Quantum cryptography and its applications over the internet

Quantum computing can effectively and efficiently perform dense coding, teleportation, prime factoring, and database search methods. Quantum cryptography can be used in secret sharing, secure computation, and secure direct communications. Cloud computing and e-commerce are also ensured by applying quantum computation. In this article we introduce existing solutions and possible quantum cryptography applications over the Internet.

[1]  Han-Chieh Chao,et al.  Distributed quantum entanglement sharing model for high-performance real-time system , 2012, Soft Comput..

[2]  Roland Sauerbrey,et al.  Biography , 1992, Ann. Pure Appl. Log..

[3]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[4]  Yueh-Min Huang,et al.  A quantum-inspired Tabu search algorithm for solving combinatorial optimization problems , 2013, Soft Computing.

[5]  Lov K. Grover A fast quantum mechanical algorithm for database search , 1996, STOC '96.

[6]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[7]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[8]  Han-Chieh Chao,et al.  Using GHZ-State for Multiparty Quantum Secret Sharing Without Code Table , 2013, Comput. J..

[9]  Dirk Bouwmeester,et al.  The physics of quantum information: quantum cryptography, quantum teleportation, quantum computation , 2010, Physics and astronomy online library.

[10]  Yao-Hsin Chou,et al.  An efficient novel online shopping mechanism based on quantum communication , 2014, Electron. Commer. Res..

[11]  Han-Chieh Chao,et al.  Quantum Secure Communication Network Protocol with Entangled Photons for Mobile Communications , 2014, Mob. Networks Appl..

[12]  Han-Chieh Chao,et al.  Cryptanalysis the Security of Enhanced Multiparty Quantum Secret Sharing of Classical Messages by Using Entanglement Swapping , 2012, International Journal of Theoretical Physics.

[13]  Yao-Hsin Chou,et al.  Controlled Bidirectional Quantum Secure Direct Communication , 2014, TheScientificWorldJournal.

[14]  Halim Fathoni,et al.  DEPARTMENT OF COMPUTER SCIENCE AND INFORMATION ENGINEERING , 2008 .

[15]  H. Chao,et al.  Classical and quantum-inspired electromagnetism-like mechanism and its applications , 2012 .

[16]  Gábor Erdélyi,et al.  Quantum cryptography: A survey , 2007, CSUR.

[17]  Jong Hyuk Park,et al.  Quantum entanglement and non-locality based secure computation for future communication , 2011, IET Inf. Secur..