Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Quantum entanglement and non-locality based secure computation for future communication

Quantum entanglement and non-locality based secure computation for future communication

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Traditionally, the authors could establish secure computation protocols using variants of public key cryptology whose security is based on hard mathematics problems. However, classical protocols will become insecure owing to the emergence of quantum algorithms like Shors. In this paper, the authors demonstrate that nanoscale phenomenon can be applied not only in device level but also in high layer applications, such as secure computation. The authors study the possibility of performing secure computation by building non-local machines based on quantum entanglement and non-locality, which are phenomena available only at the nanometre scale. Comparing with classical secure computation algorithms, the security of this protocol is based on physical laws, instead of any unproven mathematic conjecture.

References

    1. 1)
      • Chou, Y.-H., Tsai, I.-M., Kuo, S.-Y.: `Quantum entanglement and its applications on secure computation', Proc. Sixth IEEE Conf. on Nanotechnology, 2006, Cincinnati, Ohio, p. 878–881.
    2. 2)
    3. 3)
      • Goldreich, O., Micali, S., Wigderson, A.: `How to play any mental game', Proc. 19th Annual ACM Conf. on Theory of Computing, 1987, New York, p. 218–229.
    4. 4)
    5. 5)
      • Wolf, S.: `Reducing oblivious string transfer to universal oblivious transfer', Proc. Int. Symp. on Information Theory, 2000, Sorrento, Italy, p. 465.
    6. 6)
      • B. Schneier . (1996) Applied cryptography: protocols, algorithms, and source code in C.
    7. 7)
      • Gertner, Y., Kannan, S., Malkin, T., Reingold, O., Viswanathan, M.: `The relationship between public key encryption and oblivious transfer', Proc. 41st Annual Symp. on Foundations of Computer Science, 2000, p. 325–335.
    8. 8)
    9. 9)
      • H.-C. Shih , K.-C. Lee , T. Hwang . New efficient three-party quantum key distribution protocols. IEEE J. Sel. Top. Quantum Electron. , 6 , 1602 - 1606
    10. 10)
      • P.-H. Huang . A mathematic application on secure electronic transaction: elliptic curve cryptography. J. Internet Technol. , 1 , 87 - 99
    11. 11)
      • Shor, P.: `Algorithms for quantum computation: discrete logarithms and factoring', Proc. 35th Annual Symp. on Foundations of Computer Science, 1994, p. 124–134.
    12. 12)
    13. 13)
    14. 14)
      • D. Bruss , G. Erdelyi , T. Meyer , T. Riege , J. Rothe . Quantum cryptography: a survey. ACM Comput. Surv. , 2
    15. 15)
      • Chou, Y.-H., Tsai, I.-M., Ko, C.-M., Kuo, S.-Y., Chen, I.-Y.: `Quantum oblivious transfer and fair digital transactions', Proc. 12th IEEE Int. Symp. on Pacific Rim Dependable Computing, Riverside, CA, 2006, p. 121–128.
    16. 16)
      • Chou, Y.-H., Tsai, I.-M., Fahn, C.-S., Horng, S.-J., Kuo, S.-Y.: `Quantum entanglement, non-locality and secure computation', Proc. First Int. Conf. on Quantum, Nano, and Micro Technologies, 2007, Guadeloupe City, p. 15.
    17. 17)
      • Popescu, S., Rohrlich, D.: `Open questions and possible solutions', Proc. Causality and Locality in Modern Physics and Astronomy, a Symp. to Honor Jean-Pierre Vigier, 1997, Toronto, Canada.
    18. 18)
    19. 19)
      • Mayers, D., Salvail, L.: `Quantum oblivious transfer is secure against all individual measurements', Proc. Workshop on Physics and Computation, 1994, p. 69–77.
    20. 20)
      • Yao, A.: `Protocols for secure computations', Proc. 23rd IEEE Symp. on Foundations of Computer Science, 1982, Chicago, IL, p. 160–164.
    21. 21)
      • Rabin, M.: `How to exchange secrets by oblivious transfer', Technical Memo TR-81, 1981.
    22. 22)
      • Bennett, C., Brassard, G.: `Quantum cryptography: publickey distribution and coin tossing', Proc. IEEE Int. Conf. Computers, Systems and Signal Processing, 1984, Bangalore, India, p. 175–179.
    23. 23)
    24. 24)
    25. 25)
      • Wolf, S., Wullschleger, J.: `Oblivious transfer and quantum non-locality', Proc. Int. Symp. on Information Theory, 2005, p. 1745–1748.
    26. 26)
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2009.0143
Loading

Related content

content/journals/10.1049/iet-ifs.2009.0143
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address