Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30075
Unconditionally Secure Quantum Payment System

Authors: Essam Al-Daoud

Abstract:

A potentially serious problem with current payment systems is that their underlying hard problems from number theory may be solved by either a quantum computer or unanticipated future advances in algorithms and hardware. A new quantum payment system is proposed in this paper. The suggested system makes use of fundamental principles of quantum mechanics to ensure the unconditional security without prior arrangements between customers and vendors. More specifically, the new system uses Greenberger-Home-Zeilinger (GHZ) states and Quantum Key Distribution to authenticate the vendors and guarantee the transaction integrity.

Keywords: Bell state, GHZ state, Quantum key distribution, Quantum payment system.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1075637

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1144

References:


[1] P. Panthong, and et al, ''Experimental Free Space Quantum Key Distribution'' The 4th International Conference on Optical Communication and Networks, Thailand, 2005, pp.14-16.
[2] H. Feng, and et al, ''Experimental Teleportation of a Quantum Controlled-NOT Gate,'' arXiv:quant-ph/0408007 v1 2 Aug 2004.
[3] M. Curty, D. J. Santos, ''Qubit authentication,'' Physical Review A, 66, 022-301. 2002.
[4] L. H. Hong, and et al., ''Arbitrated quantum signature scheme with message recovery'', Physics Letters A. 321, 2004, pp.295-300.
[5] www.bbn.com/Solutions_and_Technologies/Information_Security/Quantum_Cryptography.html. last access on January 2007.
[6] www.idquantique.com. last access on January 2007.
[7] www.magiqtech.com. last access on January 2007.
[8] G. Benenti, G. Casati, and G. Strini, Principles of Quantum Computation and Information. World Scientific vol. I. Singapore, 2004.
[9] C. Branciard and el at, ''Security of two quantum cryptography protocols using the same four qubit states,'' arXiv:Quant-ph/0505035, 2005.
[10] P. Panthong, and et al, ''Experimental Free Space Quantum Key Distribution,'' The 4th International Conference on Optical Communication and Networks, Thailand, 2005, pp.14-16.
[11] C. Gobby, and et al. ''Quantum key distribution over 122 km standard telecom fiber,'' Appl. Phys. Lett., 84, 2004, pp. 3762-3764.
[12] W. Huffman and V. Pless, Fundamentals of Error-Correcting Codes. Cambridge University Press. 2003.
[13] D. Deutsch, A. Ekert and R. Jozsa, ''Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels,'' Phys. Rev.Lett., 77, 2818. 1998.
[14] H. Weinfurter, ''The power of entanglement,'' Physics World 18, 2005, pp. 47-51.
[15] W. Y. Chung, G. L. Khym, C. H. Hong and H. J. Yang, ''Quantum Key Distribution Using GHZ States,'' Journal of Institute of Science and Technology Korea University, Vol. 11, 2003.
[16] X. J. Wen and Y. Liu, ''Quantum Signature Protocol without the Trusted Third Party,'' arXiv:Quant-ph/0509129, 2006.