Publications by authors named "Marius Nagy"

Quantum computation offers unique properties that cannot be paralleled by conventional computers. In particular, qubits may change their state and thus signal the presence of an intruder. This paper develops a proof-of-concept for a quantum honeypot that allows the detection of intruders on reading.

View Article and Find Full Text PDF
Article Synopsis
  • Squiggle data refers to the complex numeric output from DNA and RNA sequencing using Nanopore technology, which generates extensive current measurements over time.
  • This study explores the potential of quantum computers to improve the analysis speed of this data, focusing on designing circuits that highlight key features of the squiggle measurements.
  • While theoretical analysis showcases circuit performance, practical tests reveal the limitations of current quantum computers, but using inverse wavelet transform helps reduce data complexity, making it more manageable for these future systems.
View Article and Find Full Text PDF

This paper proposes a perimeter detection scheme based on the quantum physical properties of photons. Existing perimeter intrusion detection schemes, if using light, rely on the classical properties of light only. Our quantum sensor network uses the quantum property of spatial superposition of photons, meaning that a photon can simultaneously follow two different paths after going through a beam splitter.

View Article and Find Full Text PDF

This paper studies the effect of quantum computers on Bitcoin mining. The shift in computational paradigm towards quantum computation allows the entire search space of the golden nonce to be queried at once by exploiting quantum superpositions and entanglement. Using Grover's algorithm, a solution can be extracted in time O(2256/t), where is the target value for the nonce.

View Article and Find Full Text PDF

This paper proposes a different approach to pinpoint the causes for which an unconditionally secure quantum bit commitment protocol cannot be realized, beyond the technical details on which the proof of Mayers' no-go theorem is constructed. We have adopted the tools of quantum entropy analysis to investigate the conditions under which the security properties of quantum bit commitment can be circumvented. Our study has revealed that cheating the binding property requires the quantum system acting as the safe to harbor the same amount of uncertainty with respect to both observers (Alice and Bob) as well as the use of entanglement.

View Article and Find Full Text PDF