Meslouhi et al., 2013 - Google Patents
A quantum secure direct communication protocol using entangled modified spin coherent statesMeslouhi et al., 2013
- Document ID
- 16965736101252573703
- Author
- Meslouhi A
- Hassouni Y
- Publication year
- Publication venue
- Quantum information processing
External Links
Snippet
In this paper, a new direct quantum communication protocol based on a modified spin coherent state as decoy particles is to be depicted, before that both the scheme of the communication and the modified spin coherent state of the SU (2) group will be presented …
- 230000001427 coherent 0 title abstract description 53
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
- H04L9/0858—Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Naseri et al. | A scheme for secure quantum communication network with authentication using GHZ-like states and cluster states controlled teleportation | |
Zhou et al. | New quantum dialogue protocol based on continuous-variable two-mode squeezed vacuum states | |
Qin et al. | Dynamic quantum secret sharing by using d-dimensional GHZ state | |
Qin et al. | (t, n) Threshold quantum secret sharing using the phase shift operation | |
Zhang et al. | Semiquantum secure direct communication using EPR pairs | |
Pan et al. | Single-photon-memory two-step quantum secure direct communication relying on Einstein-Podolsky-Rosen pairs | |
Pappa et al. | Experimental plug and play quantum coin flipping | |
Yan et al. | Semi-quantum protocol for deterministic secure quantum communication using Bell states | |
Shannon et al. | On the use of quantum entanglement in secure communications: a survey | |
Rong et al. | Mediated semi-quantum secure direct communication | |
Li et al. | An efficient protocol for the private comparison of equal information based on four-particle entangled W state and Bell entangled states swapping | |
Bai et al. | Quantum secret sharing using orthogonal multiqudit entangled states | |
He et al. | Multiparty quantum secure direct communication immune to collective noise | |
Li et al. | Practical quantum all-or-nothing oblivious transfer protocol | |
Gao et al. | Two-party quantum key agreement protocols under collective noise channel | |
Meslouhi et al. | A quantum secure direct communication protocol using entangled modified spin coherent states | |
Huang et al. | Protection of quantum dialogue affected by quantum field | |
Qin et al. | d-Dimensional quantum state sharing with adversary structure | |
Maitra | Measurement device-independent quantum dialogue | |
Xu et al. | Quantum private comparison protocol based on the entanglement swapping between χ^+ χ+ state and W-Class state | |
Wang et al. | Semi-quantum secure direct communication against collective-dephasing noise | |
Wang et al. | Quantum secret sharing for general access structures based on multiparticle entanglements | |
Zhang et al. | Improvements on “Secure multi-party quantum summation based on quantum Fourier transform” | |
Lai et al. | Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes | |
Wang et al. | Quantum key agreement protocols with single photon in both polarization and spatial-mode degrees of freedom |