Lossless quantum data compression and secure direct communication
نویسنده
چکیده
CONTENTS 5 7 Summary and Outlook 107 Acknowledgements V 6 CONTENTS Introduction Quantum information theory is the combination of quantum mechanics and information theory. The profit is on both sides: quantum mechanics gains valuable aspects concerning the physical interpretation of the theory, and information theory gains enhanced capabilities of information processing and communication. Classically, it is the logical yes/no decision, the bit, which forms the elementary unit of information. A sequence of bits forms the basic object of information theory, the message. A message can be composed and read out by addressing each bit individually. In quantum information theory the elementary unit of information is the qubit, which represents the linear superposition of yes and no. A sequence of qubits forms the quantum message and here another phenomenon shows up: entanglement. A quantum message consisting of entangled qubits contains " non-local " information, which means that the information cannot be stored and read out by addressing each qubit individually, but only by performing a joint operation on all qubits. There is no analogon for this in classical information theory. The extension of information theory to quantum information theory enables us to search for new algorithms and communication protocols. Shor's factoring algorithm [1] shows that the capabilities of a quantum computer exceed those of a classical computer. The Shor algorithm represents the only known efficient algorithm for prime number factoriza-tion. Here, " efficient " means that the time needed for the computation is a polynomial function of the input length. Any superpolynomial relation between input length and computation time implies that the algorithm is " inefficient ". The origin for the gap of efficieny between classical and quantum computers is the fact that it is impossible to efficiently simulate a quantum computer on a classical computer. The input of a quantum computer is a sequence of qubits, say of length N. The corresponding Hilbert space is of dimension 2 N , where each dimension represents one degree of freedom. A classical computer has to carry out calculations by addressing any of these 2 N degrees of freedom. In contrast to that, the quantum computer performs his algorithms by addressing the N qubits only. The quantum processor does not have to know about linear algebra: the laws of quantum mechanics do the job for free. If we would be able to build a quantum computer with enough resources, then by using the …
منابع مشابه
Demonstration of quantum cipher communication using quadrature amplitude modulation technologies over 100 km optical fiber
We report a hybrid secure communication of continuous-variable quantum key distribution (CV-QKD) and quadrature amplitude modulation/quantum noise stream cipher (QAM/QNSC). In QAM/QNSC a coherent multi-level optical signal is hidden in quantum noise. We demonstrated 70 Gbit/s on-line QAM/QNSC transmission over 100 km using an FPGA-based transmission and receiver, where secure keys are delivered...
متن کاملSome attacks on quantum-based cryptographic protocols
Quantum-based cryptographic protocols are often said to enjoy security guaranteed by the fundamental laws of physics. However, even carefully designed quantum-based cryptographic schemes may be susceptible to subtle attacks that are outside the original design. As an example, we will give a peeking attack against a quantum key distribution scheme based on quantum memory. As a second example, we...
متن کاملA Novel Secured Data Exchange Mechanism for Text Data Using Encode and Decode Mechanism
The Internet traffic is increasing day by day. Also, secure data communication is the need of the hour. But the standard compression techniques which are in use, are independent and do not consider the security issues. Hence, we present a general encoding technique for secure data communication over a language L with a finite alphabet set ˇ. The encoded message is a bi-tuple of which, the first...
متن کاملAn RGB Image Encryption Supported by Wavelet-based Lossless Compression
In this paper we have proposed a method for an RGB image encryption supported by lifting scheme based lossless compression. Firstly we have compressed the input color image using a 2-D integer wavelet transform. Then we have applied lossless predictive coding to achieve additional compression. The compressed image is encrypted by using Secure Advanced Hill Cipher (SAHC) involving a pair of invo...
متن کاملEfficient Secured Lossless Coding of Medical Images - Using Modified Runlength Coding for Character Representation
Lossless compression schemes with secure transmission play a key role in telemedicine applications that helps in accurate diagnosis and research. Traditional cryptographic algorithms for data security are not fast enough to process vast amount of data. Hence a novel Secured lossless compression approach proposed in this paper is based on reversible integer wavelet transform, EZW algorithm, new ...
متن کاملLossless Microarray Image Compression by Hardware Array Compactor
Microarray technology is a new and powerful tool for concurrent monitoring of large number of genes expressions. Each microarray experiment produces hundreds of images. Each digital image requires a large storage space. Hence, real-time processing of these images and transmission of them necessitates efficient and custom-made lossless compression schemes. In this paper, we offer a new archi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004