Unknown

Dataset Information

0

An Approach to Cryptography Based on Continuous-Variable Quantum Neural Network.


ABSTRACT: An efficient cryptography scheme is proposed based on continuous-variable quantum neural network (CV-QNN), in which a specified CV-QNN model is introduced for designing the quantum cryptography algorithm. It indicates an approach to design a quantum neural cryptosystem which contains the processes of key generation, encryption and decryption. Security analysis demonstrates that our scheme is security. Several simulation experiments are performed on the Strawberry Fields platform for processing the classical data "Quantum Cryptography" with CV-QNN to describe the feasibility of our method. Three sets of representative experiments are presented and the second experimental results confirm that our scheme can correctly and effectively encrypt and decrypt data with the optimal learning rate 8e?-?2 regardless of classical or quantum data, and better performance can be achieved with the method of learning rate adaption (where increase factor R1?=?2, decrease factor R2?=?0.8). Indeed, the scheme with learning rate adaption can shorten the encryption and decryption time according to the simulation results presented in Figure 12. It can be considered as a valid quantum cryptography scheme and has a potential application on quantum devices.

SUBMITTER: Shi J 

PROVIDER: S-EPMC7005808 | biostudies-literature | 2020 Feb

REPOSITORIES: biostudies-literature

altmetric image

Publications

An Approach to Cryptography Based on Continuous-Variable Quantum Neural Network.

Shi Jinjing J   Chen Shuhui S   Lu Yuhu Y   Feng Yanyan Y   Shi Ronghua R   Yang Yuguang Y   Li Jian J  

Scientific reports 20200207 1


An efficient cryptography scheme is proposed based on continuous-variable quantum neural network (CV-QNN), in which a specified CV-QNN model is introduced for designing the quantum cryptography algorithm. It indicates an approach to design a quantum neural cryptosystem which contains the processes of key generation, encryption and decryption. Security analysis demonstrates that our scheme is security. Several simulation experiments are performed on the Strawberry Fields platform for processing t  ...[more]

Similar Datasets

| S-EPMC6711976 | biostudies-literature
| S-EPMC8376093 | biostudies-literature
| S-EPMC4223666 | biostudies-literature
| S-EPMC4209449 | biostudies-other
| S-EPMC5171809 | biostudies-literature
| S-EPMC4620507 | biostudies-literature
| S-EPMC3274703 | biostudies-literature
| S-EPMC4785386 | biostudies-literature
| S-EPMC9374721 | biostudies-literature
| S-EPMC5792631 | biostudies-literature