Quantum state engineering with ququarts: application for deterministic QKD protocol
We discuss the proof-of-principle demonstration of the extended deterministic Quantum Key Distribution (QKD) protocol based on ququarts. The experimental realization is based on the polarization degrees of freedom of two-mode biphotons, making the process of state preparation, transformation and me...
| Main Authors: | Shurupov, Alexander P., Straupe, Stanislav S., Kulik, Sergei P., Mahmoud Ahmed, Gharib Subhi, Wahiddin, Mohamed Ridza |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IOP Publishing
2009
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/1000/ http://irep.iium.edu.my/1000/1/Quantum_state_engineering_with_ququarts-_application_for_deterministic_QKD_Protocol.pdf |
Similar Items
Nonentagled qutrits in two way deterministic QKD
by: Shamsul Shaari, Jesni, et al.
Published: (2007)
by: Shamsul Shaari, Jesni, et al.
Published: (2007)
Deterministic six states protocol for quantum communication
by: Shamsul Shaari, Jesni, et al.
Published: (2006)
by: Shamsul Shaari, Jesni, et al.
Published: (2006)
Fiber and free-space practical decoy state QKD for both BB84
and SARG04 protocols
by: Ali, Sellami, et al.
Published: (2010)
by: Ali, Sellami, et al.
Published: (2010)
Tight bounds for the eavesdropping collective attacks on general CV-QKD protocols that involve non-maximally entanglement
by: Becir, A., et al.
Published: (2012)
by: Becir, A., et al.
Published: (2012)
New estimates of single photon parameters for satellite-based QKD
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Quantum key distribution using decoy state protocol
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
A novel error correction scheme in quantum key distribution (QKD) protocol
by: Lee, Siao Ping, et al.
Published: (2015)
by: Lee, Siao Ping, et al.
Published: (2015)
Multicast Network Security using Quantum Key Distribution (QKD)
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
Practical considerations on Quantum Key Distribution (QKD)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2013)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2013)
Estimation of decoy state parameters for practical QKD
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Continuous-variable quantum key distribution protocols with eight-state discrete modulation
by: Wahiddin, Mohamed Ridza, et al.
Published: (2012)
by: Wahiddin, Mohamed Ridza, et al.
Published: (2012)
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
Generalized quantum rotation gates using STIRAP
by: Issoufa, Youssouf Hamidou, et al.
Published: (2013)
by: Issoufa, Youssouf Hamidou, et al.
Published: (2013)
Decoy state quantum key distribution
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Quantum properties of the three-mode squeezed operator: triply concurrent parametric amplifiers
by: El-Orany, Faisal A.A, et al.
Published: (2010)
by: El-Orany, Faisal A.A, et al.
Published: (2010)
Enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure
by: Khalid, Roszelinda, et al.
Published: (2014)
by: Khalid, Roszelinda, et al.
Published: (2014)
Atomic coupler with two-mode squeezed vacuum states
by: Messikh Azeddine, Azeddine, et al.
Published: (2016)
by: Messikh Azeddine, Azeddine, et al.
Published: (2016)
Atomic coupler with two-mode squeezed vacuum state
by: Messikh Azeddine, Azeddine, et al.
Published: (2016)
by: Messikh Azeddine, Azeddine, et al.
Published: (2016)
Implementation of decoy state protocol
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Security performance of QKD
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Fiber based practical QKD system
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
Tightening the eavesdropping accessible information for continuous variable quantum key distribution protocols that involve nonmaximally entanglement
by: Becir, A., et al.
Published: (2012)
by: Becir, A., et al.
Published: (2012)
Phase coherent states for enhancing the performance of continuous variable quantum key distribution
by: Becir, A, et al.
Published: (2012)
by: Becir, A, et al.
Published: (2012)
Eavesdropping attacks on QKD channels
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
The decoy state method in quantum key distribution
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Simple quantum circuit for pattern recognition based on nearest mean classifier
by: Mahmoud Ahmed, Gharib Subhi, et al.
Published: (2016)
by: Mahmoud Ahmed, Gharib Subhi, et al.
Published: (2016)
Quantum optics for beginners
by: Ficek, Zbigniew, et al.
Published: (2014)
by: Ficek, Zbigniew, et al.
Published: (2014)
Feasibility of QKD over FSO Link
by: Husagić-Selman, Alma, et al.
Published: (2012)
by: Husagić-Selman, Alma, et al.
Published: (2012)
Quantum states for 6DP quantum key distribution protocol
by: Abdul Khir , Mohd Fared, et al.
Published: (2013)
by: Abdul Khir , Mohd Fared, et al.
Published: (2013)
Method for use in quantum cryptography
by: Sellami , Ali, et al.
Published: (2010)
by: Sellami , Ali, et al.
Published: (2010)
An efficient modeling and simulation of differential phase shift-quantum key distribution (DPS-QKD) system using optisystem
by: Dauda, Mu'azu
Published: (2017)
by: Dauda, Mu'azu
Published: (2017)
Quantum rotation gates with controlled nonadiabatic evolutions
by: Abdelrahim, Abdelrahman A H, et al.
Published: (2018)
by: Abdelrahim, Abdelrahman A H, et al.
Published: (2018)
System and Method for Quantum Key Distribution
by: Sellami , Ali, et al.
Published: (2012)
by: Sellami , Ali, et al.
Published: (2012)
A new quantum theory in accordance with Islamic science
by: Jaafar, Ab. Nasir, et al.
Published: (2016)
by: Jaafar, Ab. Nasir, et al.
Published: (2016)
Three level atom in bad cavity
by: Messikh Azeddine, Azeddine, et al.
Published: (2013)
by: Messikh Azeddine, Azeddine, et al.
Published: (2013)
Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
A linear atomic quantum coupler
by: El-Orany, Faisal A.A, et al.
Published: (2010)
by: El-Orany, Faisal A.A, et al.
Published: (2010)
Design and characterization of single photon APD detector for QKD application
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
Implementation of quantum rotation gates using
controlled non-adiabatic evolutions
by: Abdelrahim, Abdelrahman A. H, et al.
Published: (2018)
by: Abdelrahim, Abdelrahman A. H, et al.
Published: (2018)
A secure quantum telephone system
by: Said, Ressa Suhardiman, et al.
Published: (2009)
by: Said, Ressa Suhardiman, et al.
Published: (2009)
Similar Items
-
Nonentagled qutrits in two way deterministic QKD
by: Shamsul Shaari, Jesni, et al.
Published: (2007) -
Deterministic six states protocol for quantum communication
by: Shamsul Shaari, Jesni, et al.
Published: (2006) -
Fiber and free-space practical decoy state QKD for both BB84
and SARG04 protocols
by: Ali, Sellami, et al.
Published: (2010) -
Tight bounds for the eavesdropping collective attacks on general CV-QKD protocols that involve non-maximally entanglement
by: Becir, A., et al.
Published: (2012) -
New estimates of single photon parameters for satellite-based QKD
by: Ali, Sellami, et al.
Published: (2009)