quantum random walk
Recently Published Documents


TOTAL DOCUMENTS

98
(FIVE YEARS 15)

H-INDEX

18
(FIVE YEARS 1)

Author(s):  
François David ◽  
Thordur Jonsson

Abstract We study continuous time quantum random walk on a comb with infinite teeth and show that the return probability to the starting point decays with time t as t−1. We analyse the diffusion along the spine and into the teeth and show that the walk can escape into the teeth with a finite probability and goes to infinity along the spine with a finite probability. The walk along the spine and into the teeth behaves qualitatively as a quantum random walk on a line. This behaviour is quite different from that of classical random walk on the comb.


2022 ◽  
Author(s):  
Jingbo Zhao ◽  
Tian Zhang ◽  
Jianwei Jiang ◽  
Tong Fang ◽  
Hongyang Ma

Abstract Aiming at solving the trouble that digital image information is easily intercepted and tampered during transmission, we proposed a color image encryption scheme based on alternate quantum random walk and controlled Rubik’s Cube transformation. At the first, the color image is separated into three channels: channel R, channel G and channel B. Besides, a random sequence is generated by alternate quantum walk. Then the six faces of the Rubik’s Cube are decomposed and arranged in a specific order on a two-dimensional plane, and each pixel of the image is randomly mapped to the Rubik’s Cube. The whirling of the Rubik’s Cube is controlled by a random sequence to realize image scrambling and encryption. The scrambled image acquired by Rubik’s Cube whirling and the random sequence received by alternate quantum walk are bitwise-XORed to obtain a single-channel encrypted image. Finally the three-channel image is merged to acquire the final encrypted image. The decryption procedure is the reverse procedure of the encryption procedure. The key space of this scheme is theoretically infinite. After simulation experiments, the information entropy after encryption reaches 7.999, the NPCR is 99.5978%, and the UACI is 33.4317%. The encryption scheme with high robustness and security has a excellent encryption effect which is effective to resist statistical attacks, force attacks, and other differential attacks.


2021 ◽  
Vol 11 (19) ◽  
pp. 9085
Author(s):  
Kyung-Kyu Ko ◽  
Eun-Sung Jung

Many hacking incidents are linked to work files because most companies work with them. However, a variety of file encryption and decryption methods have been proposed. Existing file encryption/decryption technologies are under threat as hacking technologies advance, necessitating the development of stronger encryption algorithms. Therefore, in this study, we propose a modified advanced encryption standard (AES) algorithm and use quantum computing to encrypt/decrypt AES image files. Because the shift is regular during the AES Shift Row procedure, the change technique led the shift to become irregular when using quantum random walk. Computing resources and speeds were simulated using IBM Qiskit quantum simulators for performance evaluation, whereas encryption performance was assessed using number of pixels change rate (NPCR) and unified average changing intensity (UACI).


2021 ◽  
Vol 1719 (1) ◽  
pp. 012103
Author(s):  
Warat Puengtambol ◽  
Prapong Prechaprapranwong ◽  
Unchalisa Taetragool

Optik ◽  
2020 ◽  
Vol 206 ◽  
pp. 164288
Author(s):  
Zijing Zhang ◽  
Jie Song ◽  
Yuan Zhao

2020 ◽  
Vol 29 (2) ◽  
pp. 020503
Author(s):  
Zijing Zhang ◽  
Feng Wang ◽  
Jie Song ◽  
Yuan Zhao

2020 ◽  
Vol 128 (2) ◽  
pp. 20007
Author(s):  
Jayanth Jayakumar ◽  
Sreetama Das ◽  
Aditi Sen(De) ◽  
Ujjwal Sen

2020 ◽  
Vol 15 (2) ◽  
Author(s):  
Jin-Fu Chen ◽  
Yu-Han Ma ◽  
Chang-Pu Sun

Sign in / Sign up

Export Citation Format

Share Document