Quantum states for 6DP quantum key distribution protocol
Quantum states for 6DP quantum key distribution protocol of the present invention utilize the use of biphoton with single wavelength as the new source of 6DP to generate and control photons. The approach of the present invention minimizes the probability of attack from third parties to gain informat...
| Main Authors: | Abdul Khir , Mohd Fared, ., Suryadi, Nawi, Mohd Nuriman, Saiyed Rasol , Saiyed Abdul Fatah, Mohd Zain, Mohd Nor Zaliman |
|---|---|
| Format: | Patent |
| Language: | English |
| Published: |
2013
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/32235/ http://irep.iium.edu.my/32235/1/WO2013009161A1.pdf |
Similar Items
Implementation of two way Quantum Key Distribution protocol with decoy state
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
Experimental two way quantum key distribution with weak+vacuum decoy state
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
Implementation of two-way free space quantum key distribution
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
A system and method for exchangeable quantum key distribution
by: ,, Suryadi, et al.
Published: (2012)
by: ,, Suryadi, et al.
Published: (2012)
Experimental two way quantum key distribution with weak+vacuum decoy state
by: Abdul Khir, Mohd Fared, et al.
Published: (2013)
by: Abdul Khir, Mohd Fared, et al.
Published: (2013)
Erroneous signal detection and secure distance improvement in two way Quantum Key Distribution protocol with decoy state
by: Abdul Khir, Mohd Fared, et al.
Published: (2012)
by: Abdul Khir, Mohd Fared, et al.
Published: (2012)
Apparatus for flipping the polarization state of an optical pulse between a transmitter and a receiver in quantum key distribution and method thereof
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
Quantum key distribution protocols
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Quantum key distribution using decoy state protocol
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Weak+Vacuum and One Decoy States with Two Way Quantum Key Distribution Protocol
by: Abdul Khir, M. F., et al.
Published: (2013)
by: Abdul Khir, M. F., et al.
Published: (2013)
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
Quantum key distribution protocols in transmission control protocol
by: Kamarul Aizan, Nur Hanani
Published: (2012)
by: Kamarul Aizan, Nur Hanani
Published: (2012)
Improved two-way six-state protocol for quantum key distribution
by: Shamsul Shaari, Jesni, et al.
Published: (2012)
by: Shamsul Shaari, Jesni, et al.
Published: (2012)
Indistinguishable encoding for bidirectional quantum key distribution: Theory to experiment
by: Shamsul Shaari, Jesni, et al.
Published: (2017)
by: Shamsul Shaari, Jesni, et al.
Published: (2017)
Decoy state quantum key distribution
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Implemetation of BB84 quantum key distribution protocol’s with attacks.
by: Muhammad, Nur Atiqah, et al.
Published: (2009)
by: Muhammad, Nur Atiqah, et al.
Published: (2009)
Continuous-variable quantum key distribution protocols with eight-state discrete modulation
by: Wahiddin, Mohamed Ridza, et al.
Published: (2012)
by: Wahiddin, Mohamed Ridza, et al.
Published: (2012)
Practical quantum key distribution
by: Ali, Sellami
Published: (2012)
by: Ali, Sellami
Published: (2012)
The decoy state method in quantum key distribution
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Quantum key distribution in real life
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
System and Method for Quantum Key Distribution
by: Sellami , Ali, et al.
Published: (2012)
by: Sellami , Ali, et al.
Published: (2012)
Development of authentication code for multi-access optical code division multiplexing based quantum key distribution
by: Abiola, Taiwo Ambali, et al.
Published: (2018)
by: Abiola, Taiwo Ambali, et al.
Published: (2018)
A novel error correction scheme in quantum key distribution (QKD) protocol
by: Lee, Siao Ping, et al.
Published: (2015)
by: Lee, Siao Ping, et al.
Published: (2015)
Alternative discrete variable protocol for point to point Quantum Key Distribution system
by: Ahmad Ghazali, Lizal Iswady
Published: (2012)
by: Ahmad Ghazali, Lizal Iswady
Published: (2012)
An efficient modeling and simulation of quantum key distribution protocols using OptiSystemâ„¢
by: Buhari, Abudhahir, et al.
Published: (2012)
by: Buhari, Abudhahir, et al.
Published: (2012)
Practical considerations on Quantum Key Distribution (QKD)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2013)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2013)
Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: multi-key generation
by: El-Orany, Faisal A.A, et al.
Published: (2009)
by: El-Orany, Faisal A.A, et al.
Published: (2009)
Decoy states and two way quantum key distribution schemes
by: Shamsul Shaari, Jesni, et al.
Published: (2011)
by: Shamsul Shaari, Jesni, et al.
Published: (2011)
Implementation of SARG04 decoy state quantum key distribution
by: Sellami , Ali, et al.
Published: (2011)
by: Sellami , Ali, et al.
Published: (2011)
Optimal device independent quantum key distribution
by: Kamaruddin, Suhaili, et al.
Published: (2016)
by: Kamaruddin, Suhaili, et al.
Published: (2016)
Practical SARG04 quantum key distribution
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
Effectiveness of enhanced tight finite scheme in quantum key distribution protocol for network communication
by: Khalid, Roszelinda, et al.
Published: (2014)
by: Khalid, Roszelinda, et al.
Published: (2014)
A method of sharing a secret key in quantum key distribution
by: Wan Adnan, Wan Azizun, et al.
Published: (2010)
by: Wan Adnan, Wan Azizun, et al.
Published: (2010)
QuCCs: an experimental of quantum key distribution using quantum cryptography and communication simulator
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2019)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2019)
Development of interactive maths teaching tool for engineering education / Saiyed Rasol Tuan Muda
by: Saiyed Rasol , Tuan Muda
Published: (2019)
by: Saiyed Rasol , Tuan Muda
Published: (2019)
Nonorthogonal unitaries in two-way quantum key distribution
by: Shamsul Shaari, Jesni
Published: (2014)
by: Shamsul Shaari, Jesni
Published: (2014)
The effect of mean photon number to the output key rate in quantum key distribution
by: Ahmad Ghazali, Lizal Iswady, et al.
Published: (2008)
by: Ahmad Ghazali, Lizal Iswady, et al.
Published: (2008)
Similar Items
-
Implementation of two way Quantum Key Distribution protocol with decoy state
by: Abdul Khir , Mohd Fared, et al.
Published: (2012) -
A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010) -
A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010) -
Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
by: Majeed, Mohammed Munther A, et al.
Published: (2010) -
Experimental two way quantum key distribution with weak+vacuum decoy state
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)