KEY DISTRIBUTION BASED ON QUANTUM FOURIER TRANSFORM

Marius Nagy, Selim G. Akl, Sean Kershaw

Abstract

The data dependencies brought about by the Quantum Fourier Transform can be harnessed to design novel key distribution protocols with improved performance. Such a protocol maximizes an eavesdropper’s uncertainty over the information transmitted, while amplifying the disturbance caused by the act of eavesdropping, thus offering better chances of detecting the intrusion. This is due to the fact that a tested qubit may reveal the presence of an eavesdropper even if that particular qubit was not ”touched” while in transit.

References

  1. Bennett, C. H. and Brassard, G. (1984). Quantum cryptography: Public key distribution and coin tossing. In Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pages 175-179, IEEE, New York. Bangalore, India, December 1984.
  2. Blinov, B. B., Moehring, D. L., Duan, L.-M., and Monroe, C. (2004). Observation of entanglement between a single trapped atom and a single photon. Nature, 428:153-157.
  3. Cirac, I., Zoller, P., Kimble, H. J., and Mabuchi, H. (1997). Quantum state transfer and entanglement distribution among distant nodes in a quantum network. Physical Review Letters, 78(16):3221-3224.
  4. Nagy, M. and Akl, S. G. (2006). Coping with Decoherence: Parallelizing the Quantum Fourier Transform. In 19th International Conference on Parallel and Distributed Computing Systems, pages 108-113, San Francisco, California.
  5. Shor, P. W. (1997). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. Special issue on Quantum Computation of the SIAM Journal on Computing, 26(5):1484-1509.
Download


Paper Citation


in Harvard Style

Nagy M., G. Akl S. and Kershaw S. (2008). KEY DISTRIBUTION BASED ON QUANTUM FOURIER TRANSFORM . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 263-269. DOI: 10.5220/0001916802630269


in Bibtex Style

@conference{secrypt08,
author={Marius Nagy and Selim G. Akl and Sean Kershaw},
title={KEY DISTRIBUTION BASED ON QUANTUM FOURIER TRANSFORM},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={263-269},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001916802630269},
isbn={978-989-8111-59-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - KEY DISTRIBUTION BASED ON QUANTUM FOURIER TRANSFORM
SN - 978-989-8111-59-3
AU - Nagy M.
AU - G. Akl S.
AU - Kershaw S.
PY - 2008
SP - 263
EP - 269
DO - 10.5220/0001916802630269