TY - BOOK AU - Takagi,Tsuyoshi AU - Wakayama,Masato AU - Tanaka,Keisuke AU - Kunihiro,Noboru AU - Kimoto,Kazufumi AU - Ikematsu,Yasuhiko ED - SpringerLink (Online service) TI - International Symposium on Mathematics, Quantum Theory, and Cryptography: Proceedings of MQC 2019 T2 - Mathematics for Industry, SN - 9789811551918 AV - TA329-348 U1 - 620 23 PY - 2021/// CY - Singapore PB - Springer Nature Singapore, Imprint: Springer KW - Engineering mathematics KW - Engineering KW - Data processing KW - Data structures (Computer science) KW - Information theory KW - Quantum computers KW - Data protection KW - Mathematical and Computational Engineering Applications KW - Data Structures and Information Theory KW - Quantum Computing KW - Data and Information Security N1 - Sustainable Cryptography -- What Kind of Insight Provide Analytical Solutions of Quantum Models? -- Emerging Ultrastrong Coupling between Light and Matter Observed in Circuit Quantum Electrodynamics -- Quantum Random Numbers Generated by a Cloud Superconducting Quantum Computer -- Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments -- A Review of Secret Key Distribution Based on Bounded Observability -- Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory -- Number Theoretic Study in Quantum Interactions -- From the Bloch Sphere to Phase Space Representations with the Gottesman-Kitaev-Preskill Encoding -- A Data Concealing Technique with Random Noise Disturbance and A Restoring Technique for the Concealed Data by Stochastic Process Estimation; Open Access N2 - This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardizepost-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography UR - https://doi.org/10.1007/978-981-15-5191-8 ER -