Skip to main content
Log in

Quantum computation and cryptography: an overview

  • Published:
Natural Computing Aims and scope Submit manuscript

Abstract

The new Quantum Information Theory augurs powerful machines that obey the “entangled” logic of the subatomic world. Parallelism, entanglement, teleportation, no-cloning and quantum cryptography are typical peculiarities of this novel way of understanding computation. In this article, we highlight and explain these fundamental ingredients that make Quantum Computing potentially powerful and Quantum Communications reliable.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  • Aspect A, Grangier P, Roger G (1981) Experimental tests of realistic local theories via Bell’s theorem. Phys Rev Lett 47:460–463

    Article  Google Scholar 

  • Bell JS (1966) On the problem of hidden variables in quantum mechanics. Rev Mod Phys 38:447–452

    Article  MATH  Google Scholar 

  • Bennett CH, Brassard G (1984) Quantum cryptography: public-key distribution and coin tossing. In: Proceedings IEEE international conference on computers, systems and signal processing, Bangalore, India, (IEEE, New York), pp 175–179

  • Bennett CH, Brassard G, Crepeau C, Jozsa R, Peres A, Wootters WK (1993) Teleporting an unknown quantum state via dual classical and EPR channels. Phys Rev Lett 70:1895–1899

    Article  MATH  MathSciNet  Google Scholar 

  • Bouwmeester D, Pan JW, Mattle K, Eibl M, Weinfurter H, Zeilinger A (1997) Experimental quantum teleportation. Nature 390:575–579

    Article  Google Scholar 

  • Calixto M (2004) On the hidden subgroup problem and efficient quantum algorithms. In: Alvarez-Estrada RF, Dobado A, Fernández LA, Martín-Delgado MA, Munoz Sudupe A (eds) Fundamental physics workshop in honor to A. Galindo, Aula Documental de Investigación, Madrid

  • Cirac JI, Zoller P (1995) Quantum computation with cold trapped ions. Phys Rev Lett 74:4091–4094

    Article  Google Scholar 

  • Deutsch D (1985) Quantum theory, the Church-Turing hypothesis and universal quantum computers. Proc Roy Soc Lond A400:97–116

    Article  MATH  MathSciNet  Google Scholar 

  • Doyle AC, Hodgson JA (1994) Sherlock Holmes. Basingstoke, Macmillan

    Google Scholar 

  • Einstein A, Podolsky B, Rosen N (1935) Can quantum-mechanical description of physical reality be considered complete? Phys Rev 47:777–780

    Article  MATH  Google Scholar 

  • Ekert A (1991) Quantum cryptography based on Bell’s theorem. Phys Rev Lett 67:661–663

    Article  MATH  MathSciNet  Google Scholar 

  • Feynman RP (1982) Simulating physics with computers. Int J Theor Phys 21:467–488

    Article  MathSciNet  Google Scholar 

  • Grover LK (1997) Quantum mechanics helps in searching for needle in a haystack. Phys Rev Lett 79:325–328

    Article  Google Scholar 

  • Hirvensalo M (2001) Quantum computing, natural computing series. Springer-Verlag, New York

  • Menezes A, van Oorschot P, Vanstone S (1997) Handbook of applied cryptography. CRC Press, Baco Raton

  • Nielsen MA, Chuang IL (2000) Quantum computation and quantum information. Cambridge University Press, Cambridge

  • Preskill J (1998) Quantum computation. Lecture notes for physics 229

  • Schumacher B (1995) Quantum coding. Phys Rev A51:2738; Schumacher B, Nielsen MA (1996) Quantum data processing and error correction. Phys Rev A54:2629

    Google Scholar 

  • Scientific American, special edition Solid state century (December 1997)

  • Shor PW (1994) Algorithms for quantum computation: discrete logarithms and factoring, 35th Annual Symposium of Foundations of Computer Science, pp 124–134

  • Williams CP, Clearwater SH (1997) Explorations in quantum computing. Springer-Verlag, New York

Download references

Acknowledgements

Work partially supported by the spanish MCYT and Fundación Séneca under projects FIS2005-05736-C03-01 and 03100/PI/05.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manuel Calixto.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Calixto, M. Quantum computation and cryptography: an overview. Nat Comput 8, 663–679 (2009). https://doi.org/10.1007/s11047-008-9094-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11047-008-9094-8

Keywords

Navigation