International Conference on Computer and Intelligent Systems (ICCIS’2012) & International Conference of Electrical, Electronics, Instrumentation and Biomedical Engineering (ICEEIB’2012) Dec. 28-29, 2012 Bangkok (Thailand) 23 AbstractInformation security is one of the vital issues in modern communication networks. Most secure protocols used cryptography algorithm to protect a communication networks against various attacks. Efficient security mechanisms designed to mitigate the impact of attacks. In this article, a type of security mechanism utilized quantum cryptography in social networks. The process of Quantum Cryptography used Fuzzy Logic Controller (FLC) to tackle the network’s attacks. The proposed Fuzzy Quantum Cryptography (FQC) method compared with the PKI methods. The experimental result shows the impact of FQC. KeywordsCryptography, Fuzzy, Quantum, Security, Network. I. INTRODUCTION OWDAYS, social networks, as a virtual community providesaccessible connections to ahugenumber ofresources.The main ultimate in social networks is to provide a method for sharing resourcesin order to access information. The social networks utilized a large number of members, so it is very difficult to control user behavior. In other word, user information may be compromised by other unknown user. However, the security strategy adopts to detect abnormal behavior of system. For instance, to identify intruders, security solutions such as cryptography adopts to defense against attacks. Although, security system optimizes,intruders could damage information. Different methods have been investigated to optimizethe security problem in social networks. However, the security monitoring is very costly. This paper investigated the determination of the highest level of security in a hypothetical social network by deducing an effective method of fuzzy quantum cryptography. Most researches conducted on the security of social networks to providethe degree of trust. Algorithm proposed by Golbeck et a.[1]utilized to monitor the level of trust.It limits to find the shortest path, while information sent in a long chain of members with high trust may be more accurate than that sent through a short chain with low trust. More especially, Directed Series Parallel Graph (DSPG) implemented. It includes the routes graph from source to destination as a parallel communications. The degree of trust is realized from the packets received by using logical probability. The main weakness of this algorithm is that the temporal complexity is O (V+E +M×L), where M is the average number of routes between the two nodes, and L is the average length of these routes in the trust graph [2]. To mitigate the problem of security in social network, a method comprises combination of quantum cryptography in linear methodsto raise the level of privacy. The main objective of the linear quantum cryptography is to reduce the impact of unknown behavior in dimensions of social networks. Experimental results show that the higher level of security achieved[3]. A cryptography utilized quantum TLS Handshake (TLS protocol). The main advantages of this protocol include: changing messages performs the quantum handshake easily and cost of acquiring unconditional security is very low [4]. However, traditional cryptography could not provide the cost consuming. To overcome the method of detection, an expert system designed in wireless sensor network. Expert system utilized fuzzy rules to distinguish reliable node among unreliable nodes in routing protocol [5].More recently, expert system adopts in WSN to detect anomaly behavior in gas pipeline. The experimental result shows the impact of expert system together with fuzzy rules in gas consumption pattern [6]. This article is organized as follows: section 2 explains the related work. In section 3 we describe the fuzzy logic quantum cryptography. Section 4 compares the propose method. Section 5 concludes. Cooperative Multi-agent System Based on Fuzzy Quantum Cryptography Hossein Javidnia, Shahaboddin Shamshirband, Miss Laiha Mat Kiah N Hossein Javidnia is associated with Department of Information Technology, Payame , Noor University,Sari, Iran. Shahaboddin Shamshirband is associated with Department of Computer System and Technology,, University of Malaya, Kuala Lumpur, Malaysia(shahab1396@gmail.com) Miss Laiha Mat Kiah is associated with Department of Computer System and Technology,, University of Malaya, Kuala Lumpur, Malaysia.