Quantum computation offers unique properties that cannot be paralleled by conventional computers. In particular, qubits may change their state and thus signal the presence of an intruder. This paper develops a proof-of-concept for a quantum honeypot that allows the detection of intruders on reading.
View Article and Find Full Text PDFThis paper proposes a perimeter detection scheme based on the quantum physical properties of photons. Existing perimeter intrusion detection schemes, if using light, rely on the classical properties of light only. Our quantum sensor network uses the quantum property of spatial superposition of photons, meaning that a photon can simultaneously follow two different paths after going through a beam splitter.
View Article and Find Full Text PDFThis paper studies the effect of quantum computers on Bitcoin mining. The shift in computational paradigm towards quantum computation allows the entire search space of the golden nonce to be queried at once by exploiting quantum superpositions and entanglement. Using Grover's algorithm, a solution can be extracted in time O(2256/t), where is the target value for the nonce.
View Article and Find Full Text PDFEntropy (Basel)
March 2018
This paper proposes a different approach to pinpoint the causes for which an unconditionally secure quantum bit commitment protocol cannot be realized, beyond the technical details on which the proof of Mayers' no-go theorem is constructed. We have adopted the tools of quantum entropy analysis to investigate the conditions under which the security properties of quantum bit commitment can be circumvented. Our study has revealed that cheating the binding property requires the quantum system acting as the safe to harbor the same amount of uncertainty with respect to both observers (Alice and Bob) as well as the use of entanglement.
View Article and Find Full Text PDF