Multiple-Valued Logic Modelling for Agents Controlled via Optical Networks

被引:6
作者
Bykovsky, Alexey Yu. [1 ]
机构
[1] RAS, PN Lebedev Phys Inst, Leninsky Pr 53, Moscow 119991, Russia
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 03期
关键词
multiple-valued logic; data verification; quantum key; linked list; ledger; QUANTUM CRYPTOGRAPHY; COMMUNICATION; SECURITY; SYSTEMS;
D O I
10.3390/app12031263
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The methods of data verification are discussed, which are intended for the distant control of autonomous mobile robotic agents via networks, combining optical data links. The problem of trust servers is considered for position verification and position-based cryptography tasks. In order to obtain flexible quantum and classical verification procedures, one should use the collective interaction of agents and network nodes, including some elements of the blockchain. Multiple-valued logic functions defined within discrete k-valued Allen-Givone algebra are proposed for the logically linked list of entries and the distributed ledger, which can be used for distant data verification and breakdown restoration in mobile agents with the help of partner network nodes. A distributed ledger scheme involves the assigning by distant partners of random hash values, which further can be used as keys for access to a set of distributed data storages, containing verification and restoration data. Multiple-valued logic procedures are simple and clear enough for high-dimensional logic modelling and for the design of combined quantum and classical protocols.
引用
收藏
页数:30
相关论文
共 86 条
[11]  
Beebe N.H, 2017, MATH FUNCTION COMPUT, P353, DOI [10.1007/978-3-319-64110-2, DOI 10.1007/978-3-319-64110-2]
[12]   Random Oracles in a Quantum World [J].
Boneh, Dan ;
Dagdelen, Ozgur ;
Fischlin, Marc ;
Lehmann, Anja ;
Schaffner, Christian ;
Zhandry, Mark .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 :41-+
[13]  
Boyd RW, 2008, NONLINEAR OPTICS, 3RD EDITION, P1
[14]   Quantum cryptography beyond quantum key distribution [J].
Broadbent, Anne ;
Schaffner, Christian .
DESIGNS CODES AND CRYPTOGRAPHY, 2016, 78 (01) :351-382
[15]  
Brogan C., 2020, Trust agents: Using the web to build influence, improve reputation, and earn trust
[16]   An Analysis of the Interaction Between Intelligent Software Agents and Human Users [J].
Burr, Christopher ;
Cristianini, Nello ;
Ladyman, James .
MINDS AND MACHINES, 2018, 28 (04) :735-774
[17]  
Buterin Vitalik, 2014, CISC VIS NETW IND GL, V3, P1
[18]  
Bykovsky A.Y., 2020, Quantum Rep, V2, P126, DOI 10.3390/quantum2010010
[19]   Position-Based Cryptography with Quantum and Classical Schemes Using Multiple-Valued Logic Computing [J].
Bykovsky A.Y. .
Bulletin of the Russian Academy of Sciences: Physics, 2020, 84 (03) :289-293
[20]   Quantum cryptography and combined schemes of quantum cryptography communication networks [J].
Bykovsky, A. Yu. ;
Kompanets, I. N. .
QUANTUM ELECTRONICS, 2018, 48 (09) :777-801