Deterministic six states protocol for quantum communication
We consider a two-way deterministic protocol for quantum communication using six mutually unbiased states in the Poincaré sphere. The logical information is encoded by flip or not-flip operations on the states. Despite the nonexistence of a universal flip gate the protocol saturates the bound of a u...
| Main Authors: | Shamsul Shaari, Jesni, Lucamarini, Marco, Wahiddin, Mohamed Ridza |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Elsevier
2006
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/10541/ http://irep.iium.edu.my/10541/1/Deterministic_six_states_protocol_for_quantum_communication.pdf |
Similar Items
Nonentagled qutrits in two way deterministic QKD
by: Shamsul Shaari, Jesni, et al.
Published: (2007)
by: Shamsul Shaari, Jesni, et al.
Published: (2007)
Quantum state engineering with ququarts: application for deterministic QKD protocol
by: Shurupov, Alexander P., et al.
Published: (2009)
by: Shurupov, Alexander P., et al.
Published: (2009)
Improved two-way six-state protocol for quantum key distribution
by: Shamsul Shaari, Jesni, et al.
Published: (2012)
by: Shamsul Shaari, Jesni, et al.
Published: (2012)
Quantum key distribution using decoy state protocol
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Checking noise correlations for safer two-way quantum key distribution
by: Shamsul Shaari, Jesni, et al.
Published: (2014)
by: Shamsul Shaari, Jesni, et al.
Published: (2014)
Blind encoding into qudits
by: Shamsul Shaari, Jesni, et al.
Published: (2008)
by: Shamsul Shaari, Jesni, et al.
Published: (2008)
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
A secure quantum telephone system
by: Said, Ressa Suhardiman, et al.
Published: (2009)
by: Said, Ressa Suhardiman, et al.
Published: (2009)
Decoy state quantum key distribution
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: multi-key generation
by: El-Orany, Faisal A.A, et al.
Published: (2009)
by: El-Orany, Faisal A.A, et al.
Published: (2009)
Continuous-variable quantum key distribution protocols with eight-state discrete modulation
by: Wahiddin, Mohamed Ridza, et al.
Published: (2012)
by: Wahiddin, Mohamed Ridza, et al.
Published: (2012)
Comment on new estimates of single photon parameters for setellite-based QKD
by: Shamsul Shaari, Jesni
Published: (2010)
by: Shamsul Shaari, Jesni
Published: (2010)
Deterministic And Stochastic Simulations Of Infectious Diseases
by: Tan, Wai Kiat
Published: (2013)
by: Tan, Wai Kiat
Published: (2013)
Decoy states and two way quantum key distribution schemes
by: Shamsul Shaari, Jesni, et al.
Published: (2011)
by: Shamsul Shaari, Jesni, et al.
Published: (2011)
Implementation of decoy state protocol
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Nonorthogonal unitaries in two-way quantum key distribution
by: Shamsul Shaari, Jesni
Published: (2014)
by: Shamsul Shaari, Jesni
Published: (2014)
Tightening the eavesdropping accessible information for continuous variable quantum key distribution protocols that involve nonmaximally entanglement
by: Becir, A., et al.
Published: (2012)
by: Becir, A., et al.
Published: (2012)
Deterministic and stochastic model for the effect of Chondroitin Sulfate (CS) in cancer cell
by: Rosli, Norhayati, et al.
Published: (2022)
by: Rosli, Norhayati, et al.
Published: (2022)
Phase coherent states for enhancing the performance of continuous variable quantum key distribution
by: Becir, A, et al.
Published: (2012)
by: Becir, A, et al.
Published: (2012)
The decoy state method in quantum key distribution
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Combinatorial interpretation of raney numbers and tree enumerations
by: Pah, Chin Hee, et al.
Published: (2015)
by: Pah, Chin Hee, et al.
Published: (2015)
Atomic coupler with two-mode squeezed vacuum state
by: Messikh Azeddine, Azeddine, et al.
Published: (2016)
by: Messikh Azeddine, Azeddine, et al.
Published: (2016)
Optimal device independent quantum key distribution
by: Kamaruddin, Suhaili, et al.
Published: (2016)
by: Kamaruddin, Suhaili, et al.
Published: (2016)
Quantum optics for beginners
by: Ficek, Zbigniew, et al.
Published: (2014)
by: Ficek, Zbigniew, et al.
Published: (2014)
Erroneous signal detection and secure distance improvement in two way Quantum Key Distribution protocol with decoy state
by: Abdul Khir, Mohd Fared, et al.
Published: (2012)
by: Abdul Khir, Mohd Fared, et al.
Published: (2012)
Generation of elementary gates and Bell's states using controlled adiabatic evolutions
by: Benmachiche, Abderrahim, et al.
Published: (2019)
by: Benmachiche, Abderrahim, et al.
Published: (2019)
Method for use in quantum cryptography
by: Sellami , Ali, et al.
Published: (2010)
by: Sellami , Ali, et al.
Published: (2010)
Finite key size analysis of two-way quantum cryptography
by: Shamsul Shaari, Jesni, et al.
Published: (2015)
by: Shamsul Shaari, Jesni, et al.
Published: (2015)
Indistinguishable encoding for bidirectional quantum key distribution: Theory to experiment
by: Shamsul Shaari, Jesni, et al.
Published: (2017)
by: Shamsul Shaari, Jesni, et al.
Published: (2017)
Descriptions of quadratic plus linear operators which preserve pure states of the quantum system
by: Saburov, Mansoor
Published: (2013)
by: Saburov, Mansoor
Published: (2013)
Fiber and free-space practical decoy state QKD for both BB84
and SARG04 protocols
by: Ali, Sellami, et al.
Published: (2010)
by: Ali, Sellami, et al.
Published: (2010)
An Ising model with three competing interactions on a Cayley tree
by: Ganikhodjaev, Nasir, et al.
Published: (2004)
by: Ganikhodjaev, Nasir, et al.
Published: (2004)
Exact solution of an Ising model with competing interactions on a Cayley tree
by: Ganikhodjaev, Nasir, et al.
Published: (2003)
by: Ganikhodjaev, Nasir, et al.
Published: (2003)
Quantum trajectory theory for a two-level atom in a squeezed vacuum field with non-radiative dephasing
by: Akram, Uzma, et al.
Published: (1998)
by: Akram, Uzma, et al.
Published: (1998)
Coupled-mode theory for Bose–Einstein condensates with time dependent atomic scattering length
by: Abdullaev, Fatkhulla Kh., et al.
Published: (2005)
by: Abdullaev, Fatkhulla Kh., et al.
Published: (2005)
Device-independent quantum key distribution using single-photon entanglement
by: Kamaruddin, Suhaili, et al.
Published: (2015)
by: Kamaruddin, Suhaili, et al.
Published: (2015)
Quadratic plus linear operators which preserve pure states of quantum systems: small dimensions
by: Saburov, Mansoor
Published: (2014)
by: Saburov, Mansoor
Published: (2014)
Constructing a knowledge base for Al-Qur’an utilizing principles of human communication
by: Wani, Sharyar, et al.
Published: (2018)
by: Wani, Sharyar, et al.
Published: (2018)
Quantum states for 6DP quantum key distribution protocol
by: Abdul Khir , Mohd Fared, et al.
Published: (2013)
by: Abdul Khir , Mohd Fared, et al.
Published: (2013)
Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme
by: Shamsul Shaari, Jesni, et al.
Published: (2010)
by: Shamsul Shaari, Jesni, et al.
Published: (2010)
Similar Items
-
Nonentagled qutrits in two way deterministic QKD
by: Shamsul Shaari, Jesni, et al.
Published: (2007) -
Quantum state engineering with ququarts: application for deterministic QKD protocol
by: Shurupov, Alexander P., et al.
Published: (2009) -
Improved two-way six-state protocol for quantum key distribution
by: Shamsul Shaari, Jesni, et al.
Published: (2012) -
Quantum key distribution using decoy state protocol
by: Ali, Sellami, et al.
Published: (2009) -
Checking noise correlations for safer two-way quantum key distribution
by: Shamsul Shaari, Jesni, et al.
Published: (2014)