Quantum computation

Cryptography – Key management – Key distribution

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S256000, C714S781000

Reexamination Certificate

active

10118934

ABSTRACT:
The invention includes systems for and methods of performing quantum computation. The method of quantum computation includes preparing a set of one or more qubits capable of storing quantum information in 2npossible states, wherein the number of qubits n≧1. The qubit set is subject to a decoherence mechanism that could cause a loss of quantum information stored in some but not all of the qubit states. The method also includes determining, via a quantum measurement of the qubit system or just by analyzing the decoherence of the qubit states, which of the 2nstates or their superposition is/are not susceptible to decoherence. The method further includes encoding and processing quantum information in one or more of the decoherence-free states by controlling qubit-qubit interactions or via an electromagnetic interaction with the set of qubits.

REFERENCES:
patent: 4419579 (1983-12-01), East
patent: 4476384 (1984-10-01), Westphal
patent: 4648133 (1987-03-01), Vilnrotter
patent: 4833633 (1989-05-01), Morris
patent: 4843328 (1989-06-01), Greenhall
patent: 5243649 (1993-09-01), Franson
patent: 5307410 (1994-04-01), Bennett
patent: 5339182 (1994-08-01), Kimble et al.
patent: 5418905 (1995-05-01), Rarity et al.
patent: 5515438 (1996-05-01), Bennett et al.
patent: 5568301 (1996-10-01), Tiemann et al.
patent: 5570222 (1996-10-01), Chovan
patent: 5675648 (1997-10-01), Townsend
patent: 5732139 (1998-03-01), Lo et al.
patent: 5757912 (1998-05-01), Blow
patent: 5764765 (1998-06-01), Phoenix et al.
patent: 5768297 (1998-06-01), Shor
patent: 5768378 (1998-06-01), Townsend et al.
patent: 5850441 (1998-12-01), Townsend et al.
patent: 5953421 (1999-09-01), Townsend
patent: 5987483 (1999-11-01), Edelkind et al.
patent: 5999285 (1999-12-01), Brandt et al.
patent: 6076097 (2000-06-01), London et al.
patent: 6128764 (2000-10-01), Gottesman
patent: 6188768 (2001-02-01), Bethune et al.
patent: 6218657 (2001-04-01), Bethune et al.
patent: 6272224 (2001-08-01), Mazourenko et al.
patent: 6289104 (2001-09-01), Patterson et al.
patent: 6314189 (2001-11-01), Motoyoshi et al.
patent: 6360183 (2002-03-01), Shilton
patent: 6393448 (2002-05-01), Dultz et al.
patent: 6438234 (2002-08-01), Gisin et al.
patent: 2001/0055389 (2001-12-01), Hughes et al.
patent: 2002/0025041 (2002-02-01), Tomita
patent: 10-32259 (1998-02-01), None
patent: 2000-339958 (2000-12-01), None
patent: WO 96/06491 (1996-02-01), None
patent: WO 97/44936 (1997-11-01), None
patent: WO 98/10560 (1998-03-01), None
patent: WO 02/091147 (2002-05-01), None
U.S. Appl. No. 09/780,477, filed Feb. 12, 2001, Akira Yamazaki et al. “Multi-Power Semiconductor Integrated Circuit Device”.
U.S. Appl. No. 60/025,839, filed Sep. 5, 1996, Gisin et al.
Townsend, “Quantum cryptography on official fiber networks,” Optical Fiber Technology (1998).
Gottesman et al., “From Quantum Cheating to Quantum Security,” Physics Today Online, Nov. 2000, www.physicstoday.org/pt/vol-53/iss-11/p22.html pp. 1-11.
Stucki et al., “Quantum Key Distribution over 67 km with a Plug&Play System,” Mar. 22, 2002, http://xxx.lanl.gov/PS—cache/quant-ph/pdf/0203/0203118.pdf pp. 1-7.
Buttler et al., “New, Efficient and Robust, Fiber-based Quantum Key Distribution Schemes,” Mar. 20, 2002, http://xxx.lanl.gov/PS—cache/quant-ph/pdf/0203/0203098.pdf pp. 1-4.
Gisin et al., “Quantum Cryptography,” Sep. 18, 2001, http://xxx.lanl.gov/PS—cache/quant-ph/pdf/0101/0101098.pdf pp. 1-57.
Kempe et al., “Theory of Decoherance-Free Fault-tolerant Universal Quantum Computation,” Apr. 19, 2000, http://xxx.lanl.gov/PS—cache/quant-ph/pdf/0004/0004064.pdf pp. 1-40.
Bennett et al., “Experimental Quantum Cryptography,” J. Cryptology, vol. 5, pp. 3-28, 1992.
Brassard et al., “Secret Key Reconciliation by Public Discussion, Advances in Cryptology,” Eurocrypt' 93 Proceedings, pp. 410-423, 1993.
Sugimoto et al., A study on Secret Key Reconciliation Protocol “Cascade,” IEICE Trans. Fundamentals E83-A, pp. 1987-1991, Jan. 2000.
Bennett et al., “Generalized Privacy Amplification,” IEEE Trans. on Information Theory, vol. 41, No. 6, pp. 1915-1923, Nov. 1995.
Maurer, “Secret Key Agreement by Public Discussion from Common Information,” IEEE Trans. Inf. Theory vol. 39, No. 3, 733-742, May 1993.
Maurer et al., “Unconditionally Secure Key Agreement and the Intrinsic Conditional Information,” IEEE Trans. Inf. Theory vol. 45, No. 2, 499-514, Mar. 1999.
Shor et al., “Simple proof of security of the BB84 quantum key distribution protocol,” Phys. Rev. Lett. vol. 85, No. 2, pp. 441-444, Jul. 2000.
Mayers, “Unconditional security in quantum cryptography,” Journal of the ACM, vol. 48, No. 3, pp. 351-406, May 2001.
Bennett et al., “Quantum cryptography: Public key distribution and coin tossing,” Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, IEEE, pp. 175-179, Dec. 1984.
Ekert, “Quantum cryptography based on Bell's Theorem,” Phys. Rev. Lett. vol. 67, pp. 661-663, Aug. 1991.
Bennett et al., “Mixed-state entanglement and quantum error correction,” Phys. Rev. A, vol. 54, No. 5, pp. 3824-3851, Nov. 1996.
Bennett et al., “Purification of Noisy Entanglement and Faithful Teleportation via Noisy Channels,” Phys. Rev. Lett., vol. 76, No. 5, pp. 722-725, Jan. 1991.
Deutsch et al., “Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels,” Phys. Rev. Lett. 77, 2818-2821, Sep. 1996; 80, No. 9, 2022, Mar. 1998 errata.
Mayers, preprint of, “Unconditional Security in Quantum Cryptography,” Sep. 15, 1998, http://xxx.lanl.gov/PS—cache/quant-ph/pdf/9802/9802025.pdf pp. 1-18.
Lo et al., “Unconditional security of quantum key distribution over arbitrarily long distances,” Science, vol. 283, (1999), pp. 2050-2056; also available at http://xxx.lanl.gov/PS—cache/quant-ph/pdf/9803/9803006.pdf pp. 1-21.
Biham et al., “A proof of security of quantum key distribution,” Dec. 11, 1999, http://aps.arxiv.org/PS—cache/quant-ph/pdf/9912/9912053.pdf 31 pages.
Inamori et al., “Unconditional Security of Practical Quantum Key Distribution,” Jul. 3, 2001 http://xxx.lanl.gov/PS—cache/quant-ph/pdf/0107/0107017.pdf pp. 1-47.
Gottesman et al., “Proof of security of quantum key distribution with two-way classical communications,” May 23, 2001, http://xxx.lanl.gov/PS—cache/quant-ph/pdf/0105/0105121.pdf pp. 1-17.
Lo, “Proof of unconditional security of six-state quantum key distribution scheme,” Quantum Information and Computation, vol. 1, No. 2, pp. 81-94, 2001.
Bennett et al., “Generalized Privacy Amplification,” IEEE Transactions on Information Theory, vol. 41, No. 6, pp. 1915-1923, Nov. 1995).
Bruss, “Optimal eavesdropping in quantum cryptography with six states,” Phys. Rev. Lett., vol. 81, No. 14, pp. 3018-3021, Oct. 1998.
Lo et al., “Efficient quantum key distribution scheme and proof of its unconditional security,” Nov. 30, 2001, http://xxx.lanl.gov/PS—cache/quant-ph/pdf/0011/0011056.pdf pp. 1-32.
Gottesman et al., “Secure quantum key distribution using squeezed states,” Sep. 25, 2000, http://xxx.lanl.gov/PS—cache/quant-ph/pdf/0008/0008046.pdf pp. 1-19.
Calderbank et al., “Good Quantum error-correcting codes exist,” Apr. 16, 1996, http://aps.arxiv.org/PS—cache/quant-ph/pdf/9512/9512032.pdf pp. 1-24.
Steane, “Multiple particle interference and quantum error correction,” May 13, 1996, http://aps.arxiv.org/PS—cache/quant-ph/pdf/9601/9601029.pdf pp. 1-45.
Fuchs et al., “Optimal eavesdropping in quantum cryptography. I,” Jan. 30, 1997, http://aps.arxiv.org/PS—cache/quant-ph/pdf/97010/9701039.pdf 29 pages.
Cirac et al., “Coherent eavesdropping

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Quantum computation does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Quantum computation, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Quantum computation will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3813448

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.