Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract

Size: px
Start display at page:

Download "Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract"

Transcription

1 Research Proposal for Secure Double slit experiment Sandeep Cheema Security Analyst, Vichara Technologies Abstract The key objective of this research proposal is to resolve or advance with the measurement problem. A new architecture has been designed for the Double slit experiment using techniques and technology that have been recently developed. The design ensures there would not be a speck of proof left in the universe that can be recovered for determining a specific detector state. Quantum key based One time pad encryption and Self-destructing circuits are implemented to secure the information from being eavesdropped. Only the sum of states would be accessible to the experimenter thus eliminating any theoretical or implied way to recover what the detectors measured. By looking at the sum it can be concluded whether the detectors measured waves, particles or combination of both. Introduction The architecture has been designed to perform the Double slit experiment by implementing Quantum cryptography and Self-destructing [1] circuits. Only the sum of detector measurements would be accessible to the experimenter, thus reducing the experiment results to one of the below probabilities - All particles - All waves - Combination of particles and waves Apparatus The apparatus has been designed to be secure from eavesdropping. There is no known way in which the results of the experiment can be looked at before the final iteration is complete. - Self-destructing chips are used in the circuits, which destroy the information as soon as it s encrypted and relayed to prevent any potential, accidental or intentional eavesdropping. These chips would also self-destruct if an attempt is made to eavesdrop. - An electronic board with two slits - On-Demand Coherent Single Electron Source - Robotic arms for replacing self-destructing chips [2] - Quantum key generation - Quantum key distribution - Encryption and decryption circuits [3] - Two electron detection interferometers ( D1 and D2 ) placed at the two slits ( S1 and S2 )[4]

2 - Counters - Intermediate and Final for measuring the probabilities from Detector circuits. The Intermediate true counter stores the value before relaying to the True counter. The Intermediate true counter fetches the encrypted values from the True counter, adds the current value to it, encrypts it and stores it back to True counter. Once the operation is complete, Intermediate true counter circuit is selfdestructed, to be replaced with a default circuit ( by the robotic arm ) - Quantum Key Generation device for creating the polarized entangled photon pair which would be used for securing the communication [5] - Quantum Key Distribution Centre for distributing the entangled photon pairs to the encrypter and decrypter circuits - All channels are connected with fiber optic cables for transmitting the data securely using the polarized entangled photon pair Architecture Method 1. Experimenter starts the process by entering the iteration count. It is encouraged that the input be more than 2 so the intermediate probabilities cannot be predicted 2. The input is stored unencrypted on a circuit 3. Control is passed to iterator circuit which checks the current iteration against the value set by the experimenter. If the values do not match, i.e. it is not the last iteration then the control is passed to the electron gun. If the values match (last iteration) then the experiment can be finalized as elaborated at the end. 4. Electron gun is on demand controlled coherent source of single electrons. The set up aims electrons somewhere in the middle of the slits. 5. One or both the detector record the electron when it passes through

3 Time dependent equation for an electron Where μ is the particle's "reduced mass", V is its potential energy, 2 is the Laplacian (a differential operator), and Ψ is the wave function Slit width: 50 nm Slit Center-to-Slit-center separation: 280 nm It is not essential to look at the interference pattern after the electron has passed through the slit, if it all it might occur. We are only interested in the detectors output. de Broglie wavelength Detector output in plaintext - 0 No detection Detection The values from the detectors are encrypted and sent to Intermediate true counter. The detector circuit which has the stored information is self-destructed and replaced with a default circuit by a robotic arm as soon as the information is relayed to the Intermediate true counter. Intermediate true counter decrypts the detectors output, adds the values from both, encrypts and sends it to True counter for detectors. Intermediate true counter circuit which stores the information is self-destructed and replaced with a default circuit by the robotic arm as soon as the information is sent to True counter. All circuits which store the encryption and decryption keys are also self-destructed after the operation (encryption/decryption) is complete. A new key is

4 generated and used for encryption and decryption operations for all iterations Set of keys Sender Receiver Operation Detector 1 Intermediate True Counter Encryption Detector 2 Intermediate True Counter Encryption Intermediate True True Counter Encryption Counter True Counter Finalizer Decryption A new key pair (OTP) is generated for all the iterations as all keys are self-destructed as soon as the encryption/decryption operation is complete. The only exception where the key would not be selfdestructed with the current scheme is that between Intermediate true counter and True counter. This key would be utilized for decrypting the last state of True Counter, which would utilize last key used for encryption, before adding the current iteration detector sum to it. The circuit storing this key would be self-destructed as soon as the decryption operation is complete. The same key pair would be also be used by the Finalizer circuit to decrypt the final sum of detector states. 6. Starting from second iteration, the Intermediate true counter gets the encrypted value from the True counter to perform decryption and additive operations on it. At the Intermediate true counter - The encrypted value from first iteration is decrypted using the key from the previous iteration ( Implemented for securing the communication between Intermediate True counter and True counter ) - The encrypted detector values from current iteration are decrypted, summed and the this value is added to the value fetched from the True counters - The final value obtained by adding the two values i.e. detector iteration output sum from current iteration and detector iteration output sum from previous iteration is encrypted and overwritten to the existing True counter value. 7 The sum of probability values from True counter would be accessible by the Finalizer circuit only after the experiment has completed its last iteration as set by the experimenter. Any attempt to eavesdrop

5 Constants will destruct the circuit and robotic arm will replace it with a similar default chip Iteration count for experiment sets: As set by the observer Electron rest mass = (11) Kg Planck's constant = m2 kg / s Distance between the two slits: 2 mm Slit width: 50 nm Slit Center-to-Slit-center separation: 280 nm Security architecture - Data Communication Security Quantum Key Distribution (QKD) - The BB84 Protocol [6] Entangled photons are created by a Quantum Key Generation circuit, and each pair is separated in a way that both sender and receiver, receiving one of each pair. This is arguably a more secure method of using polarized photons, as there is no information to be eavesdropped: it only springs into existence at the moment of measurement. The only potential ploy for eavesdropping is to attempt to inject extra quanta into the protocol. The extra quanta violate Bell s inequalities, and so the eavesdropper will also be detected in this case. Upon eavesdropping detection, the experiment run will stop. None of the keys (OTP) are reused. It is stored on a circuit which is self-destructed so there is no way in which the key can be recovered after the encryption operation is complete - Hardware Security [7] Anti-tamper techniques Tamper prevention - Making housing difficult to open - Encapsulation/Coating - Using security fuses to prevent unauthorized access - Layout and data bus scrambling Tamper detection - Anti-tamper switches - Anti-tamper sensors - Anti-tamper circuitry Tamper response

6 - Stop the experiment - Erase critical parts of memory which have the information stored - Self-destructing circuits The only effective way to ensure that the information comprising of the encryption keys and detector states can never be compromised is by implementing self-destructing circuits which are beyond reconstruction. A similar chip has been developed for DARPA which destructs based on programmable input like mechanical or an electrical signal. - Algorithmic Security Robotic arm Robotic arms would replace the self-destructed circuits. Robotic arm will not be secured from being hacked, rather a check will be implemented at the Algorithm to halt the experiment if the Robotic arm fails to replace the Chip within the set timeframe. This prevents the architecture from malfunctioning. Encryption Key A bit can be encoded in the polarization state of a photon. Binary 0 is defined as a polarization of 0 degrees in the rectilinear base or 45 degrees in the diagonal base. Similarly a binary 1 can be 90 degrees in the rectilinear base or 135 in diagonal base. Thus a bit can be represented by polarizing the photon in either one of two bases. [8]

7 In the first phase, sender will communicate to receiver over a quantum channel. Sender begins by choosing a random string of bits and for each bit, bit, Sender will randomly choose a basis, rectilinear or diagonal, by which which to encode the bit. Sender transmits a photon to Receiver for each bit bit with the corresponding polarization. For every photon that the Receiver Receiver receives, Receiver will measure the photon's polarization by a randomly chosen basis. If, for a particular photon, Receiver chose the same same basis as Sender, then in principle, Receiver should measure the same same polarization and thus receiver can correctly infer the bit that Sender Sender intended to send. If receiver chose the wrong basis, receiver s result, and thus the bits read, will be random. In the second phase, Receiver will notify the Sender over any insecure channel what basis was used to measure each photon. Sender will report back to Receiver whether the correct basis was chosen for each photon. At this point Sender and receiver will discard the bits corresponding to the photons which Receiver measured with a different basis. Provided no errors occurred, Sender and Receiver should now both have an identical string of bits which is called a sifted key. The example below shows the bits the Sender chose, the bases sender encoded them in, the bases Receiver used for measurement, and the resulting sifted key after Sender and Receiver discarded their bits Before the Sender and Receiver are finished, however, Sender and Receiver agree upon a random subset of the bits to compare to ensure consistency. If the bits agree, they are discarded and the remaining bits form the shared secret key. In the absence of noise or any other measurement error, a

8 disagreement in any of the bits compared would indicate the presence of an eavesdropper on the quantum channel. This is because the eavesdropper was attempting to determine the key, the eavesdropper would have no choice but to measure the photons sent by Sender before sending them on to Receiver. This is true because the no cloning theorem assures that the eavesdropper cannot replicate a particle of unknown state. Since eavesdropper will not know what bases Sender has used to encode the bits until after Sender and Receiver discuss their measurements, eavesdropper will be forced to guess. If eavesdropper measures on the incorrect bases, the Heisenberg Uncertainty Uncertainty Principle ensures that the information encoded on the other bases bases is now lost. Thus when the photon reaches Receiver, receiver s measurement will now be random and he will read a bit incorrectly 50% of the of the time. Given that eavesdropper will choose the measurement basis incorrectly on average 50% of the time, 25% of Receiver's measured bits will will differ from Sender. If eavesdropper has eavesdropped on all the bits bits then after n bit comparisons by Sender and Receiver, they will reduce reduce the probability that Eve will go undetected to ¾n. The chance that an that an eavesdropper learned the secret is thus negligible since by only only guessing the eavesdropper can predict the probable values which are are impossible to determine for legitimacy as the decoded state of all guesses are equally probable as output Encryption Operations XOR operation The XOR operator outputs a 1 whenever the inputs do not match, which occurs when one of the two inputs is exclusively true. This is the same as addition mod 2. Here is the truth table: 0 XOR 0 = 0 0 XOR 1 = 1 1 XOR 0 = 1 1 XOR 1 = 0 When the XOR operation is performed on a binary sequence, the resulting sequence could be any possible sequence. The plaintext can be retrieved by XORing the cipher text with the pad again. Example Encryption: 11(Plaintext) XOR 110(One time pad) = 101 (Ciphertext) Decryption: 101(Ciphertext) XOR 110(One time pad) = 11 (Original plaintext)

9 Channels All communication channels are fiber optic cables Components - Quantum Key Generator - Quantum Key Distribution Centre - Robotic arm - Sender ( Encrypter ) - Receiver ( Decrypter ) - Self-destructing circuits - Electron gun - Iteration count circuit - Fiber optic cables - Electronic board with two slit - Intermediate true counter circuit - True counter circuit - Feedback circuit Encrypted circuits - Detector circuits ( D1 and D2 ) - Intermediate True Counter Circuit - True counter circuit Self-destructing circuits - Detector circuits ( D1 and D2 ) - Intermediate True Counter Circuit Calculations A particle shies away from revealing its path information when it is possible to determine which path (slit) it went through. In this experiment, only the detectors know the True path of the particles which they store until they securely relay that information. There is no circuit or mechanism possible which will reveal the path of the electron at a later stage to the observer. Only the sum of detector outputs is accessible. If we consider that the iteration count is set to 10 - All waves measured would have sum = 20 - All particles measured would have sum = 10 For combination of waves and particles, sum will be between 10 and 20 (20 > Sum > 10 Expected Results The expected output can broadly be categorized into three categories - All waves, All Particles & Combination of Waves and Particles Case 1: All waves

10 The sum of detector output denotes that the electron behaved as a wave in all the iterations Case conclusion If all electrons behaved as a wave then Which path of all electrons has been measured since they passed through both the detectors. - Principle of complementarity has been violated. - This proves Von Neumann Wigner interpretation as correct since the conscious observer does not know intermediate detector states to collapse the Wave function of electron - Superposition and multiple eigenstates of a single electron have been successfully measured Case 2: All Particles The sum of probabilities denotes that the electron behaved as a particle in all the iterations Case conclusion It s interesting why all electrons behaved as particles when Which path of none of the electrons is known to the conscious observer. This result implies that the act of measurement collapses the wave function of an electron. Case 3: Random (Combination of waves and particles) The sum of detector output denotes that the electron behaved as a wave in some iteration and as a particle in other Case conclusion Electrons somehow communicate with each other to ensure that the Mystery of Quantum Mechanics remains. This cannot be explained with the existing understanding. This also implies that we have managed to successfully measure the electron as a wave (Case 2) in certain iterations not known to the experimenter Conclusion The intention of the experiment is not to measure the individual output from detectors or knowing the Which path of an electron but to measure the sum of the detectors without being aware or any possible way to be aware about intermediate detector states References 1. IDG News Service, Sep. 10, pages, last printed Jan. 29, 2016.

11 2. Hochberg, Leigh R., et al. "Reach and grasp by people with tetraplegia using a neurally controlled robotic arm." Nature (2012): Ouellette, Jennifer. "Quantum key distribution." Industrial Physicist 10.6 (2004): Stone, N. J., and H. Ahmed. "Single-electron detector and counter." Applied Physics Letters 77.5 (2000): Muller, Antoine, J. Breguet, and N. Gisin. "Experimental demonstration of quantum cryptography using polarized photons in optical fibre over more than 1 km." EPL (Europhysics Letters) 23.6 (1993): Bennett, Charles H., and Gilles Brassard. "QUANTUM CRYPTOGRAPHY: PUBLIC KEY DISTRIBUTION AND CON Tos5." (1984). 7. Dubrova, Elena. "Hardware Security." 8. Haitjema, Mart. "A survey of the prominent quantum key distribution protocols." (2007).

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of

More information

Introduction to Quantum Cryptography

Introduction to Quantum Cryptography Università degli Studi di Perugia September, 12th, 2011 BunnyTN 2011, Trento, Italy This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. Quantum Mechanics

More information

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1 Quantum Cryptography Quantum Cryptography Presented by: Shubhra Mittal Instructor: Dr. Stefan Robila Intranet & Internet Security (CMPT-585-) Fall 28 Montclair State University, New Jersey Introduction

More information

LECTURE NOTES ON Quantum Cryptography

LECTURE NOTES ON Quantum Cryptography Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski 1 Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski What is the problem with classical cryptography? Secret key cryptography Requires secure channel for key distribution In principle every

More information

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution Chapter 13: Photons for quantum information Quantum only tasks Teleportation Superdense coding Quantum key distribution Quantum teleportation (Theory: Bennett et al. 1993; Experiments: many, by now) Teleportation

More information

10 - February, 2010 Jordan Myronuk

10 - February, 2010 Jordan Myronuk 10 - February, 2010 Jordan Myronuk Classical Cryptography EPR Paradox] The need for QKD Quantum Bits and Entanglement No Cloning Theorem Polarization of Photons BB84 Protocol Probability of Qubit States

More information

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes 5th March 2004 Unconditional Security of Quantum Key Distribution With Practical Devices Hermen Jan Hupkes The setting Alice wants to send a message to Bob. Channel is dangerous and vulnerable to attack.

More information

Security Implications of Quantum Technologies

Security Implications of Quantum Technologies Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography Umesh V. Vazirani CS 161/194-1 November 28, 2005 Why Quantum Cryptography? Unconditional security - Quantum computers can solve certain tasks exponentially faster; including quantum

More information

quantum distribution of a sudoku key Sian K. Jones University of South Wales

quantum distribution of a sudoku key Sian K. Jones University of South Wales Games and Puzzles quantum distribution of a sudoku key Sian K. Jones University of South Wales sian-kathryn.jones@southwales.ac.uk Abstract: Sudoku grids are often cited as being useful in cryptography

More information

A probabilistic quantum key transfer protocol

A probabilistic quantum key transfer protocol SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 013; 6:1389 1395 Published online 13 March 013 in Wiley Online Library (wileyonlinelibrary.com)..736 RESEARCH ARTICLE Abhishek Parakh* Nebraska

More information

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices Global Journal of Computer Science and Technology Volume 11 Issue 12 Version 1.0 July Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN:

More information

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1 Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption

More information

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139 Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense

More information

Secrecy and the Quantum

Secrecy and the Quantum Secrecy and the Quantum Benjamin Schumacher Department of Physics Kenyon College Bright Horizons 35 (July, 2018) Keeping secrets Communication Alice sound waves, photons, electrical signals, paper and

More information

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations David Gaharia Joel Wibron under the direction of Prof. Mohamed Bourennane Quantum Information & Quantum

More information

1 1D Schrödinger equation: Particle in an infinite box

1 1D Schrödinger equation: Particle in an infinite box 1 OF 5 1 1D Schrödinger equation: Particle in an infinite box Consider a particle of mass m confined to an infinite one-dimensional well of width L. The potential is given by V (x) = V 0 x L/2, V (x) =

More information

Ping Pong Protocol & Auto-compensation

Ping Pong Protocol & Auto-compensation Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol

More information

Quantum Cryptography. Marshall Roth March 9, 2007

Quantum Cryptography. Marshall Roth March 9, 2007 Quantum Cryptography Marshall Roth March 9, 2007 Overview Current Cryptography Methods Quantum Solutions Quantum Cryptography Commercial Implementation Cryptography algorithms: Symmetric encrypting and

More information

Quantum Cryptography and Security of Information Systems

Quantum Cryptography and Security of Information Systems Quantum Cryptography and Security of Information Systems Dalibor Hrg University of Zagreb, Faculty of Electrical Engineering and Computing, Zagreb dalix@fly.srk.fer.hr Leo Budin University of Zagreb, Faculty

More information

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport

More information

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Physics is becoming too difficult for physicists. David Hilbert (mathematician) Physics is becoming too difficult for physicists. David Hilbert (mathematician) Simple Harmonic Oscillator Credit: R. Nave (HyperPhysics) Particle 2 X 2-Particle wave functions 2 Particles, each moving

More information

Quantum Cryptography

Quantum Cryptography http://tph.tuwien.ac.at/ svozil/publ/2005-qcrypt-pres.pdf Institut für Theoretische Physik, University of Technology Vienna, Wiedner Hauptstraße 8-10/136, A-1040 Vienna, Austria svozil@tuwien.ac.at 16.

More information

C. QUANTUM INFORMATION 111

C. QUANTUM INFORMATION 111 C. QUANTUM INFORMATION 111 C Quantum information C.1 Qubits C.1.a Single qubits 1. Qubit: Just as the bits 0 and 1 are represented by distinct physical states, so the quantum bits (or qubits) 0i and 1i

More information

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.453 Quantum Optical Communication Date: Thursday, November 3, 016 Lecture Number 16 Fall 016 Jeffrey H.

More information

1 1D Schrödinger equation: Particle in an infinite box

1 1D Schrödinger equation: Particle in an infinite box 1 OF 5 NOTE: This problem set is to be handed in to my mail slot (SMITH) located in the Clarendon Laboratory by 5:00 PM (noon) Tuesday, 24 May. 1 1D Schrödinger equation: Particle in an infinite box Consider

More information

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009 An Dr Nick Papanikolaou Research Fellow, e-security Group International Digital Laboratory University of Warwick http://go.warwick.ac.uk/nikos Seminar on The Future of Cryptography The British Computer

More information

C. QUANTUM INFORMATION 99

C. QUANTUM INFORMATION 99 C. QUANTUM INFORMATION 99 C Quantum information C.1 Qubits C.1.a Single qubits Just as the bits 0 and 1 are represented by distinct physical states in a conventional computer, so the quantum bits (or qubits)

More information

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography (Notes for Course on Quantum Computation and Information Theory. Sec. 13) Robert B. Griffiths Version of 26 March 2003 References: Gisin = N. Gisin et al., Rev. Mod. Phys. 74, 145

More information

Research, Development and Simulation of Quantum Cryptographic Protocols

Research, Development and Simulation of Quantum Cryptographic Protocols http://dx.doi.org/1.5755/j1.eee.19.4.17 Research, Development and Simulation of Quantum Cryptographic Protocols C. Anghel 1 1 University Dunărea de Jos Galati, 2 Științei, 8146 Galati, Romania, phone:

More information

Realization of B92 QKD protocol using id3100 Clavis 2 system

Realization of B92 QKD protocol using id3100 Clavis 2 system Realization of B92 QKD protocol using id3100 Clavis 2 system Makhamisa Senekane 1, Abdul Mirza 1, Mhlambululi Mafu 1 and Francesco Petruccione 1,2 1 Centre for Quantum Technology, School of Chemistry and

More information

Problem Set: TT Quantum Information

Problem Set: TT Quantum Information Problem Set: TT Quantum Information Basics of Information Theory 1. Alice can send four messages A, B, C, and D over a classical channel. She chooses A with probability 1/, B with probability 1/4 and C

More information

Ground-Satellite QKD Through Free Space. Steven Taylor

Ground-Satellite QKD Through Free Space. Steven Taylor Ground-Satellite QKD Through Free Space Steven Taylor Quantum Computation and Quantum Information, Spring 2014 Introduction: In this paper I will provide a brief introduction on what Quantum Key Distribution

More information

Entanglement and information

Entanglement and information Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit

More information

Transmitting and Hiding Quantum Information

Transmitting and Hiding Quantum Information 2018/12/20 @ 4th KIAS WORKSHOP on Quantum Information and Thermodynamics Transmitting and Hiding Quantum Information Seung-Woo Lee Quantum Universe Center Korea Institute for Advanced Study (KIAS) Contents

More information

Lecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography

Lecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography CS 7880 Graduate Cryptography September 10, 2015 Lecture 1: Perfect Secrecy and Statistical Authentication Lecturer: Daniel Wichs Scribe: Matthew Dippel 1 Topic Covered Definition of perfect secrecy One-time

More information

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of Seminar Report On QUANTUM CRYPTOGRAPHY Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of Master of Technology in Computer and Information Science DEPARTMENT OF COMPUTER

More information

DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY.

DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY. DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY. Ajit Singh 1 and Nidhi Sharma 2 Department of Computer Science & Engineering and Information Technology BPS Mahila Vishwavidyalaya,

More information

A Matlab Realization of Shor s Quantum Factoring Algorithm

A Matlab Realization of Shor s Quantum Factoring Algorithm 1 A Matlab Realization of Shor s Quantum Factoring Algorithm S. Jha, P. Chatterjee, A.Falor and M. Chakraborty, Member IEEE Department of Information Technology Institute of Engineering & Management Kolkata,

More information

Cryptography in a quantum world

Cryptography in a quantum world T School of Informatics, University of Edinburgh 25th October 2016 E H U N I V E R S I T Y O H F R G E D I N B U Outline What is quantum computation Why should we care if quantum computers are constructed?

More information

Quantum Information Transfer and Processing Miloslav Dušek

Quantum Information Transfer and Processing Miloslav Dušek Quantum Information Transfer and Processing Miloslav Dušek Department of Optics, Faculty of Science Palacký University, Olomouc Quantum theory Quantum theory At the beginning of 20 th century about the

More information

The Relativistic Quantum World

The Relativistic Quantum World The Relativistic Quantum World A lecture series on Relativity Theory and Quantum Mechanics Marcel Merk University of Maastricht, Sept 24 Oct 15, 2014 Relativity Quantum Mechanics The Relativistic Quantum

More information

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance. 9. Distance measures 9.1 Classical information measures How similar/close are two probability distributions? Trace distance Fidelity Example: Flipping two coins, one fair one biased Head Tail Trace distance

More information

Quantum cryptography. Quantum cryptography has a potential to be cryptography of 21 st century. Part XIII

Quantum cryptography. Quantum cryptography has a potential to be cryptography of 21 st century. Part XIII Quantum cryptography Part XIII Quantum cryptography Quantum cryptography has a potential to be cryptography of st century. An important new feature of quantum cryptography is that security of quantum cryptographic

More information

arxiv:quant-ph/ v2 2 Jan 2007

arxiv:quant-ph/ v2 2 Jan 2007 Revisiting controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding arxiv:quant-ph/06106v Jan 007 Jun Liu 1, Yan Xia and Zhan-jun Zhang 1,, 1

More information

arxiv:quant-ph/ v2 3 Oct 2000

arxiv:quant-ph/ v2 3 Oct 2000 Quantum key distribution without alternative measurements Adán Cabello Departamento de Física Aplicada, Universidad de Sevilla, 0 Sevilla, Spain January, 0 arxiv:quant-ph/990v Oct 000 Entanglement swapping

More information

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states

More information

Uncertainty Principle

Uncertainty Principle Uncertainty Principle n n A Fourier transform of f is a function of frequency v Let be Δv the frequency range n It can be proved that ΔtΔv 1/(4 π) n n If Δt is small, f corresponds to a small interval

More information

Quantum Wireless Sensor Networks

Quantum Wireless Sensor Networks Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.

More information

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech + Quantum Entanglement and Cryptography Deepthi Gopal, Caltech + Cryptography Concisely: to make information unreadable by anyone other than the intended recipient. The sender of a message scrambles/encrypts

More information

Cyber Security in the Quantum Era

Cyber Security in the Quantum Era T Computer Security Guest Lecture University of Edinburgh 27th November 2017 E H U N I V E R S I T Y O H F R G E D I N B U Outline Quantum Computers: Is it a threat to Cyber Security? Why should we act

More information

arxiv:quant-ph/ v1 13 Jan 2003

arxiv:quant-ph/ v1 13 Jan 2003 Deterministic Secure Direct Communication Using Ping-pong protocol without public channel Qing-yu Cai Laboratory of Magentic Resonance and Atom and Molecular Physics, Wuhan Institute of Mathematics, The

More information

Expand the Quantum Cipher-text Space by Using a Superposition Key

Expand the Quantum Cipher-text Space by Using a Superposition Key International Journal of Computer Networks and Communications Security VOL. 3, NO. 7, JULY 2015, 283 290 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Expand the

More information

Security and implementation of differential phase shift quantum key distribution systems

Security and implementation of differential phase shift quantum key distribution systems Security and implementation of differential phase shift quantum key distribution systems Eleni Diamanti University Ph.D. Oral Examination June 1 st, 2006 Classical cryptography cryptography = κρυπτός +

More information

Device-Independent Quantum Information Processing

Device-Independent Quantum Information Processing Device-Independent Quantum Information Processing Antonio Acín ICREA Professor at ICFO-Institut de Ciencies Fotoniques, Barcelona Chist-Era kick-off seminar, March 2012, Warsaw, Poland Quantum Information

More information

Perfectly secure cipher system.

Perfectly secure cipher system. Perfectly secure cipher system Arindam Mitra Lakurdhi, Tikarhat Road, Burdwan 713102 India Abstract We present a perfectly secure cipher system based on the concept of fake bits which has never been used

More information

U.C. Berkeley CS276: Cryptography Luca Trevisan February 5, Notes for Lecture 6

U.C. Berkeley CS276: Cryptography Luca Trevisan February 5, Notes for Lecture 6 U.C. Berkeley CS276: Cryptography Handout N6 Luca Trevisan February 5, 2009 Notes for Lecture 6 Scribed by Ian Haken, posted February 8, 2009 Summary The encryption scheme we saw last time, based on pseudorandom

More information

Alternative Approaches Quantum Cryptography and Bounded Storage Model

Alternative Approaches Quantum Cryptography and Bounded Storage Model JASS 05 - Course 1 Alternative Approaches Quantum Cryptography and Bounded Storage Model Andreas Würfl 28th March 2005 Abstract Several encryption algorithms have been discussed in the course of this seminar.

More information

Number theory (Chapter 4)

Number theory (Chapter 4) EECS 203 Spring 2016 Lecture 12 Page 1 of 8 Number theory (Chapter 4) Review Compute 6 11 mod 13 in an efficient way What is the prime factorization of 100? 138? What is gcd(100, 138)? What is lcm(100,138)?

More information

Quantum cryptography -the final battle?

Quantum cryptography -the final battle? Quantum cryptography -the final battle? CS4236 Principles of Computer Security National University of Singapore Jonas Rundberg, NT030157A This presentation Quantum mechanics Introduction Notation Polarized

More information

EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY

EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY DISTRIBUTION WITH ENTANGLED PHOTONS FOLLOWING THE PING- PONG CODING PROTOCOL Martin Ostermeyer, Nino Walenta University of Potsdam, Institute of Physics, Nonlinear

More information

EPR paradox, Bell inequality, etc.

EPR paradox, Bell inequality, etc. EPR paradox, Bell inequality, etc. Compatible and incompatible observables AA, BB = 0, then compatible, can measure simultaneously, can diagonalize in one basis commutator, AA, BB AAAA BBBB If we project

More information

Quantum Cryptography Bertrand Bonnefoy-Claudet Zachary Estrada

Quantum Cryptography Bertrand Bonnefoy-Claudet Zachary Estrada Quantum Cryptography Bertrand Bonnefoy-Claudet Zachary Estrada Crypto against modern computers No known attack against RSA, AES,... yet They are not proven (and they cannot be) Crypto against modern computers

More information

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography) Journal of Computer Science 3 (6): 44-49, 7 ISSN 549-3636 7 Science Publications Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography) Iyed Ben Slimen, Olfa Trabelsi, Houria

More information

Quantum Cryptography in Full Daylight Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Ilja Gerhardt Lamas-Linares and Christian Kurtsiefer

Quantum Cryptography in Full Daylight Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Ilja Gerhardt Lamas-Linares and Christian Kurtsiefer Centre for Quantum Technologies, Singapore QUANTUM OPTICS Entanglement-based Free Space Quantum Cryptography in Full Daylight, Matthew P. Peloso, Caleb Ho, Antía Lamas-Linares and Christian Kurtsiefer

More information

Quantum key distribution

Quantum key distribution Quantum key distribution Eleni Diamanti eleni.diamanti@telecom-paristech.fr LTCI, CNRS, Télécom ParisTech Paris Centre for Quantum Computing Photonics@be doctoral school May 10, 2016 1 Outline Principles

More information

Introduction to Quantum Key Distribution

Introduction to Quantum Key Distribution Fakultät für Physik Ludwig-Maximilians-Universität München January 2010 Overview Introduction Security Proof Introduction What is information? A mathematical concept describing knowledge. Basic unit is

More information

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C Security of Quantum Cryptography using Photons for Quantum Key Distribution Karisa Daniels & Chris Marcellino Physics C191C Quantum Key Distribution QKD allows secure key distribution Keys are then used

More information

Quantum Communication. Serge Massar Université Libre de Bruxelles

Quantum Communication. Serge Massar Université Libre de Bruxelles Quantum Communication Serge Massar Université Libre de Bruxelles Plan Why Quantum Communication? Prepare and Measure schemes QKD Using Entanglement Teleportation Communication Complexity And now what?

More information

Single and Entangled photons. Edward Pei

Single and Entangled photons. Edward Pei Single and Entangled photons Edward Pei War is most commonly thought of as men fighting with their fist, and power is determined by physical strength. Behind the lines, however, knowledge is power. For

More information

ON THE POSSIBILITY OF NONLINEAR QUANTUM EVOLUTION AND SUPERLUMINAL COMMUNICATION

ON THE POSSIBILITY OF NONLINEAR QUANTUM EVOLUTION AND SUPERLUMINAL COMMUNICATION ON THE POSSIBILITY OF NONLINEAR QUANTUM EVOLUTION AND SUPERLUMINAL COMMUNICATION Shan Gao Institute for the History of Natural Sciences, Chinese Academy of Sciences Beijing 100190, People's Republic of

More information

Calculation of the Key Length for Quantum Key Distribution

Calculation of the Key Length for Quantum Key Distribution http://dx.doi.org/10.5755/j01.eee.21.6.13768 ELEKTRONIKA IR ELEKTROTECHNIKA, ISSN 1392-1215, VOL. 21, NO. 6, 2015 Calculation of the Key Length for Quantum Key Distribution Miralem Mehic 1, Marcin Niemiec

More information

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE WCCI July, 2016

More information

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security Hacking Quantum Cryptography Marina von Steinkirch ~ Yelp Security Agenda 1. Quantum Mechanics in 10 mins 2. Quantum Computing in 11 mins 3. Quantum Key Exchange in 100 mins (or more minutes) Some disclaimers

More information

Classical Verification of Quantum Computations

Classical Verification of Quantum Computations Classical Verification of Quantum Computations Urmila Mahadev UC Berkeley September 12, 2018 Classical versus Quantum Computers Can a classical computer verify a quantum computation? Classical output (decision

More information

Outline. Computer Science 418. Number of Keys in the Sum. More on Perfect Secrecy, One-Time Pad, Entropy. Mike Jacobson. Week 3

Outline. Computer Science 418. Number of Keys in the Sum. More on Perfect Secrecy, One-Time Pad, Entropy. Mike Jacobson. Week 3 Outline Computer Science 48 More on Perfect Secrecy, One-Time Pad, Mike Jacobson Department of Computer Science University of Calgary Week 3 2 3 Mike Jacobson (University of Calgary) Computer Science 48

More information

Cryptography. P. Danziger. Transmit...Bob...

Cryptography. P. Danziger. Transmit...Bob... 10.4 Cryptography P. Danziger 1 Cipher Schemes A cryptographic scheme is an example of a code. The special requirement is that the encoded message be difficult to retrieve without some special piece of

More information

INTRODUCTION TO QUANTUM COMPUTING

INTRODUCTION TO QUANTUM COMPUTING INTRODUCTION TO QUANTUM COMPUTING Writen by: Eleanor Rieffel and Wolfgang Polak Presented by: Anthony Luaders OUTLINE: Introduction Notation Experiment Quantum Bit Quantum Key Distribution Multiple Qubits

More information

Cryptanalysis of the Light-Weight Cipher A2U2 First Draft version

Cryptanalysis of the Light-Weight Cipher A2U2 First Draft version Cryptanalysis of the Light-Weight Cipher A2U2 First Draft version Mohamed Ahmed Abdelraheem, Julia Borghoff, Erik Zenner Technical University of Denmark, DK-2800 Kgs. Lyngby, Denmark {M.A.Abdelraheem,J.Borghoff,E.Zenner}@mat.dtu.dk

More information

arxiv:quant-ph/ v1 6 Dec 2005

arxiv:quant-ph/ v1 6 Dec 2005 Quantum Direct Communication with Authentication Hwayean Lee 1,,4, Jongin Lim 1,, HyungJin Yang,3 arxiv:quant-ph/051051v1 6 Dec 005 Center for Information Security TechnologiesCIST) 1, Graduate School

More information

Lecture Notes. Advanced Discrete Structures COT S

Lecture Notes. Advanced Discrete Structures COT S Lecture Notes Advanced Discrete Structures COT 4115.001 S15 2015-01-27 Recap ADFGX Cipher Block Cipher Modes of Operation Hill Cipher Inverting a Matrix (mod n) Encryption: Hill Cipher Example Multiple

More information

Quantum Entanglement Assisted Key Distribution

Quantum Entanglement Assisted Key Distribution Quantum Entanglement Assisted Key Distribution Ke Tang *, Ping Ji *+, Xiaowen Zhang * Graduate Center, City University of New York, ke.tang@qc.cuny.edu + John Jay College of Criminal Justice, City University

More information

Mobile Free Space Quantum Key Distribution for short distance secure communication

Mobile Free Space Quantum Key Distribution for short distance secure communication DEPARTMENT OF PHYSICS LUDWIG-MAXIMILIAN-UNIVERSITY OF MUNICH Master s Thesis Mobile Free Space Quantum Key Distribution for short distance secure communication Tobias Vogl January 21, 216 Supervised by

More information

Solutions for week 1, Cryptography Course - TDA 352/DIT 250

Solutions for week 1, Cryptography Course - TDA 352/DIT 250 Solutions for week, Cryptography Course - TDA 352/DIT 250 In this weekly exercise sheet: you will use some historical ciphers, the OTP, the definition of semantic security and some combinatorial problems.

More information

Lecture 8: Wave-Particle Duality. Lecture 8, p 2

Lecture 8: Wave-Particle Duality. Lecture 8, p 2 We choose to examine a phenomenon which is impossible, absolutely impossible, to explain in any classical way, and which has in it the heart of quantum mechanics. In reality, it contains the only mystery.

More information

Notes for Lecture 17

Notes for Lecture 17 U.C. Berkeley CS276: Cryptography Handout N17 Luca Trevisan March 17, 2009 Notes for Lecture 17 Scribed by Matt Finifter, posted April 8, 2009 Summary Today we begin to talk about public-key cryptography,

More information

Secrets of Quantum Information Science

Secrets of Quantum Information Science Secrets of Quantum Information Science Todd A. Brun Communication Sciences Institute USC Quantum computers are in the news Quantum computers represent a new paradigm for computing devices: computers whose

More information

Entanglement and Quantum Teleportation

Entanglement and Quantum Teleportation Entanglement and Quantum Teleportation Stephen Bartlett Centre for Advanced Computing Algorithms and Cryptography Australian Centre of Excellence in Quantum Computer Technology Macquarie University, Sydney,

More information

PERFECT SECRECY AND ADVERSARIAL INDISTINGUISHABILITY

PERFECT SECRECY AND ADVERSARIAL INDISTINGUISHABILITY PERFECT SECRECY AND ADVERSARIAL INDISTINGUISHABILITY BURTON ROSENBERG UNIVERSITY OF MIAMI Contents 1. Perfect Secrecy 1 1.1. A Perfectly Secret Cipher 2 1.2. Odds Ratio and Bias 3 1.3. Conditions for Perfect

More information

John Preskill, Caltech Biedenharn Lecture 2 8 September The security of quantum cryptography

John Preskill, Caltech Biedenharn Lecture 2 8 September The security of quantum cryptography John Preskill, Caltech Biedenharn Lecture 2 8 September 2005 The security of quantum cryptography The Quantum Century Though quantum theory is more than 100 years old, there are profound aspects of the

More information

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen Entanglement arnoldzwicky.org Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen PHYS403, July 26, 2017 Entanglement A quantum object can

More information

Quantum key distribution with authentication

Quantum key distribution with authentication Quantum key distribution with authentication Guihua Zeng, Xinmei Wang National Key Lab. on ISDN, XiDian University, Xi an 710071, P.R.China Abstract The security of the previous quantum key distribution

More information

Experimental realization of quantum cryptography communication in free space

Experimental realization of quantum cryptography communication in free space Science in China Ser. G Physics, Mechanics & Astronomy 2005 Vol.48 No.2 237 246 237 Experimental realization of quantum cryptography communication in free space WANG Chuan 1, ZHANG Jingfu 1, WANG Pingxiao

More information

Applications of Quantum Key Distribution (QKD)

Applications of Quantum Key Distribution (QKD) Applications of Quantum Key Distribution (QKD) Olav Tirkkonen, Iikka Elonsalo, Jari Lietzen, Teemu Manninen, Ilkka Tittonen, Roope Vehkalahti Departments of Communications and Networking & Micro and Nano,

More information

arxiv:quant-ph/ v1 13 Mar 2007

arxiv:quant-ph/ v1 13 Mar 2007 Quantum Key Distribution with Classical Bob Michel Boyer 1, Dan Kenigsberg 2 and Tal Mor 2 1. Département IRO, Université de Montréal Montréal (Québec) H3C 3J7 CANADA 2. Computer Science Department, Technion,

More information

arxiv:quant-ph/ v2 7 Nov 2001

arxiv:quant-ph/ v2 7 Nov 2001 Quantum key distribution using non-classical photon number correlations in macroscopic light pulses A.C. Funk and M.G. Raymer Oregon Center for Optics and Department of Physics, University of Oregon, Eugene,

More information

Lecture 2: Perfect Secrecy and its Limitations

Lecture 2: Perfect Secrecy and its Limitations CS 4501-6501 Topics in Cryptography 26 Jan 2018 Lecture 2: Perfect Secrecy and its Limitations Lecturer: Mohammad Mahmoody Scribe: Mohammad Mahmoody 1 Introduction Last time, we informally defined encryption

More information

On the possibility of nonlinear quantum evolution and superluminal communication

On the possibility of nonlinear quantum evolution and superluminal communication Hot Topics in Physical Information (HoTPI-2013) International Journal of Modern Physics: Conference Series Vol. 33 (2014) 1460359 (6 pages) The Author DOI: 10.1142/S2010194514603597 On the possibility

More information