LEADER 06006nam 22009855 450 001 996466557703316 005 20230125211944.0 010 $a981-15-5191-X 024 7 $a10.1007/978-981-15-5191-8 035 $a(CKB)4100000011515570 035 $a(DE-He213)978-981-15-5191-8 035 $a(MiAaPQ)EBC6381426 035 $a(Au-PeEL)EBL6381426 035 $a(OCoLC)1243546856 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/63693 035 $a(PPN)253256798 035 $a(EXLCZ)994100000011515570 100 $a20201022d2021 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInternational Symposium on Mathematics, Quantum Theory, and Cryptography$b[electronic resource] $eProceedings of MQC 2019 /$fedited by Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Yasuhiko Ikematsu 205 $a1st ed. 2021. 210 $cSpringer Nature$d2021 210 1$aSingapore :$cSpringer Singapore :$cImprint: Springer,$d2021. 215 $a1 online resource (XII, 274 p. 83 illus., 24 illus. in color.) 225 1 $aMathematics for Industry,$x2198-350X ;$v33 311 $a981-15-5190-1 327 $aSustainable Cryptography -- What Kind of Insight Provide Analytical Solutions of Quantum Models? -- Emerging Ultrastrong Coupling between Light and Matter Observed in Circuit Quantum Electrodynamics -- Quantum Random Numbers Generated by a Cloud Superconducting Quantum Computer -- Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments -- A Review of Secret Key Distribution Based on Bounded Observability -- Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory -- Number Theoretic Study in Quantum Interactions -- From the Bloch Sphere to Phase Space Representations with the Gottesman-Kitaev-Preskill Encoding -- A Data Concealing Technique with Random Noise Disturbance and A Restoring Technique for the Concealed Data by Stochastic Process Estimation. 330 $aThis open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography. 410 0$aMathematics for Industry,$x2198-350X ;$v33 606 $aApplied mathematics 606 $aEngineering mathematics 606 $aData structures (Computer science) 606 $aQuantum computers 606 $aComputer security 606 $aMathematical and Computational Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/T11006 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aQuantum Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/M14070 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 610 $aMathematical and Computational Engineering 610 $aData Structures and Information Theory 610 $aQuantum Computing 610 $aSystems and Data Security 610 $aMathematical and Computational Engineering Applications 610 $aData and Information Security 610 $aCryptography for Quantum Computers 610 $aPost-quantum Cryptography 610 $aNumber Theory 610 $aRepresentation Theory 610 $aQuantum Physics 610 $aSecurity Modelling 610 $aOpen Access 610 $aMaths for engineers 610 $aAlgorithms & data structures 610 $aInformation theory 610 $aMathematical theory of computation 610 $aComputer security 610 $aNetwork security 615 0$aApplied mathematics. 615 0$aEngineering mathematics. 615 0$aData structures (Computer science). 615 0$aQuantum computers. 615 0$aComputer security. 615 14$aMathematical and Computational Engineering. 615 24$aData Structures and Information Theory. 615 24$aQuantum Computing. 615 24$aSystems and Data Security. 676 $a519 700 $aTakagi$b Tsuyoshi$4edt$01354919 702 $aTakagi$b Tsuyoshi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWakayama$b Masato$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTanaka$b Keisuke$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKunihiro$b Noboru$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKimoto$b Kazufumi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aIkematsu$b Yasuhiko$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466557703316 996 $aInternational Symposium on Mathematics, Quantum Theory, and Cryptography$93358688 997 $aUNISA