Search Results - "quantum channel"

Refine Results
  1. 1
  2. 2

    Asymptotically optimal quantum channel reversal for qudit ensembles and multimode Gaussian states by Bowles, P., Guţă, M., Adesso, Gerardo

    Published 2012
    “…We investigate the problem of optimally reversing the action of an arbitrary quantum channel C which acts independently on each component of an ensemble of n identically prepared d-dimensional quantum systems. …”
    Get full text
  3. 3

    A game theoretic approach to quantum information by Dai, Xianhua

    Published 2008
    “…Belavkin to products of arbitrary quantum channel to quantum relative entropy of both Araki-Umegaki type and Belavkin-Staszewski type. …”
    Get full text
  4. 4

    Finite key size analysis of two-way quantum cryptography by Shamsul Shaari, Jesni, Mancini, Stefano

    Published 2015
    “…Quantum cryptographic protocols solve the longstanding problem of distributing a shared secret string to two distant users by typically making use of one-way quantum channel. However, alternative protocols exploiting two-way quantum channel have been proposed for the same goal and with potential advantages. …”
    Get full text
    Get full text
  5. 5

    A method for authentication of multi-user key management using quantum key distribution over noiseless channel by Buhari, Abudhahir

    Published 2015
    “…A multiparty QKD setuphas been designed based on frequency division multiplexing (FDM) centralized quantum channel server. This approach reduces the requirement of total quantum channel from N*(N-1)/2 to N and each party requires one quantum channel to communicate with all other parties. …”
    Get full text
    Get full text
  6. 6

    Continuous-variable quantum key distribution protocols with eight-state discrete modulation by Wahiddin, Mohamed Ridza, Becir, A, El-Orany, Faisal A. A.

    Published 2012
    “…We present a rigorous security proof against the collective attacks by taking into consideration the realistic lossy and noisy quantum channel,the imperfect detector efficiency, and the detector electronic noise. …”
    Get full text
    Get full text
  7. 7

    Anticlone Gaussian attack for continuous variable EPR correlations by Messikh Azeddine, Azeddine, Bouketir, Ahmed, Umarov, Bakhram A., Wahiddin, Mohamed Ridza

    Published 2007
    “…However, a secure key can still be generated for the transmission coefficient of the quantum channel bigger than 0.5. Thus, the model is secure for clone-anticlone attacks. …”
    Get full text
    Get full text
  8. 8

    Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure by Khalid, Roszelinda

    Published 2018
    “…In our research we propose the use of quantum theory to transfer the authentication key via quantum channel. Referring to quantum theory, every key that we transform into bits cannot be cloned. …”
    Get full text
    Get full text
  9. 9

    Simplified channel authentication algorithm for secure quantum key distribution by Elwadeya, Mohamed Youssef Khalaf, Al-Khateeb, Khalid A. Saeed, Hasbullah, Nurul Fadzlin

    Published 2014
    “…Quantum key distribution (QKD) is characterized by the implementation of the principles of quantum mechanics in distributing the symmetric cryptographic key between two communicating stations. The quantum channel through which a light beam travels and then examined quantum-mechanically is governed by several quantum cryptographic protocols. …”
    Get full text
    Get full text
    Get full text
  10. 10

    Enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure by Khalid, Roszelinda, Ahmad Zulkarnain, Zuriati

    Published 2014
    “…Hence we are using quantum channel and also quantum key distribution (QKD) together with BB84 protocol replacing common channel to distribute the key. …”
    Get full text
    Get full text
  11. 11

    Secured shared authentication key with two-way clock synchronization over multiparty Quantum Communication (KIV) by Azahari, Nur Shahirah, Harun, Nur Ziadah, Ramli, Sofia Najwa, Zukarnain, Zuriati Binti Ahmad

    Published 2023
    “…Despite the advantages of quantum computers, it is still difficult to enforce authentication on behalf of multiple quantum channel users without the involvement of a third party because present protocols only consider two parties involved in communication. …”
    Get full text
  12. 12

    Quantum identity authentication for non-entanglement multiparty communication: A review, state of art and future directions by Azahari, Nur Shahirah, Harun, Nur Ziadah, Ahmad Zukarnain, Zuriati

    Published 2023
    “…Despite the advantages of multiphoton, enforcing authentication on behalf of numerous participants in the quantum channel remains a problem, since existing multiphoton only considers two parties involved in secret message sharing. …”
    Get full text
  13. 13

    Performance analysis for Secret Message Sharing using different levels of encoding over QSDC by Azahari, Nur Shahirah, Harun, Nur Ziadah, Chuah, Chai Wen, Nawi, Rosmamalmi Mat, Ahmad Zukarnain, Zuriati, Yahya, Nor Iryani

    Published 2024
    “…Despite the benefits of multiphoton, sending secret messages between several parties in a quantum channel still presents a challenge because the current multiphoton only considers two parties. …”
    Get full text
    Get full text
  14. 14

    Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique by Mohd Nasir, Rinie Narinie

    Published 2015
    “…Quantum Key Distribution (QKD) can be considered as the best secured technol- ogy that appreciates the quantum mechanics principals in terms of information transmission over vulnerable quantum channel. QKD ensures that both parties can share the matched secret key through particular designated method in order to protect the shared key from the intruders to eavesdrop the information. …”
    Get full text
    Get full text
  15. 15

    Secured single stage multiphoton approach for quantum cryptography protocol in free space optic by Harun, Nur Ziadah

    Published 2019
    “…These conditions would result in an increase in the total transmission time of the photons to be transmitted over the quantum channel. Accordingly, a Hybrid M-Ary in Braided Single-Stage (HMBSS) approach by utilizing data compression concept is proposed to address these issues. …”
    Get full text
    Get full text
  16. 16

    Quantum Quadratic operators and processes by Mukhamedov, Farrukh, Ganikhodjaev, Nasir

    Published 2015
    “…The asymptotic behavior of dynamical systems generated by classical and quantum quadratic operators is investigated and various properties of quantum quadratic operators are studied, providing an insight into the construction of quantum channels…”
    Get full text
    Get full text
  17. 17

    Gaussian interferometric power as a measure of continuous-variable non-Markovianity by Souza, Leonardo A.M., Dhar, Himadri Shekhar, Bera, Manabendra Nath, Liuzzo-Scorpo, Pietro, Adesso, Gerardo

    Published 2015
    “…We investigate the non-Markovianity of continuous-variable Gaussian quantum channels through the evolution of an operational metrological quantifier, namely, the Gaussian interferometric power, which captures the minimal precision that can be achieved using bipartite Gaussian probes in a black-box phase estimation setup, where the phase shift generator is a priori unknown. …”
    Get full text
  18. 18

    Phase coherent states for enhancing the performance of continuous variable quantum key distribution by Becir, A, Wahiddin, Mohamed Ridza

    Published 2012
    “…We investigate the security of these protocols against the collective eavesdropping attacks and show their performance in a realistic setup by taking into consideration the realistic lossy noisy quantum channels, and the imperfection of detection. We show that the use of phase coherent states gives better performance in terms of noise tolerance, key rate, and achievable distance than that of common linear coherent states. …”
    Get full text
    Get full text
  19. 19

    Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol by Majeed, Mohammed Munther A., Al-Khateeb, Khalid A. Saeed, Wahiddin, Mohamed Ridza, Saeb, Magdy M.

    Published 2010
    “…Results: The proposed quantum authenticated channel is secure in the presence of eavesdropper who has access to both the classical and the quantum channels. Conclusion/Recommendations: The key distribution process using cascaded hash functions provides better security. …”
    Get full text
    Get full text
  20. 20

    Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP) by Majeed, Mohammed Munther A, Al-Khateeb, Khalid A. Saeed, Wahiddin, Mohamed Ridza, Saeb, Magdy M.

    Published 2010
    “…Results: The proposed quantum authenticated channel is secure in the presence of eavesdropper who has access to both the classical and the quantum channels. Conclusion/Recommendations: The key distribution process using cascaded hash functions provides better security. …”
    Get full text
    Get full text