Nothing Special   »   [go: up one dir, main page]

Meslouhi et al., 2013 - Google Patents

A quantum secure direct communication protocol using entangled modified spin coherent states

Meslouhi et al., 2013

Document ID
16965736101252573703
Author
Meslouhi A
Hassouni Y
Publication year
Publication venue
Quantum information processing

External Links

Snippet

In this paper, a new direct quantum communication protocol based on a modified spin coherent state as decoy particles is to be depicted, before that both the scheme of the communication and the modified spin coherent state of the SU (2) group will be presented …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption

Similar Documents

Publication Publication Date Title
Naseri et al. A scheme for secure quantum communication network with authentication using GHZ-like states and cluster states controlled teleportation
Zhou et al. New quantum dialogue protocol based on continuous-variable two-mode squeezed vacuum states
Qin et al. Dynamic quantum secret sharing by using d-dimensional GHZ state
Qin et al. (t, n) Threshold quantum secret sharing using the phase shift operation
Zhang et al. Semiquantum secure direct communication using EPR pairs
Pan et al. Single-photon-memory two-step quantum secure direct communication relying on Einstein-Podolsky-Rosen pairs
Pappa et al. Experimental plug and play quantum coin flipping
Yan et al. Semi-quantum protocol for deterministic secure quantum communication using Bell states
Shannon et al. On the use of quantum entanglement in secure communications: a survey
Rong et al. Mediated semi-quantum secure direct communication
Li et al. An efficient protocol for the private comparison of equal information based on four-particle entangled W state and Bell entangled states swapping
Bai et al. Quantum secret sharing using orthogonal multiqudit entangled states
He et al. Multiparty quantum secure direct communication immune to collective noise
Li et al. Practical quantum all-or-nothing oblivious transfer protocol
Gao et al. Two-party quantum key agreement protocols under collective noise channel
Meslouhi et al. A quantum secure direct communication protocol using entangled modified spin coherent states
Huang et al. Protection of quantum dialogue affected by quantum field
Qin et al. d-Dimensional quantum state sharing with adversary structure
Maitra Measurement device-independent quantum dialogue
Xu et al. Quantum private comparison protocol based on the entanglement swapping between χ^+ χ+ state and W-Class state
Wang et al. Semi-quantum secure direct communication against collective-dephasing noise
Wang et al. Quantum secret sharing for general access structures based on multiparticle entanglements
Zhang et al. Improvements on “Secure multi-party quantum summation based on quantum Fourier transform”
Lai et al. Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes
Wang et al. Quantum key agreement protocols with single photon in both polarization and spatial-mode degrees of freedom