Encryption method and apparatus encrypting and adding...

Cryptography – Communication system using cryptography – Fiber optic network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S260000, C380S263000, C380S277000

Reexamination Certificate

active

07035411

ABSTRACT:
Arbitrary quantum information is input. The information of a quantum two-state system is acquired as a qubit by performing a computation in consideration of a physical system. The acquired qubit is encrypted. A quantum system having signature information for guaranteeing that the qubit is really transferred from a sender to a recipient is added to the encrypted qubit. The qubit to which the quantum system having the signature information is added is further encrypted. In this manner, an arbitrary quantum state can be encrypted and transmitted without letting the sender and recipient share an entangled pair of qubits in advance.

REFERENCES:
patent: 5400027 (1995-03-01), Moyal
patent: 5953421 (1999-09-01), Townsend
patent: 6529601 (2003-03-01), Townsend
patent: 6748083 (2004-06-01), Hughes et al.
patent: 6778669 (2004-08-01), Lehureau
patent: 6816968 (2004-11-01), Walmsley
“Algorithms for Quantum Computation: Discrete Logarithms and Factoring”, Peter Shor, Proceedings of the 35thAnnual Symposium on Foundations of Computer Science, IEEE Computer Society Press, pp. 124-134, Santa Fe, Mexico, Nov. 1994.
“Polynomial Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer”, Peter Shor, SIAM J. Computing 26, 1483, vol. 26, No. 5, pp 1484-1509, Oct. 1997.
“Quantum Cryptography”, Charles Bennett, et al., Scientific American, 267, No. 4, pp 50-57, Oct. 1992.
“Teleporting an Unknown Quantum State Via Dual Classical and Einstein-Podolsky-Rosen Channels”, Charles Bennett, et al., Physical Review Letters, The American Physical Society, vol. 70, No. 13, pp 1895-1899, 0Mar. 23, 1993.
“Experimental Quantum Teleportation”, D. Bouwmeester, et al., Nature, International Weekly Journal of Science, vol. 390, pp 575-579, Dec. 11, 1997.
“Unconditional Quantum Teleportation”, A. Furusawa, et al., Science, vol. 282, No. 5389, pp 706-709, Oct. 23, 1998.
“Quantum Cryptography Based on Bell's Theorem”m Artur Ekert, Physical Review Letters, The American Physical Society, vol. 67, No. 6, pp. 661-663, Aug. 5, 1991.
“Quantum Crytography Without Bell's Theorem”, Charles Bennett, Physical Review Letter, The American Physical Society, vol. 68, No. 5, pp 557-559, Feb. 3, 1992.
Purification of Noisy Entanglement and Faithful Teleportation Via Noisy Channels, Charles Bennett, et al., Physical Review Letters, The American Physical Society, vol. 76, No. 5, pp 722-725, Jan. 29, 1996.
“Quantum Privacy Amplification and the Security of Quantum Cryptography Over Noisy Channels”, David Deutsch, et al., Physical Review Letters, The American Physical Society, vol. 77, No. 13, pp 2818-2821, Sep. 23, 1996.
“Mixed Entanglement and Quantum Error Correction”, Charles H. Bennett, et al., Physical Review A, The American Physical Society, vol. 54, No. 5, pp 3824-3851, Nov. 1996.
“A Single Quantum Cannot be Cloned”, W.K. Wootters, et al., Nature, vol. 299, pp 802-803, Oct. 28, 1982.
“Communication Channels Secured from Eavesdropping Via Transmission of Photonic Bell States”, Kaoru Shimizu, et al., Physical Review A, The American Physical Society, vol. 60, No. 1, pp 157-166, Jul. 1999.
“Sending Entanglement Through Noisy Quantum Channels”, Benjamin Schumacher, Physical Review A, The American Physical Society, vol. 54, No. 4, pp 2614-2628, Oct. 1996.
“Simple Quantum Computer”, Isaac Chuang, et al., Physical Review A, The American Physical Society, vol. 52, No. 5, pp 3489-3496, Nov. 1995.
“A Silicon-Based Nuclear Spin Quantum Computer”, B. Kane, Nature, International Weekly Journal of Science, vol. 393, pp 133-137, May 14, 1998.
“Quantum Computations with Cold Trapped Ions”, J.I. Cirac, et al., Physical Review Letters, The American Physical Society, vol. 74, No. 20, pp 4091-4098, May 15, 1995.
“Elementary Gates for Quantum Computation”, Adriano Barenco, et al., Physical Review A, The American Physical Society, vol. 52, No. 5, pp 3457-3467, Nov. 1995.
“Stabilizer Codes and Quantum Error Correction”, Daniel Gottesman, Thesis, California Institute of Technology, Pasadena, California, May 21, 1997.
“Measurement of Condition Phase Shifts for Quantum Logic”, Q.A. Turchette, et al., Physical Review Letters, The American Physical Society, vol. 75, No. 25, pp 4710-4713, Dec. 18, 1995.
“Quantum Cryptogrqaphy: Public Key Distribution and Coin Tossing”, C.H. Bennett, et al., Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp 175-179, Dec. 1984.
“Rapid Solution of Problems by Quantum Computation”, D. Deutsch, et al., Proceedings of the Royal Society of London, Series A, vol. 439, No. 1907, pp 553-558, Dec. 1992.
“Experimental Quantum Cryptography”, Charles Bennett, Journal of Cryptology, International Association of Cryptologic Research, pp 3-29, 1992.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Encryption method and apparatus encrypting and adding... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Encryption method and apparatus encrypting and adding..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Encryption method and apparatus encrypting and adding... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3553180

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.