Quantum encryption technology and virtual currency
bus line: Guangfo line → guang565 Road, the whole journey is about 42.0km
1. Walk about 210m from Foshan zumiao station to zumiao station
2. Take Guangfo line, pass 10 stops, reach Xilang station
3. Walk about 290m, reach Xilang station
4. Take guang565 Road, pass 33 stops, reach the broad living area station
5. Walk about 1.4km, Arrive at the science and technology cinema of Guangdong Science Center
quantum computer, quantum attack of quantum computer can solve the underlying mathematical problems, and the security foundation of cryptocurrency no longer exists. It is necessary for cryptocurrency to start to promote the anti quantum attack scheme. Abe /
Abby
in order to combat quantum attacks, we upgrade the existing
encryption algorithm
, and upgrade the
elliptic curve
cryptography technology
to lattice cryptography technology.
utilizes the quantum properties of the system. In 1970, Wiener, an American scientist, first thought of applying quantum physics to cryptography. In 1984, Bennett and blasard proposed the first scheme of quantum cryptography, which is called BB84 scheme. In 1992, Bennett put forward a more simple and efficient scheme, namely B92 scheme. Quantum cryptography is not used to transmit ciphertext, but to establish and transmit codebook
quantum cryptography system is based on the following basic principles: quantum complementarity principle (or quantum uncertainty principle), quantum non cloning and non erasable principle, thus ensuring the indecipherability of quantum cryptography system
quantum complementary principle. The Heisenberg uncertainty relation
system shows that the mechanical quantities of two operators' incompatibility cannot be determined at the same time
therefore, for the measurement of two noncommutative mechanical quantities of a quantum system,
the uncertainty relation determines that their fluctuation cannot be zero at the same time.
in a quantum state, if the value of a mechanical quantity is completely determined,
(fluctuation is zero), then the value of its noncommutative mechanical quantity is completely
uncertain. In this way, the measurement of a quantum system will inevitably cause
interference to the system, and the measurement can only obtain the incomplete information of the
state of the system before measurement. Therefore, any
eavesdropping on the coherent channel of quantum system will lead to inevitable interference, which will be immediately discovered by the cooperative users of communication; The existence of complementarity enables us to
co encode information, so as to ensure the secure communication mode
quantum non cloning theorem. The linear property of quantum mechanics makes it impossible to an unknown quantum state accurately. The quantum irrecible
lon theorem guarantees that the classical physical method of cryptanalysis by accurately ing the key is completely invalid for the quantum cryptography system based on single photon technology
the incompletely erasable theorem of a single quantum. Quantum coherence does not allow the carrier of information, a quantum state, to be arbitrarily copied and erased like the 0,1 classical information stored on the carrier of classical information.
According to reports, a few days ago, some experts said that the traditional encryption technology uses a key: the sender uses one key to encode the information, and the receiver uses another key to decode the information. However, such a key may be leaked, which will inevitably lead to eavesdropping. Quantum encryption communication has higher security
quantum communication may also be used in virtual currency anti-counterfeiting and quantum fingerprint identification. In the future, quantum networks will connect distributed quantum sensors for global earthquake monitoring. Within 5-10 years, it is expected to develop reliable photon sources and related technologies, realize long-distance quantum information transmission, and promote the theoretical research of data sharing protocol between quantum processors
hope quantum communication can develop rapidly and be applied to life
Fourth, quantum computing is to encode and manipulate data through superposition principle and quantum entanglement. In the past few decades, quantum computing only exists in theory, but in recent years, meaningful results have begun to appear. We have developed and verified a variety of quantum algorithms, and developed the prototype of quantum computer experiment. In the next five to 15 years, we are likely to make a quantum computer with practical significance
the emergence of quantum computer will bring great progress to climate simulation, drug research, materials science and other scientific research fields. However, quantum cryptography is the most anticipated. A quantum computer will be able to crack all the current encryption methods, and quantum encryption will be truly impeccable< br />
In these areas: QIS in sensing and metrology, quantum cryptography communication, quantum simulation, quantum computing
quantum sensing and measurement: many uses
There are many uses of QIS in the field of sensing and measurementusing entanglement, different quantum systems can be connected to each other, and the measurement of one system will affect the results of another system, even if these systems are physically separated. The two quantum systems are in slightly different environments and can provide information about the environment through mutual interference. Theoretically, the sensing performance of this kind of atomic interferometer is several orders of magnitude higher than that of traditional technology. In addition to inertial navigation, atomic interferometer can also be converted into gravimeter, and used for earth system monitoring and mineral precise positioning. Quantum timing devices, such as the quantum logic clock developed by NIST, are one of the most accurate timing devices in the world. Photon source and single photon detection technology can improve the calibration accuracy of photodetectors and can be used to detect trace elements
quantum encryption communication: higher security
traditional encryption technology uses key: the sender uses one key to encode the information, and the receiver uses another key to decode the information, but such key may be leaked, which will inevitably be eavesdropped. However, information can be encrypted by quantum key distribution (QKD). In QKD, the information about the key is sent by randomly polarized photons, which limits the photons to vibrate in only one plane. If the eavesdropper measures the information, the quantum state will collapse! Only the person with the exact quantum key can decrypt the information
quantum communication can also be used in virtual currency security and quantum fingerprint identification. In the future, quantum networks will connect distributed quantum sensors for global earthquake monitoring. Within 5-10 years, it is expected to develop reliable photon sources and related technologies, realize long-distance quantum information transmission, and promote the theoretical research of data sharing protocol between quantum processors
quantum simulation: modeling materials are most likely
quantum simulators use easily manipulated quantum systems to study the properties of other quantum systems that are difficult to study directly. Modeling chemical reactions and materials is one of the most possible applications of quantum simulation. Researchers can study millions of dollars of candidate materials in computers, instead of spending years and hundreds of millions of dollars to proce and characterize only a small amount of materials. Whether the goal is stronger polymer materials for aircraft, more effective automotive catalytic converters, better solar cell materials and medical procts, or more breathable fibers, the acceleration of development will bring great value
the prototype of quantum simulator based on different technologies has been verified in the laboratory environment
quantum computing: the future research of magic power
quantum computing is to realize the coding and manipulation of data through the superposition principle and the characteristics of quantum entanglement and other subatomic particles. In the past few decades, quantum computing only exists in theory, but in recent years, meaningful results have begun to appear. We have developed and verified a variety of quantum algorithms, and developed the prototype of quantum computer experiment. In the next five to 15 years, we are likely to make a quantum computer with practical significance
the emergence of quantum computer will bring great progress to climate simulation, drug research, materials science and other scientific research fields. However, quantum cryptography is the most anticipated. A quantum computer will be able to crack all the current encryption methods, and quantum encryption will be truly impeccable< br/>
scientists from Northwestern University in the United States claim that they have mastered the technology of encrypting information into codes by using the characteristics of light, and you can't crack it unless you violate the laws of nature.