CFP last date
20 January 2025
Reseach Article

Noise deduction using Quantum check Bits

Published on March 2012 by T.Godhavari, N.R.Alamelu
International Conference in Computational Intelligence
Foundation of Computer Science USA
ICCIA - Number 2
March 2012
Authors: T.Godhavari, N.R.Alamelu
03d474dc-5e9c-435b-9073-b98913d07ab0

T.Godhavari, N.R.Alamelu . Noise deduction using Quantum check Bits. International Conference in Computational Intelligence. ICCIA, 2 (March 2012), 17-21.

@article{
author = { T.Godhavari, N.R.Alamelu },
title = { Noise deduction using Quantum check Bits },
journal = { International Conference in Computational Intelligence },
issue_date = { March 2012 },
volume = { ICCIA },
number = { 2 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 17-21 },
numpages = 5,
url = { /proceedings/iccia/number2/5100-1012/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference in Computational Intelligence
%A T.Godhavari
%A N.R.Alamelu
%T Noise deduction using Quantum check Bits
%J International Conference in Computational Intelligence
%@ 0975-8887
%V ICCIA
%N 2
%P 17-21
%D 2012
%I International Journal of Computer Applications
Abstract

With the advent of efficient quantum algorithms and technological advances, design of quantum circuits has gained importance. In this paper, Quantum circuit using standard quantum gates is constructed for the transmission of quantum encrypted check bits. The proposed scheme is analogous to the first QKD (quantum key distribution) protocol, (BB84) where the check bits are used to detect the level of noise and evesdropping on the channel. The gates used in this work are easily realizable and the encoding and decoding of classical information bits is extended for multiple bits using dense coding scheme.

References
  1. Stinson, Douglas. R., “Cryptography : Theory and Practice, CRC Press, Boca Raton, Florida, 1995.
  2. Mehrdaa S.Sharbaf, “Quantum cryptography: A new Generation of Information Technology Security System,” IEEE Sixth International Conference on Information Technology, Vol: 3, pp: 1644-1648, 2009.
  3. Justin Mullins, “Breaking Quantum cryptography in 150 kilometer,” IEEE Transaction on Spectrum, Vol: 45, Issue: 9, pp: 15-15, September 2008.
  4. Cederlof J, Larson .A, “Security Aspects of the Authentication used in Quantum cryptography,” IEEE Transaction on Information Theory, Vol: 54, Issue: 4, pp: 1735-1741, April 2008.
  5. Dan C.Marinesu,Gabrriela M.Marinesu,”Approching Quantum Computing”Pearson education,2009.
  6. Vishal Sahani,”Quantum computing” Tata McGraw Hill,Delhi.
  7. Vandersypen. L, “Experimental realization of Shor’s quantum factoring algorithm using nuclear magnetic resonance”, Nature, 414, 883-887, Sep. 2011.
  8. Navleen Kaur, Amardeep Singh, “Enhancement of Network Security Techniques using quantum Cryptography”, International Journal on Computer Science and Engineering, vol. 3, No. 5, May 2011
  9. Khalil shihab, “ A Back propagation neural network for computer network security”, Journal of computer science., 2006
  10. Deutsch, D, “Quantum theory, the church- Turing principle and the universal quantum computer” proceedings of the royal society of London A 400: 97- 117, 1985
  11. Simon J. Gay, “Quantum Programming Languages: Survey and Bibliography,” Math. struct. in Comp. Science2006.
  12. Tafliovich, A, “Quantum programming”, Master’s thesis, University Of Toronto, 2004
Index Terms

Computer Science
Information Sciences

Keywords

Quantum algorithms Hamming code check bits encryption