000 04740nam a22006735i 4500
001 978-981-15-5191-8
003 DE-He213
005 20240508090327.0
007 cr nn 008mamaa
008 201022s2021 si | s |||| 0|eng d
020 _a9789811551918
_9978-981-15-5191-8
024 7 _a10.1007/978-981-15-5191-8
_2doi
050 4 _aTA329-348
050 4 _aTA345-345.5
072 7 _aTBJ
_2bicssc
072 7 _aTEC009000
_2bisacsh
072 7 _aTBJ
_2thema
082 0 4 _a620
_223
245 1 0 _aInternational Symposium on Mathematics, Quantum Theory, and Cryptography
_h[electronic resource] :
_bProceedings of MQC 2019 /
_cedited by Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Yasuhiko Ikematsu.
250 _a1st ed. 2021.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2021.
300 _aXII, 274 p. 63 illus., 23 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aMathematics for Industry,
_x2198-3518 ;
_v33
505 0 _aSustainable Cryptography -- What Kind of Insight Provide Analytical Solutions of Quantum Models? -- Emerging Ultrastrong Coupling between Light and Matter Observed in Circuit Quantum Electrodynamics -- Quantum Random Numbers Generated by a Cloud Superconducting Quantum Computer -- Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments -- A Review of Secret Key Distribution Based on Bounded Observability -- Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory -- Number Theoretic Study in Quantum Interactions -- From the Bloch Sphere to Phase Space Representations with the Gottesman-Kitaev-Preskill Encoding -- A Data Concealing Technique with Random Noise Disturbance and A Restoring Technique for the Concealed Data by Stochastic Process Estimation.
506 0 _aOpen Access
520 _aThis open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardizepost-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography.
650 0 _aEngineering mathematics.
650 0 _aEngineering
_xData processing.
650 0 _aData structures (Computer science).
650 0 _aInformation theory.
650 0 _aQuantum computers.
650 0 _aData protection.
650 1 4 _aMathematical and Computational Engineering Applications.
650 2 4 _aData Structures and Information Theory.
650 2 4 _aQuantum Computing.
650 2 4 _aData and Information Security.
700 1 _aTakagi, Tsuyoshi.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aWakayama, Masato.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aTanaka, Keisuke.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aKunihiro, Noboru.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aKimoto, Kazufumi.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aIkematsu, Yasuhiko.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811551901
776 0 8 _iPrinted edition:
_z9789811551925
776 0 8 _iPrinted edition:
_z9789811551932
830 0 _aMathematics for Industry,
_x2198-3518 ;
_v33
856 4 0 _uhttps://doi.org/10.1007/978-981-15-5191-8
912 _aZDB-2-SMA
912 _aZDB-2-SXMS
912 _aZDB-2-SOB
999 _c37743
_d37743