor; Zych, Magdalena; Costa, Fabio; Brukner, Časlav

    2017-02-01

    Both quantum mechanics and general relativity are based on principles that defy our daily intuitions, such as time dilation, quantum interference and entanglement. Because the regimes where the two theories are typically tested are widely separated, their foundational principles are rarely jointly studied. Recent works have found that novel phenomena appear for quantum particles with an internal structure in the presence of time dilation, which can take place at low energies and in weak gravitational fields. Here we briefly review the effects of time dilation on quantum interference and generalize the results to a variety of systems. In addition, we provide an extended study of the basic principles of quantum theory and relativity that are of relevance for the effects and also address several questions that have been raised, such as the description in different reference frames, the role of the equivalence principle and the effective irreversibility of the decoherence. The manuscript clarifies some of the counterintuitive aspects arising when quantum phenomena and general relativistic effects are jointly considered.

  14. Network realization of triplet-type quantum stochastic systems

    Science.gov (United States)

    Zhou, Shaosheng; Fu, Shizhou; Chen, Yuping

    2017-01-01

    This paper focuses on a problem of network synthesis for a class of quantum stochastic systems. The systems under consideration are of triplet-type form and stem from linear quantum optics and linear quantum circuits. A new quantum network realization approach is proposed by generalizing the scattering operator from the scalar form to a unitary matrix in network components. It shows that the triplet-type quantum stochastic system can be approximated by a quantum network which consists of some one-degree-of-freedom generalized open-quantum harmonic oscillators (1DGQHOs) via series, concatenation and feedback connections.

  15. Manipulating atom and photon entanglement from 'thought experiments' to quantum information processing

    CERN Document Server

    CERN. Geneva. Audiovisual Unit

    2002-01-01

    Composite quantum systems cannot generally be analysed as a juxtaposition of separate entities, each described by its own wave function. They are described instead by a global entangled state. Entanglement appears thus as an essential concept, lying at the heart of quantum physics. At a fundamental level it is closely related to non-locality, quantum measurement, complementarity and decoherence, concepts that the founding fathers of quantum physics have analysed in various 'thought experiments'. At a more applied level, the engineering of entanglement in systems of increasing complexity could in principle open the way to various kinds of fascinating quantum information processing applications (quantum cryptography, teleportation, quantum computation). The study of entanglement has recently evolved as a very competitive field of research, both theoretical and experimental. In quantum optics, entanglement has been studied with twin-photon beams, trapped ions and with atoms and photons in cavities. After a gener...

  16. Constraint algebra for interacting quantum systems

    Science.gov (United States)

    Fubini, S.; Roncadelli, M.

    1988-04-01

    We consider relativistic constrained systems interacting with external fields. We provide physical arguments to support the idea that the quantum constraint algebra should be the same as in the free quantum case. For systems with ordering ambiguities this principle is essential to obtain a unique quantization. This is shown explicitly in the case of a relativistic spinning particle, where our assumption about the constraint algebra plus invariance under general coordinate transformations leads to a unique S-matrix. On leave from Dipartimento di Fisica Nucleare e Teorica, Università di Pavia and INFN, I-27100 Pavia, Italy.

  17. Storage of energy in confined quantum systems

    OpenAIRE

    Malbouisson, A. P. C.

    2002-01-01

    Using the non-perturbative method of {\\it dressed} states introduced in previous publications [N.P.Andion, A.P.C. Malbouisson and A. Mattos Neto, J.Phys.{\\bf A34}, 3735, (2001); G. Flores-Hidalgo, A.P.C. Malbouisson, Y.W. Milla, Phys. Rev. A, {\\bf 65}, 063314 (2002)], we study the evolution of a confined quantum mechanical system embedded in a {\\it ohmic} environment. Our approach furnishes a theoretical mechanism to control inhibition of the decay of excited quantum systems in cavities, in b...

  18. Quons in a Quantum Dissipative System

    CERN Document Server

    Lee, Taejin

    2015-01-01

    String theory proves to be an imperative tool to explore the critical behavior of the quantum dissipative system. We discuss the quantum particles moving in two dimensions, in the presence of a uniform magnetic field, subject to a periodic potential and a dissipative force, which are described by the dissipative Wannier-Azbel-Hofstadter (DWAH) model. Using string theory formulation of the model, we find that the elementary excitations of the system at the generic points of the off-critical regions, in the zero temperature limit are quons, which satisfy q-deformed statistics.

  19. Reversible part of a quantum dynamical system

    OpenAIRE

    2016-01-01

    In this work a quantum dynamical system $(\\mathfrak M,\\Phi, \\varphi)$ is constituted by a von Neumann algebra $\\mathfrak M$, by a unital Schwartz map $\\Phi:\\mathfrak{M\\rightarrow M}$ and by a $\\Phi$-invariant normal faithful state $\\varphi$ on $\\mathfrak M$. The ergodic properties of a quantum dynamical system, depends on its reversible part $(\\mathfrak{D}_\\infty,\\Phi_\\infty, \\varphi_\\infty)$. It is constituted by a von Neumann sub-algebra $\\mathfrak{D}_\\infty$ of $\\mathfrak M$ by an automorp...

  20. Teleportation in an indivisible quantum system

    Directory of Open Access Journals (Sweden)

    Kiktenko E.O.

    2016-01-01

    Full Text Available Teleportation protocol is conventionally treated as a method for quantum state transfer between two spatially separated physical carriers. Recent experimental progress in manipulation with high-dimensional quantum systems opens a new framework for implementation of teleportation protocols. We show that the one-qubit teleportation can be considered as a state transfer between subspaces of the whole Hilbert space of an indivisible eight-dimensional system. We explicitly show all corresponding operations and discuss an alternative way of implementation of similar tasks.

  1. Security, Privacy, and Applied Cryptography Engineering

    DEFF Research Database (Denmark)

    This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied Cryptography Engineering held in Chennai, India, in November 2012. The 11 papers presented were carefully reviewed and selected from 61 submissions. The papers are organized...

  2. Report on Pairing-based Cryptography.

    Science.gov (United States)

    Moody, Dustin; Peralta, Rene; Perlner, Ray; Regenscheid, Andrew; Roginsky, Allen; Chen, Lily

    2015-01-01

    This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST's position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standardized in other standard bodies. The report reviews the mathematical background of pairings. This includes topics such as pairing-friendly elliptic curves and how to compute various pairings. It includes a brief introduction to existing identity-based encryption (IBE) schemes and other cryptographic schemes using pairing technology. The report provides a complete study of the current status of standard activities on pairing-based cryptographic schemes. It explores different application scenarios for pairing-based cryptography schemes. As an important aspect of adopting pairing-based schemes, the report also considers the challenges inherent in validation testing of cryptographic algorithms and modules. Based on the study, the report suggests an approach for including pairing-based cryptography schemes in the NIST cryptographic toolkit. The report also outlines several questions that will require further study if this approach is followed.

  3. Harry Potter and the Cryptography with Matrices

    Science.gov (United States)

    Chua, Boon Liang

    2006-01-01

    This article describes Cryptography, defined as the science of encrypting and deciphering messages written in secret codes, it has played a vital role in securing information since ancient times. There are several cryptographic techniques and many make extensive use of mathematics to secure information. The author discusses an activity built…

  4. Bibliographic guide to the foundations of quantum mechanics and quantum information

    CERN Document Server

    Cabello, A

    2000-01-01

    This is a collection of references (papers, books, preprints, book reviews, Ph. D. thesis, patents, etc.), sorted alphabetically and (some of them) classified by subject, on foundations of quantum mechanics and quantum information. Specifically, it covers hidden variables (``no-go'' theorems, experiments), interpretations of quantum mechanics, entanglement, quantum effects (quantum Zeno effect, quantum erasure, ``interaction-free'' measurements, quantum ``non-demolition'' measurements), quantum information (cryptography, cloning, dense coding, teleportation), and quantum computation.

  5. Quantum Entropy and Its Applications to Quantum Communication and Statistical Physics

    Directory of Open Access Journals (Sweden)

    Masanori Ohya

    2010-05-01

    Full Text Available Quantum entropy is a fundamental concept for quantum information recently developed in various directions. We will review the mathematical aspects of quantum entropy (entropies and discuss some applications to quantum communication, statistical physics. All topics taken here are somehow related to the quantum entropy that the present authors have been studied. Many other fields recently developed in quantum information theory, such as quantum algorithm, quantum teleportation, quantum cryptography, etc., are totally discussed in the book (reference number 60.

  6. Nonequilibrium quantum dynamics in optomechanical systems

    Science.gov (United States)

    Patil, Yogesh Sharad; Cheung, Hil F. H.; Shaffer, Airlia; Wang, Ke; Vengalattore, Mukund

    2016-05-01

    The thermalization dynamics of isolated quantum systems has so far been explored in the context of cold atomic systems containing a large number of particles and modes. Quantum optomechanical systems offer prospects of studying such dynamics in a qualitatively different regime - with few individually addressable modes amenable to continuous quantum measurement and thermalization times that vastly exceed those observed in cold atomic systems. We have experimentally realized a dynamical continuous phase transition in a quantum compatible nondegenerate mechanical parametric oscillator. This system is formally equivalent to the optical parametric amplifiers whose dynamics have been a subject of intense theoretical study. We experimentally verify its phase diagram and observe nonequilibrium behavior that was only theorized, but never directly observed, in the context of optical parametric amplifiers. We discuss prospects of using nonequilibrium protocols such as quenches in optomechanical systems to amplify weak nonclassical correlations and to realize macroscopic nonclassical states. This work was supported by the DARPA QuASAR program through a Grant from the ARO and the ARO MURI on non-equilibrium manybody dynamics.

  7. Feshbach Projection Formalism for Open Quantum Systems

    Science.gov (United States)

    Chruściński, Dariusz; Kossakowski, Andrzej

    2013-08-01

    We provide a new approach to open quantum systems which is based on the Feshbach projection method. Instead of looking for a master equation for the dynamical map acting in the space of density operators we provide the corresponding equation for the evolution in the Hilbert space of the amplitude operators. Its solution enables one to construct a legitimate quantum evolution (completely positive and trace preserving). Our approach, contrary to the standard Nakajima-Zwanzig method, allows for a series of consistent approximations resulting in a legitimate quantum evolution. The new scheme is illustrated by the well-known spin-boson model beyond the rotating wave approximation. It is shown that the presence of counterrotating terms dramatically changes the asymptotic evolution of the system.

  8. Quantum frustrated and correlated electron systems

    Directory of Open Access Journals (Sweden)

    P Thalmeier

    2008-06-01

    Full Text Available  Quantum phases and fluctuations in correlated electron systems with frustration and competing interactions are reviewed. In the localized moment case the S=1/2 J1 - J2 - model on a square lattice exhibits a rich phase diagram with magnetic as well as exotic hidden order phases due to the interplay of frustration and quantum fluctuations. Their signature in magnetocaloric quantities and the high field magnetization are surveyed. The possible quantum phase transitions are discussed and applied to layered vanadium oxides. In itinerant electron systems frustration is an emergent property caused by electron correlations. It leads to enhanced spin fluctuations in a very large region of momentum space and therefore may cause heavy fermion type low temperature anomalies as in the 3d spinel compound LiV2O4 . Competing on-site and inter-site electronic interactions in Kondo compounds are responsible for the quantum phase transition between nonmagnetic Kondo singlet phase and magnetic phase such as observed in many 4f compounds. They may be described by Kondo lattice and simplified Kondo necklace type models. Their quantum phase transitions are investigated by numerical exact diagonalization and analytical bond operator methods respectively.

  9. Quantum emulation of quasiperiodic systems

    Science.gov (United States)

    Senaratne, Ruwan; Geiger, Zachary; Fujiwara, Kurt; Singh, Kevin; Rajagopal, Shankari; Weld, David

    2016-05-01

    Tunable quasiperiodic optical traps can enable quantum emulation of electronic phenomena in quasicrystals. A 1D bichromatic lattice or a Gaussian beam intersecting a 2D square lattice in a direct analogy of the ``cut-and-project'' construction can be used to create tunable 1D quasiperiodic potentials for cold neutral atoms. We report on progress towards the observation of singular continuous diffraction patterns, fractal energy spectra, and Bloch oscillations in these synthetic quasicrystals. We will also discuss the existence of edge states which can be topologically pumped across the lattice by varying a phasonic parameter. We acknowledge support from the ONR, the ARO and the PECASE and DURIP programs, the AFOSR, the Alfred P. Sloan foundation and the President's Research Catalyst Award from the University of California Office of the President.

  10. Lyapunov control of quantum systems with impulsive control fields.

    Science.gov (United States)

    Yang, Wei; Sun, Jitao

    2013-01-01

    We investigate the Lyapunov control of finite-dimensional quantum systems with impulsive control fields, where the studied quantum systems are governed by the Schrödinger equation. By three different Lyapunov functions and the invariant principle of impulsive systems, we study the convergence of quantum systems with impulsive control fields and propose new results for the mentioned quantum systems in the form of sufficient conditions. Two numerical simulations are presented to illustrate the effectiveness of the proposed control method.

  11. EDITORIAL: CAMOP: Quantum Non-Stationary Systems CAMOP: Quantum Non-Stationary Systems

    Science.gov (United States)

    Dodonov, Victor V.; Man'ko, Margarita A.

    2010-09-01

    Although time-dependent quantum systems have been studied since the very beginning of quantum mechanics, they continue to attract the attention of many researchers, and almost every decade new important discoveries or new fields of application are made. Among the impressive results or by-products of these studies, one should note the discovery of the path integral method in the 1940s, coherent and squeezed states in the 1960-70s, quantum tunneling in Josephson contacts and SQUIDs in the 1960s, the theory of time-dependent quantum invariants in the 1960-70s, different forms of quantum master equations in the 1960-70s, the Zeno effect in the 1970s, the concept of geometric phase in the 1980s, decoherence of macroscopic superpositions in the 1980s, quantum non-demolition measurements in the 1980s, dynamics of particles in quantum traps and cavity QED in the 1980-90s, and time-dependent processes in mesoscopic quantum devices in the 1990s. All these topics continue to be the subject of many publications. Now we are witnessing a new wave of interest in quantum non-stationary systems in different areas, from cosmology (the very first moments of the Universe) and quantum field theory (particle pair creation in ultra-strong fields) to elementary particle physics (neutrino oscillations). A rapid increase in the number of theoretical and experimental works on time-dependent phenomena is also observed in quantum optics, quantum information theory and condensed matter physics. Time-dependent tunneling and time-dependent transport in nano-structures are examples of such phenomena. Another emerging direction of study, stimulated by impressive progress in experimental techniques, is related to attempts to observe the quantum behavior of macroscopic objects, such as mirrors interacting with quantum fields in nano-resonators. Quantum effects manifest themselves in the dynamics of nano-electromechanical systems; they are dominant in the quite new and very promising field of circuit

  12. Topics on the stochastical treatement of an open quantum system

    CERN Document Server

    Sturzu, I

    2002-01-01

    The paper shortly presents the role of Stochastic Processes Theory in the present day Quantum Theory, and the relation to Operational Quantum Physics. The dynamics of an open quantum system is studied on a usual example from Quantum Optics, suggesting the definition of a Neumark-type dilation for the non-thermal states.

  13. Classical system boundaries cannot be determined within quantum Darwinism

    Science.gov (United States)

    Fields, Chris

    Multiple observers who interact with environmental encodings of the states of a macroscopic quantum system S as required by quantum Darwinism cannot demonstrate that they are jointly observing S without a joint a priori assumption of a classical boundary separating S from its environment E. Quantum Darwinism cannot, therefore, be regarded as providing a purely quantum-mechanical explanation of the "emergence" of classicality.

  14. Quantum dynamics of biological systems and dust plasma nanoparticles

    Science.gov (United States)

    Lasukov, V. V.; Lasukova, T. V.; Lasukova, O. V.

    2012-12-01

    A quantum solution of the Fisher-Kolmogorov-Petrovskii-Piskunov equation with convection and linear diffusion is obtained which can provide the basis for the quantum biology and quantum microphysics equation. On this basis, quantum emission of biological systems, separate microorganisms (cells or bacteria), and dust plasma particles is investigated.

  15. Discussions on Students’ Innovative Practice in Universities---Taking Study on Quantum Cryptography as an Example%高校中开展大学生创新实践活动的探讨--以北京邮电大学的量子密码研究为例

    Institute of Scientific and Technical Information of China (English)

    郭奋卓; 李慧娟; 高飞

    2016-01-01

    Based on the authors’ experience of guiding undergraduates’ innovative practice and observation of research activities of undergraduates in Princeton University, the roles of teachers and university in the innovative practice of undergraduate are analyzed, and some experience are given. Finally, three guidance suggestions are provided for the quantum cryptography research field. The above analysis, summary and suggestions are also helpful to the innovational education in other research fields.%结合作者指导本科生创新实践的经验和在美国普林斯顿大学访学期间对该校本科生科研活动的考察,分析了本科生创新实践过程中指导教师和学校的角色定位,并给出若干经验总结。以量子密码研究方向为例,对从事理论研究的创新实践给出了三点具体的指导性建议。上述分析总结以及相关的建议对于其他研究方向的创新实践也具有一定的指导意义。

  16. Quantum Entanglement in Optical Lattice Systems

    Science.gov (United States)

    2015-02-18

    SECURITY CLASSIFICATION OF: Optical lattice systems provide an ideal platform for investigating entanglement because of their unprecedented level of...ABSTRACT Final report for ARO grant entitled "Quantum Entanglement in Optical Lattice Systems" Report Title Optical lattice systems provide an ideal ...2010): 0. doi: 10.1103/PhysRevA.82.063612 D. Blume, K. Daily. Breakdown of Universality for Unequal-Mass Fermi Gases with Infinite Scattering Length

  17. Computational security of quantum encryption

    NARCIS (Netherlands)

    Alagic, G.; Broadbent, A.; Fefferman, B.; Gagliardoni, T.; Schaffner, C.; St. Jules, M.; Nascimento, A.C.A.; Barreto, P.

    2016-01-01

    Quantum-mechanical devices have the potential to transform cryptography. Most research in this area has focused either on the information-theoretic advantages of quantum protocols or on the security of classical cryptographic schemes against quantum attacks. In this work, we initiate the study of

  18. Quantum dissipation theory and applications to quantum transport and quantum measurement in mesoscopic systems

    Science.gov (United States)

    Cui, Ping

    The thesis comprises two major themes of quantum statistical dynamics. One is the development of quantum dissipation theory (QDT). It covers the establishment of some basic relations of quantum statistical dynamics, the construction of several nonequivalent complete second-order formulations, and the development of exact QDT. Another is related to the applications of quantum statistical dynamics to a variety of research fields. In particular, unconventional but novel theories of the electron transfer in Debye solvents, quantum transport, and quantum measurement are developed on the basis of QDT formulations. The thesis is organized as follows. In Chapter 1, we present some background knowledge in relation to the aforementioned two themes of this thesis. The key quantity in QDT is the reduced density operator rho(t) ≡ trBrho T(t); i.e., the partial trace of the total system and bath composite rhoT(t) over the bath degrees of freedom. QDT governs the evolution of reduced density operator, where the effects of bath are treated in a quantum statistical manner. In principle, the reduced density operator contains all dynamics information of interest. However, the conventional quantum transport theory is formulated in terms of nonequilibrium Green's function. The newly emerging field of quantum measurement in relation to quantum information and quantum computing does exploit a sort of QDT formalism. Besides the background of the relevant theoretical development, some representative experiments on molecular nanojunctions are also briefly discussed. In chapter 2, we outline some basic (including new) relations that highlight several important issues on QDT. The content includes the background of nonequilibrium quantum statistical mechanics, the general description of the total composite Hamiltonian with stochastic system-bath interaction, a novel parameterization scheme for bath correlation functions, a newly developed exact theory of driven Brownian oscillator (DBO

  19. System and method for making quantum dots

    KAUST Repository

    Bakr, Osman M.

    2015-05-28

    Embodiments of the present disclosure provide for methods of making quantum dots (QDs) (passivated or unpassivated) using a continuous flow process, systems for making QDs using a continuous flow process, and the like. In one or more embodiments, the QDs produced using embodiments of the present disclosure can be used in solar photovoltaic cells, bio-imaging, IR emitters, or LEDs.

  20. Quantum Phase Transitions in a Finite System

    CERN Document Server

    Leviatan, A

    2006-01-01

    A general procedure for studying finite-N effects in quantum phase transitions of finite systems is presented and applied to the critical-point dynamics of nuclei undergoing a shape-phase transition of second-order (continuous), and of first-order with an arbitrary barrier.