Chinese Journal of Network and Information Security ›› 2016, Vol. 2 ›› Issue (3): 17-27.doi: 10.11959/j.issn.2096-109x.2016.00026

• summarize • Previous Articles     Next Articles

Shaping the future of commercial quantum computer and the challenge for information security

Chao WANG1(),Yun-jiang WANG2,Feng HU1   

  1. 1 Key Laboratory of Special Fiber Optics and Optical Access Networks(SCIE), Shanghai University, Shanghai 200072
    2 State Key Laboratory of Integrated Services Networks (ISN), Xidian University, Xi’an 710071, China
  • Revised:2016-02-20 Online:2016-12-01 Published:2016-04-20
  • Supported by:
    Key Program of National Science Foundation of China(61332019);The National Natural Science Foundation of China(61572304);The National Natural Science Foundation of China(61272096);The National Natural Science Foundation of China(61301172);The National Natural Science Foundation of China(61502376);Shanghai Key Laboratory of Specialty Fiber Optics and Optical Access Networks(SKLSFO2014-06);Ph.D. Program Foundation of Ministry of Education of China(20120203120001);The Fundamental Research Fund for the Central University(JB140105);The Fundamental Research Fund for the Central University(JB151204);The 111 Program(No.B08038)

Abstract:

The progress on universal quantum computer devices is show, so that attacking the 1 024 bit RSA by Shor algorithm is impractical currently. The modern cryptography still has strong security. Take the quantum devices constraints into consideration was proposed for the first time, the storage of former registers in the Shor algorithm should be 100 or less Qubits theoretically decreased from 1 000 or more Qubits. Quantum artificial intelligence, as the rapid progress of special quantum computer, was regarded as the new generation computing idea which met the goal of national strategic computing initiative(NSCI). With the wide applications in the field of machine learning and artificial intelligence, importance to the influences of quantum artificial intelligence on the big data security on internet should be attached. Additionally, it was the first time to use the quantum computer for designing cryptography and it shed an interesting light on cryptography design based on the quantum artificial intelligence which had not been reported anywhere before.

Key words: Canadian quantum computer, quantum artificial intelligence, quantum tunneling effect, quantum error correction, quantum cognition

CLC Number: 

No Suggested Reading articles found!