| Literature DB >> 35205505 |
Tal Mor1, Roman Shapira1, Guy Shemesh1.
Abstract
Quantum candies (qandies) represent a type of pedagogical simple model that describes many concepts from quantum information processing (QIP) intuitively without the need to understand or make use of superpositions and without the need of using complex algebra. One of the topics in quantum cryptography that has gained research attention in recent years is quantum digital signatures (QDS), which involve protocols to securely sign classical bits using quantum methods. In this paper, we show how the "qandy model" can be used to describe three QDS protocols in order to provide an important and potentially practical example of the power of "superpositionless" quantum information processing for individuals without background knowledge in the field.Entities:
Keywords: digital signatures; quantum digital signatures; quantum qandies
Year: 2022 PMID: 35205505 PMCID: PMC8871117 DOI: 10.3390/e24020207
Source DB: PubMed Journal: Entropy (Basel) ISSN: 1099-4300 Impact factor: 2.524
Figure 1“Public” Key Distribution (Step 2) and Symmetrization (Step 3) of the (a) P1, (b) P2, and (c) AWKA16 [10] protocols. Step 1 (Private Key Generation, see, for example, Section 3.2 and Section 5.2) is not seen in the figure. In P1, the parties transfer qandies (dashed arrows), with TEST done after the symmetrization step. In P2, the parties transfer classical bits (solid arrows), achieved via QKD over insecure “qandy channels” with full classical post-processing (TEST, EC, and PA). In [10], the protocol is similar to P2, achieved via (partial) QKD over an insecure “qandy” channel, except no EC and PA are done in Step 2.