Quantum Cryptography Based on the Deutsch-Jozsa Algorithm

Cited 39 time in webofscience Cited 0 time in scopus
  • Hit : 195
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorNagata, Kojiko
dc.contributor.authorNakamura, Tadaoko
dc.contributor.authorFarouk, Ahmedko
dc.date.accessioned2017-09-08T05:22:01Z-
dc.date.available2017-09-08T05:22:01Z-
dc.date.created2017-08-28-
dc.date.created2017-08-28-
dc.date.issued2017-09-
dc.identifier.citationINTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, v.56, no.9, pp.2887 - 2897-
dc.identifier.issn0020-7748-
dc.identifier.urihttp://hdl.handle.net/10203/225655-
dc.description.abstractRecently, secure quantum key distribution based on Deutsch's algorithm using the Bell state is reported (Nagata and Nakamura, Int. J. Theor. Phys. doi:10.1007/s10773-017-3352-4, 2017). Our aim is of extending the result to a multipartite system. In this paper, we propose a highly speedy key distribution protocol. We present sequre quantum key distribution based on a special Deutsch-Jozsa algorithm using Greenberger-Horne-Zeilinger states. Bob has promised to use a function f which is of one of two kinds; either the value of f(x) is constant for all values of x, or else the value of f(x) is balanced, that is, equal to 1 for exactly half of the possible x, and 0 for the other half. Here, we introduce an additional condition to the function when it is balanced. Our quantum key distribution overcomes a classical counterpart by a factor O(2 (N) ).-
dc.languageEnglish-
dc.publisherSPRINGER/PLENUM PUBLISHERS-
dc.subjectREALISTIC LEGGETT MODELS-
dc.subjectBEFORE-BEFORE EXPERIMENT-
dc.subjectBELL THEOREM-
dc.subjectCOMPUTER-
dc.subjectIMPLEMENTATION-
dc.subjectCOMPUTATION-
dc.titleQuantum Cryptography Based on the Deutsch-Jozsa Algorithm-
dc.typeArticle-
dc.identifier.wosid000407374900022-
dc.identifier.scopusid2-s2.0-85021096633-
dc.type.rimsART-
dc.citation.volume56-
dc.citation.issue9-
dc.citation.beginningpage2887-
dc.citation.endingpage2897-
dc.citation.publicationnameINTERNATIONAL JOURNAL OF THEORETICAL PHYSICS-
dc.identifier.doi10.1007/s10773-017-3456-x-
dc.contributor.nonIdAuthorNakamura, Tadao-
dc.contributor.nonIdAuthorFarouk, Ahmed-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorQuantum computation architectures and implementations-
dc.subject.keywordAuthorQuantum algorithms, protocols, and simulations-
dc.subject.keywordAuthorQuantum cryptography-
dc.subject.keywordPlusREALISTIC LEGGETT MODELS-
dc.subject.keywordPlusBEFORE-BEFORE EXPERIMENT-
dc.subject.keywordPlusBELL THEOREM-
dc.subject.keywordPlusCOMPUTER-
dc.subject.keywordPlusIMPLEMENTATION-
dc.subject.keywordPlusCOMPUTATION-
Appears in Collection
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 39 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0