Evolutionary algorithms for the design of quantum protocols

Walter Krawec, Stjepan Picek, Domagoj Jakobovic*

*Corresponding author for this work

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

5 Citations (Scopus)

Abstract

In this paper, we use evolutionary algorithm to evolve customized quantum key distribution (QKD) protocols designed to counter attacks against the system in order to optimize the speed of the secure communication. This is in contrast to most work in QKD protocols, where a fixed protocol is designed and then its security is analyzed to determine how strong an attack it can withstand. We show that our system is able to find protocols that can operate securely against attacks where ordinary QKD protocols would fail. Our algorithm evolves protocols as quantum circuits, thus making the end result potentially easier to implement in practice.

Original languageEnglish
Title of host publicationApplications of Evolutionary Computation
Subtitle of host publication22nd International Conference, EvoApplications 2019, Held as Part of EvoStar 2019
EditorsPaul Kaufmann, Pedro A. Castillo
Place of PublicationCham
PublisherSpringer
Pages220-236
Number of pages17
ISBN (Electronic)978-3-030-16692-2
ISBN (Print)978-3-030-16691-5
DOIs
Publication statusPublished - 2019
Event22nd International Conference on Applications of Evolutionary Computation, EvoApplications 2019, held as Part of EvoStar 2019 - Leipzig, Germany
Duration: 24 Apr 201926 Apr 2019

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11454 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference22nd International Conference on Applications of Evolutionary Computation, EvoApplications 2019, held as Part of EvoStar 2019
Country/TerritoryGermany
CityLeipzig
Period24/04/1926/04/19

Keywords

  • Evolution strategy
  • Quantum cryptography
  • Quantum simulator

Fingerprint

Dive into the research topics of 'Evolutionary algorithms for the design of quantum protocols'. Together they form a unique fingerprint.

Cite this