Abstract
A simple and cheap method of secret coding in an optical line is proposed based on multiple-valued logic. This method is shown to have very high cryptography resources and is designated for bidirectional information exchange in a team of mobile robots, where quantum teleportation coding cannot yet be realized. On the one hand, this method in some situations can be regarded as a rival for cryptography quantum teleportation protocols and, on the other hand, this approach seems to be applicable to optical communication lines in future micro-multi-agent systems.
Similar content being viewed by others
References
C. H. Benett, G. Brassard, C. Crepeau, R. Jozsa, A. Peres, and W. K. Wootters, Phys. Rev. Lett., 70, 1895 (1993).
D. Bouwmeester, J.-W. Pan, M. Mattle, H. Weinfurter, and A. Zeilinger, Nature, 390, 575 (1997).
D. C. Rine (Editor), Computer Science and Multiple-Valued Logic: Theory and Applications, North Holland, Amsterdam (1984).
L. A. Zadeh, The Concept of a Linguistic Variable and Its Application to Approximate Reasoning, Elsevier, New York (1973).
E. Cox, The Fuzzy Systems Handbook, Academic Press, Cambridge, MA (1994).
L. Liu, Opt. Commun., 73, 183 (1989).
T. Konishi, J. Tanida, and Y. Ichioka, Appl. Opt., 34, 3097 (1995).
M. L. Arestova and A. Yu. Bykovsky, Quantum Electron., 25, 945 (1995).
H. Itoh, T. Yamada, S. Mukai, et. al., Appl. Opt., 36, 808 (1997).
E. Gur, D. Mendlovic, and Z. Zalevsky, Appl. Opt., 38, 4354 (1999).
M. Jamshidi, Soft Comput., 1, 42 (1997).
A. Gegov, Distributed Fuzzy Control of Multivariable Systems, Kluwer Academic, Dordrecht (1996).
A. Yu. Bykovsky and Yu. K. Moroko, Kratk. Soobshch. Fiz., 2, 9 (2003).
M. Tambe, Artificial Intelligence, 7, 83 (1997).
D. Fox, W. Burgard, H. Kruppa, and S. Thrun, Autonomous Robots, 8, 325 (2000).
V. B. Tarasov, From Multiagent Systems to Intellectual Organizations: Philosophy, Psychology, Informatics [in Russian], URSS Publishers, Moscow (2002).
A. Yu. Bykovsky, I.V. Vladimirov, and I. N. Kompanets, Radiotekhnika (2006, in press).
L. Vaidman, Phys. Rev. A, 49, 1473 (1994).
V. N. Gorbachev, A. I. Zhiliba, and A. I. Trubilko, J. Opt. B: Quantum Semiclass. Opt., 3, S25 (2001).
http://www.foster-miller.com/projectexamples/t_r_military/talon_robots.htm
M. Warneke, B. Liebowitz, and K. Pister, IEEE Computer Magazine (Jan 2001), p. 44.
H.-A. Bachor and T. C. Ralph, A Guide to Experiments in Quantum Optics, Second Edition, Wiley-VCH, Weinheim (2004).
R. J. Pressley (Editor), Handbook of Lasers with Selected Data on Optical Technology, Chemical Rubber Co., Cleveland (1971).
http://www.tinyos.net/ / http://webs.cs.berkeley.edu/
G. Korn and T. Korn, Mathematical Handbook for Scientists and Engineers, Mcgraw-Hill, New York (1968).
Bruce Schneier, Applied Cryptography. Protocols, Algorithms, and Source Code in C, Wiley, New York (2000).
L. K. Grover, “A fast mechanical algorithm for database search,” Proceedings of the 28 Annual ACM Symposium on the Theory of Computing (Philadelphia, Pennsylvania, 22–24 May 1996), p. 212.
Author information
Authors and Affiliations
Additional information
Manuscript submitted by the authors in English on April 27, 2006.
Rights and permissions
About this article
Cite this article
Antipov, A.L., Bykovsky, A.Y., Vasiliev, N.A. et al. Multiple-valued logic-protected coding for an optical non-quantum communication line. J Russ Laser Res 27, 492–505 (2006). https://doi.org/10.1007/s10946-006-0031-y
Issue Date:
DOI: https://doi.org/10.1007/s10946-006-0031-y