Abstract
The security of the RSA cryptosystems is based on the difficulty of factoring a large composite integer. In 1994, Shor showed that factoring a large composite is executable in polynomial time if we use a quantum Turing machine. Since this algorithm is complicated, straightforward implementations seem impractical judging from current technologies. In this paper, we propose simple and efficient algorithms for factoring and discrete logarithm problem based on NMR quantum computers. Our algorithms are easier to implement if we consider NMR quantum computers with small qubits.
Similar content being viewed by others
References
Deutsch, D., “Quantum Theory, the Church-turing Principle and the Universal Quantum Computer,” inProc. of R. Soc. Lond., pp. 97–117, 1985.
Kunihiro, N. and Koyama, K., “Equivalent of Counting the Number of Points on Elliptic Curve over the RingZ n and Factoringn,” inProc. of Eurocrypt’98, LNCS 1403, Springer-Verlag, pp. 47–58, 1998.
Miller, G. L., “Riemann’s Hypothesis and Test for Primality,”Journal of Computer and System Sciences, 13, pp. 300–317, 1976.
Nishino, T., Shibata, H., Atsumi, K. and Shima, T., “Solving Function Problems and NP-complete Problems by NMR Quantum Computation,” inTechnical Report of IEICE, COMP, 98-71, 1998.
Nishino, T., “Mathematical Models of Quantum Computation,”New Generation Computing, 20, 4, pp. 317–337, 2002.
Rivest, R. L., Shamir, A. and Adleman, L., “A Method for Obtaining Digital Signature and Public Key Cryptosystems,”Comm. of ACM, 21, 2, pp. 120–126, 1978.
Shor, P. W., “Algorithms for Quantum Computation: Discrete Log and Factoring,” inProc. of the 35th FOCS, pp. 124–134, 1994.
Vandersypen, L. M. K., Steffen, M., Breyta, G., Yannoi, C. S., Sherwood, M. H. and Chuang, I. L., “Experimental Realization of Shor’s Quantum Factoring Algorithm Using Nuclear Magnetic Resonance,”Nature, 414, pp. 883–887, 2001.
Author information
Authors and Affiliations
Corresponding author
Additional information
A part of this work was done while both authors were with NTT Communication Science Laboratories.
Noboru Kunihiro, Ph.D.: He is Assistant Professor of the University of Electro-Communications. He received his B.E., M.E. and Ph.D. in mathematical engineering and information physics from the University of Tokyo in 1994, 1996 and 2001, respectively. He had been engaged in the research on cryptography and information security at NTT Communication Science Laboratories from 1996 to 2002. Since 2002, he has been working for Department of Information and Communication Engineering of the University of Elector-Communications. His research interest includes cryptography, information security and quantum computations. He was awarded the SCIS’97 paper prize.
Shigeru Yamashita, Ph.D.: Associate Professor of Graduate School of Information Science, Nara Institute of Science and Technology, Nara 630-0192, Japan. He received his B.E., M.E. and Ph.D. degrees in information science from Kyoto University, Kyoto, Japan, in 1993, 1995 and 2001, respectively. His research interests include new type of computer architectures and quantum computation. He received the 2000 IEEE Circuits and Systems Society Transactions on Computer-Aided Design of Integrated Circuits and Systems Best Paper Award.
About this article
Cite this article
Kunihiro, N., Yamashita, S. Efficient algorithms for NMR quantum computers with small qubits. New Gener Comput 21, 329–337 (2003). https://doi.org/10.1007/BF03037307
Received:
Revised:
Issue Date:
DOI: https://doi.org/10.1007/BF03037307