Implementing a Quantum Coin Scheme

Quantum computing has the power to break current cryptographic systems, disrupting online banking, shopping, data storage and communications. Quantum computing also has the power to support stronger more resistant technologies. In this paper, we describe a digital cash scheme created by Dmitry Gavinsky, which utilises the capability of quantum computing. We contribute by setting out the methods for implementing this scheme. For both the creation and verification of quantum coins we convert the algebraic steps into computing steps. As part of this, we describe the methods used to convert information stored on classical bits to information stored on quantum bits.

[1]  M. Mosca,et al.  Quantum Coins , 2009, 0911.1295.

[2]  Jane Qiu,et al.  Quantum communications leap out of the lab , 2014, Nature.

[3]  Pieter E. Vermaas,et al.  Quantum internet : The internet's next big step , 2019 .

[4]  Amos Fiat,et al.  Untraceable Electronic Cash , 1990, CRYPTO.

[5]  W. Heisenberg Über den anschaulichen Inhalt der quantentheoretischen Kinematik und Mechanik , 1927 .

[6]  Axel Dahlberg,et al.  SimulaQron—a simulator for developing quantum internet software , 2017, Quantum Science and Technology.

[7]  Lov K. Grover A fast quantum mechanical algorithm for database search , 1996, STOC '96.

[8]  Dmitry Gavinsky Quantum Money with Classical Verification , 2012, 2012 IEEE 27th Conference on Computational Complexity.

[9]  Audun Jøsang,et al.  The Impact of Quantum Computing on Present Cryptography , 2018, ArXiv.

[10]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[11]  P. Benioff The computer as a physical system: A microscopic quantum mechanical Hamiltonian model of computers as represented by Turing machines , 1980 .

[12]  Ziv Bar-Yossef,et al.  Exponential separation of quantum and classical one-way communication complexity , 2004, STOC '04.

[13]  Pedro Chamorro-Posada,et al.  Equivalent Quantum Circuits , 2011, 1110.2998.

[14]  Gilles Brassard,et al.  Quantum Cryptography, or Unforgeable Subway Tokens , 1982, CRYPTO.

[15]  K. Igeta,et al.  Quantum mechanical computers with single atom and photon fields , 1988 .

[16]  F. Lemmermeyer Error-correcting Codes , 2005 .

[17]  Andrew Lutomirski,et al.  An online attack against Wiesner's quantum money , 2010, 1010.0256.

[18]  Thierry Paul,et al.  Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.

[19]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[20]  G. M. D'Ariano,et al.  Approximate quantum cloning and the impossibility of superluminal information transfer , 2000 .

[21]  Jian-Wei Pan,et al.  Entanglement of two quantum memories via fibres over dozens of kilometres , 2020, Nature.

[22]  J. A. Jones,et al.  Implementation of a quantum algorithm on a nuclear magnetic resonance quantum computer , 1998, quant-ph/9801027.

[23]  Stephen Wiesner,et al.  Conjugate coding , 1983, SIGA.