Cargando…
An Approach to Cryptography Based on Continuous-Variable Quantum Neural Network
An efficient cryptography scheme is proposed based on continuous-variable quantum neural network (CV-QNN), in which a specified CV-QNN model is introduced for designing the quantum cryptography algorithm. It indicates an approach to design a quantum neural cryptosystem which contains the processes o...
Autores principales: | , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7005808/ https://www.ncbi.nlm.nih.gov/pubmed/32034194 http://dx.doi.org/10.1038/s41598-020-58928-1 |
_version_ | 1783495015530496000 |
---|---|
author | Shi, Jinjing Chen, Shuhui Lu, Yuhu Feng, Yanyan Shi, Ronghua Yang, Yuguang Li, Jian |
author_facet | Shi, Jinjing Chen, Shuhui Lu, Yuhu Feng, Yanyan Shi, Ronghua Yang, Yuguang Li, Jian |
author_sort | Shi, Jinjing |
collection | PubMed |
description | An efficient cryptography scheme is proposed based on continuous-variable quantum neural network (CV-QNN), in which a specified CV-QNN model is introduced for designing the quantum cryptography algorithm. It indicates an approach to design a quantum neural cryptosystem which contains the processes of key generation, encryption and decryption. Security analysis demonstrates that our scheme is security. Several simulation experiments are performed on the Strawberry Fields platform for processing the classical data “Quantum Cryptography” with CV-QNN to describe the feasibility of our method. Three sets of representative experiments are presented and the second experimental results confirm that our scheme can correctly and effectively encrypt and decrypt data with the optimal learning rate 8e − 2 regardless of classical or quantum data, and better performance can be achieved with the method of learning rate adaption (where increase factor R(1) = 2, decrease factor R(2) = 0.8). Indeed, the scheme with learning rate adaption can shorten the encryption and decryption time according to the simulation results presented in Figure 12. It can be considered as a valid quantum cryptography scheme and has a potential application on quantum devices. |
format | Online Article Text |
id | pubmed-7005808 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-70058082020-02-18 An Approach to Cryptography Based on Continuous-Variable Quantum Neural Network Shi, Jinjing Chen, Shuhui Lu, Yuhu Feng, Yanyan Shi, Ronghua Yang, Yuguang Li, Jian Sci Rep Article An efficient cryptography scheme is proposed based on continuous-variable quantum neural network (CV-QNN), in which a specified CV-QNN model is introduced for designing the quantum cryptography algorithm. It indicates an approach to design a quantum neural cryptosystem which contains the processes of key generation, encryption and decryption. Security analysis demonstrates that our scheme is security. Several simulation experiments are performed on the Strawberry Fields platform for processing the classical data “Quantum Cryptography” with CV-QNN to describe the feasibility of our method. Three sets of representative experiments are presented and the second experimental results confirm that our scheme can correctly and effectively encrypt and decrypt data with the optimal learning rate 8e − 2 regardless of classical or quantum data, and better performance can be achieved with the method of learning rate adaption (where increase factor R(1) = 2, decrease factor R(2) = 0.8). Indeed, the scheme with learning rate adaption can shorten the encryption and decryption time according to the simulation results presented in Figure 12. It can be considered as a valid quantum cryptography scheme and has a potential application on quantum devices. Nature Publishing Group UK 2020-02-07 /pmc/articles/PMC7005808/ /pubmed/32034194 http://dx.doi.org/10.1038/s41598-020-58928-1 Text en © The Author(s) 2020 Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/. |
spellingShingle | Article Shi, Jinjing Chen, Shuhui Lu, Yuhu Feng, Yanyan Shi, Ronghua Yang, Yuguang Li, Jian An Approach to Cryptography Based on Continuous-Variable Quantum Neural Network |
title | An Approach to Cryptography Based on Continuous-Variable Quantum Neural Network |
title_full | An Approach to Cryptography Based on Continuous-Variable Quantum Neural Network |
title_fullStr | An Approach to Cryptography Based on Continuous-Variable Quantum Neural Network |
title_full_unstemmed | An Approach to Cryptography Based on Continuous-Variable Quantum Neural Network |
title_short | An Approach to Cryptography Based on Continuous-Variable Quantum Neural Network |
title_sort | approach to cryptography based on continuous-variable quantum neural network |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7005808/ https://www.ncbi.nlm.nih.gov/pubmed/32034194 http://dx.doi.org/10.1038/s41598-020-58928-1 |
work_keys_str_mv | AT shijinjing anapproachtocryptographybasedoncontinuousvariablequantumneuralnetwork AT chenshuhui anapproachtocryptographybasedoncontinuousvariablequantumneuralnetwork AT luyuhu anapproachtocryptographybasedoncontinuousvariablequantumneuralnetwork AT fengyanyan anapproachtocryptographybasedoncontinuousvariablequantumneuralnetwork AT shironghua anapproachtocryptographybasedoncontinuousvariablequantumneuralnetwork AT yangyuguang anapproachtocryptographybasedoncontinuousvariablequantumneuralnetwork AT lijian anapproachtocryptographybasedoncontinuousvariablequantumneuralnetwork AT shijinjing approachtocryptographybasedoncontinuousvariablequantumneuralnetwork AT chenshuhui approachtocryptographybasedoncontinuousvariablequantumneuralnetwork AT luyuhu approachtocryptographybasedoncontinuousvariablequantumneuralnetwork AT fengyanyan approachtocryptographybasedoncontinuousvariablequantumneuralnetwork AT shironghua approachtocryptographybasedoncontinuousvariablequantumneuralnetwork AT yangyuguang approachtocryptographybasedoncontinuousvariablequantumneuralnetwork AT lijian approachtocryptographybasedoncontinuousvariablequantumneuralnetwork |