We propose quantum cryptography based on an algorithm of determining a function using qudit systems. The security of our cryptography is based on the Ekert 1991 protocol, that is, we use an entangled state. An eavesdropper must destroy the entangled state. Consider one of many functions. Alice selects a secret function. Bob’s aim is of determining the selected function (a key) without the eavesdropper knows it. To select the same function, in classical case, at the worst case, Bob needs many queries to Alice. In quantum case, Bob needs just a query. By measuring the single entangled state, which is sent by Alice, Bob can obtain the selected function. This is faster than classical cryptography.
This is a preview of subscription content, log in to check access.
Buy single article
Instant access to the full article PDF.
Price includes VAT for USA
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
This is the net price. Taxes to be calculated in checkout.
Nagata, K., Nakamura, T.: Open Access Library J. 2, e1798 (2015)
Nagata, K., Nakamura, T.: Int. J. Theor. Phys. 56, 2086 (2017)
Nagata, K., Nakamura, T., Farouk, A.: Int. J. Theor. Phys. 56, 2887 (2017)
Nguyen, D.M., Kim, S.: Int. J. Theor. Phys. 58, 71 (2019)
Nguyen, D.M., Kim, S.: Int. J. Theor. Phys. 58, 2043 (2019)
Diep, D.N., Giang, D.H.: Int. J. Theor. Phys. 56, 2797 (2017)
Ekert, A.K.: Phys. Rev. Lett. 67, 661 (1991)
We thank Professor Shahrokh Heidari and Professor Germano Resconi for valuable comments.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Note added in proof
On behalf of all authors, the corresponding author states that there is no conflict of interest.
About this article
Cite this article
Nagata, K., Diep, D.N. & Nakamura, T. Quantum Cryptography Based on an Algorithm for Determining a Function Using Qudit Systems. Int J Theor Phys 59, 2875–2879 (2020). https://doi.org/10.1007/s10773-020-04547-5
- Quantum cryptography and communication security
- Quantum communication
- Quantum algorithms
- Quantum computation