Skip to main content

Evolutionary Algorithms for the Design of Quantum Protocols

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 11454))

Abstract

In this paper, we use evolutionary algorithm to evolve customized quantum key distribution (QKD) protocols designed to counter attacks against the system in order to optimize the speed of the secure communication. This is in contrast to most work in QKD protocols, where a fixed protocol is designed and then its security is analyzed to determine how strong an attack it can withstand. We show that our system is able to find protocols that can operate securely against attacks where ordinary QKD protocols would fail. Our algorithm evolves protocols as quantum circuits, thus making the end result potentially easier to implement in practice.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Dušek, M., Lütkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301–1350 (2009)

    Article  Google Scholar 

  2. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, New York, vol. 175 (1984)

    Google Scholar 

  3. Renner, R., Gisin, N., Kraus, B.: Information-theoretic security proof for quantum-key-distribution protocols. Phys. Rev. A 72 (2005). https://doi.org/10.1103/PhysRevA.72.012332

  4. Spector, L.: Automatic Quantum Computer Programming: A Genetic Programming Approach. Kluwer Academic Publishers, Boston (2004)

    MATH  Google Scholar 

  5. Wang, X., Jiao, L., Li, Y., Qi, Y., Wu, J.: A variable-length chromosome evolutionary algorithm for reversible circuit synthesis. J. Multiple Valued Log. Soft Comput. 25(6), 643–671 (2015)

    MathSciNet  Google Scholar 

  6. Abubakar, M.Y., Jung, L.T., Zakaria, N., Younes, A., Abdel-Aty, A.-H.: Reversible circuit synthesis by genetic programming using dynamic gate libraries. Quantum Inf. Process. 16(6), 160 (2017)

    Article  MathSciNet  Google Scholar 

  7. Rylander, B., Soule, T., Foster, J., Alves-Foss, J.: Quantum evolutionary programming. In: Proceedings of the 3rd Annual Conference on Genetic and Evolutionary Computation, pp. 1005–1011. Morgan Kaufmann Publishers Inc. (2001)

    Google Scholar 

  8. Picek, S., Golub, M.: On evolutionary computation methods in cryptography. In: Proceedings of the 34th International Convention MIPRO, pp. 1496–1501. IEEE (2011)

    Google Scholar 

  9. Picek, S., Mariot, L., Leporati, A., Jakobovic, D.: Evolving s-boxes based on cellular automata with genetic programming. In: Proceedings of the Genetic and Evolutionary Computation Conference Companion, pp. 251–252. ACM (2017)

    Google Scholar 

  10. Krawec, W.O.: A genetic algorithm to analyze the security of quantum cryptographic protocols. In: IEEE Congress on Evolutionary Computation (CEC), pp. 2098–2105. IEEE (2016)

    Google Scholar 

  11. Krawec, W.O., Nelson, M.G., Geiss, E.P.: Automatic generation of optimal quantum key distribution protocols. In: Proceedings of the Genetic and Evolutionary Computation Conference, pp. 1153–1160. ACM (2017)

    Google Scholar 

  12. Rubinstein, B.I.P.: Evolving quantum circuits using genetic programming. In: Proceedings of the Congress on Evolutionary Computation, pp. 144–151. IEEE (2001)

    Google Scholar 

  13. Spector, L., Klein, J.: Machine invention of quantum computing circuits by means of genetic programming. AI EDAM 22(3), 275–283 (2008)

    Google Scholar 

  14. Bae, J., Acín, A.: Key distillation from quantum channels using two-way communication protocols. Phys. Rev. A 75(1), 012334 (2007)

    Article  Google Scholar 

  15. Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)

    MATH  Google Scholar 

  16. Christandl, M., Konig, R., Renner, R.: Postselection technique for quantum channels with applications to quantum cryptography. Phys. Rev. Lett. 102 (2009). https://doi.org/10.1103/PhysRevLett.102.020504

  17. Devetak, I., Winter, A.: Distillation of secret key and entanglement from quantum states. Proc. R. Soc. A Math. Phys. Eng. Sci. 461(2053), 207–235 (2005)

    Article  MathSciNet  Google Scholar 

  18. Krawec, W.O.: Quantum key distribution with mismatched measurements over arbitrary channels. Quantum Inf. Comput. 17(3), 209–241 (2017)

    MathSciNet  Google Scholar 

  19. Bäck, T., Fogel, D.B., Michalewicz, Z. (eds.): Evolutionary Computation 1: Basic Algorithms and Operators. Institute of Physics Publishing, Bristol (2000)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Domagoj Jakobovic .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Krawec, W., Picek, S., Jakobovic, D. (2019). Evolutionary Algorithms for the Design of Quantum Protocols. In: Kaufmann, P., Castillo, P. (eds) Applications of Evolutionary Computation. EvoApplications 2019. Lecture Notes in Computer Science(), vol 11454. Springer, Cham. https://doi.org/10.1007/978-3-030-16692-2_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-16692-2_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-16691-5

  • Online ISBN: 978-3-030-16692-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics