Topological quantum computation provides efficiency with fault-tolerant and error-correction to overcome decoherence
problem. Here we investigate a class of topological quantum computation device. We discuss a method
of constructing topological quantum scheme based on quantum walk for the state space.
Based on the law of quantum mechanics we present a simple authorization scheme:
Quauth. The description of the scheme is given in details. The authorization is
accomplished through a quantum channel by one way communication. We show that
eavesdropper gets no information about key no matter how many times s/he is listening
on the channel. The scheme is robust against both the passive and active attacks. By
induction we prove that the scheme is information theoretically secure.
If an eavesdropper Eve is equipped with quantum computers, she can easily break the public key exchange protocols used today. In this paper we will discuss the post-quantum Diffie-Hellman key exchange and private key exchange protocols.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.