Search Results - "quantum channel"
-
1
-
2
Asymptotically optimal quantum channel reversal for qudit ensembles and multimode Gaussian states
Published 2012“…We investigate the problem of optimally reversing the action of an arbitrary quantum channel C which acts independently on each component of an ensemble of n identically prepared d-dimensional quantum systems. …”
Get full text
-
3
A game theoretic approach to quantum information
Published 2008“…Belavkin to products of arbitrary quantum channel to quantum relative entropy of both Araki-Umegaki type and Belavkin-Staszewski type. …”
Get full text
-
4
Finite key size analysis of two-way quantum cryptography
Published 2015“…Quantum cryptographic protocols solve the longstanding problem of distributing a shared secret string to two distant users by typically making use of one-way quantum channel. However, alternative protocols exploiting two-way quantum channel have been proposed for the same goal and with potential advantages. …”
Get full text
Get full text
-
5
A method for authentication of multi-user key management using quantum key distribution over noiseless channel
Published 2015“…A multiparty QKD setuphas been designed based on frequency division multiplexing (FDM) centralized quantum channel server. This approach reduces the requirement of total quantum channel from N*(N-1)/2 to N and each party requires one quantum channel to communicate with all other parties. …”
Get full text
Get full text
-
6
Continuous-variable quantum key distribution protocols with eight-state discrete modulation
Published 2012“…We present a rigorous security proof against the collective attacks by taking into consideration the realistic lossy and noisy quantum channel,the imperfect detector efficiency, and the detector electronic noise. …”
Get full text
Get full text
-
7
Anticlone Gaussian attack for continuous variable EPR correlations
Published 2007“…However, a secure key can still be generated for the transmission coefficient of the quantum channel bigger than 0.5. Thus, the model is secure for clone-anticlone attacks. …”
Get full text
Get full text
-
8
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
Published 2018“…In our research we propose the use of quantum theory to transfer the authentication key via quantum channel. Referring to quantum theory, every key that we transform into bits cannot be cloned. …”
Get full text
Get full text
-
9
Simplified channel authentication algorithm for secure quantum key distribution
Published 2014“…Quantum key distribution (QKD) is characterized by the implementation of the principles of quantum mechanics in distributing the symmetric cryptographic key between two communicating stations. The quantum channel through which a light beam travels and then examined quantum-mechanically is governed by several quantum cryptographic protocols. …”
Get full text
Get full text
Get full text
-
10
Enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure
Published 2014“…Hence we are using quantum channel and also quantum key distribution (QKD) together with BB84 protocol replacing common channel to distribute the key. …”
Get full text
Get full text
-
11
Secured shared authentication key with two-way clock synchronization over multiparty Quantum Communication (KIV)
Published 2023“…Despite the advantages of quantum computers, it is still difficult to enforce authentication on behalf of multiple quantum channel users without the involvement of a third party because present protocols only consider two parties involved in communication. …”
Get full text
-
12
Quantum identity authentication for non-entanglement multiparty communication: A review, state of art and future directions
Published 2023“…Despite the advantages of multiphoton, enforcing authentication on behalf of numerous participants in the quantum channel remains a problem, since existing multiphoton only considers two parties involved in secret message sharing. …”
Get full text
-
13
Performance analysis for Secret Message Sharing using different levels of encoding over QSDC
Published 2024“…Despite the benefits of multiphoton, sending secret messages between several parties in a quantum channel still presents a challenge because the current multiphoton only considers two parties. …”
Get full text
Get full text
-
14
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
Published 2015“…Quantum Key Distribution (QKD) can be considered as the best secured technol- ogy that appreciates the quantum mechanics principals in terms of information transmission over vulnerable quantum channel. QKD ensures that both parties can share the matched secret key through particular designated method in order to protect the shared key from the intruders to eavesdrop the information. …”
Get full text
Get full text
-
15
Secured single stage multiphoton approach for quantum cryptography protocol in free space optic
Published 2019“…These conditions would result in an increase in the total transmission time of the photons to be transmitted over the quantum channel. Accordingly, a Hybrid M-Ary in Braided Single-Stage (HMBSS) approach by utilizing data compression concept is proposed to address these issues. …”
Get full text
Get full text
-
16
Quantum Quadratic operators and processes
Published 2015“…The asymptotic behavior of dynamical systems generated by classical and quantum quadratic operators is investigated and various properties of quantum quadratic operators are studied, providing an insight into the construction of quantum channels…”
Get full text
Get full text
-
17
Gaussian interferometric power as a measure of continuous-variable non-Markovianity
Published 2015“…We investigate the non-Markovianity of continuous-variable Gaussian quantum channels through the evolution of an operational metrological quantifier, namely, the Gaussian interferometric power, which captures the minimal precision that can be achieved using bipartite Gaussian probes in a black-box phase estimation setup, where the phase shift generator is a priori unknown. …”
Get full text
-
18
Phase coherent states for enhancing the performance of continuous variable quantum key distribution
Published 2012“…We investigate the security of these protocols against the collective eavesdropping attacks and show their performance in a realistic setup by taking into consideration the realistic lossy noisy quantum channels, and the imperfection of detection. We show that the use of phase coherent states gives better performance in terms of noise tolerance, key rate, and achievable distance than that of common linear coherent states. …”
Get full text
Get full text
-
19
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
Published 2010“…Results: The proposed quantum authenticated channel is secure in the presence of eavesdropper who has access to both the classical and the quantum channels. Conclusion/Recommendations: The key distribution process using cascaded hash functions provides better security. …”
Get full text
Get full text
-
20
Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
Published 2010“…Results: The proposed quantum authenticated channel is secure in the presence of eavesdropper who has access to both the classical and the quantum channels. Conclusion/Recommendations: The key distribution process using cascaded hash functions provides better security. …”
Get full text
Get full text