International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 87    Submit Your Rating     Cite This   Download        Certificate

QUANTUM CRYPTOGRAPHY: QUANTUM KEY DISTRIBUTION AND COIN FLIPPING

    1 Author(s):  NEETU RANI

Vol -  8, Issue- 9 ,         Page(s) : 189 - 198  (2017 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

Based on Heisnberg’s uncertaintity principle, when a polarised electron is thrown and at the instant at which the position of the electron is known, its momentum therefore can be known only up to magnitudes which correspond to that discontinuous change; thus, the more precisely the position is determined, the less precisely the momentum is known, and conversely”[3] (Heisenberg, 1927: 174–5). This simply means that observation of quanta changes its behavior. By measuring the velocity of quanta we would affect it, and thereby change its position; if we want to find a quant's position, we are forced to change its velocity. Therefore, we cannot measure a quantum system's characteristics without changing it[4] (Clark, n.d.) and we cannot record all characteristics of a quantum system before those characteristics are measured.

  1. [AGR] A. Aspect, P. Grangier, and G. Roger, ‘Experimental Realization of the Einstein–Podolsky–Rosen–Bohm Gedankenexperiment: a New Violation of Bell’s Inequalities’, Phys. Rev. Lett. 49, 91–94 (1982).
  2. [BBBW] C.H. Bennett, G. Brassard, S. Breidbart, and S. Wiesner, ‘Quantum Cryptography, or Unforgeable Subway Tokens’, to appear in Advances in Cryptography: Proceedings of CRYPTOB2, Plenum Press.
  3. [These CRYPTO82 Proceedings were published in 1983 and this paper was on pages 267–275.]
  4. [Bl] Manuel Blum, ‘Coin Flipping by Telephone — a Protocol for Solving Impossible Problems’, SIGACT News 15:1, 23–27 (1983).
  5. [Bo] David Bohm, Quantum Theory (Prentice-Hall, Englewood Cliffs, NJ,1951), pp. 614–619.
  6. [CG]Charles H. Bennett a, Gilles Brassard ,’Quantum Computing: public key distribution and coin tossing’.
  7. [WC] M. Wegman and L. Carter, ‘New Hash Functions and Their Use in Authentication and Set Equality’, J. Comp. Sys. Sci. 22, 265–279 (1981).
  8. [W]Stephen Wiesner, ‘Conjugate Coding’ (manuscript ca 1970); subsequently published in SIGACT News 15:1, 78–88 (1983).
  9. [WZ] W.K. Wootters and W.H. Zurek, ‘A Single Quantum Cannot be Cloned’, Nature 299, 802–803 (1982).
  10. Quantum cryptography

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details