Which verification qubits perform best for secure communication in noisy channel?
… Thus, if the kind of noise present in a communication channel (ie, the characteristics of the
… of decoy qubits required for implementation of schemes of secure quantum communication …
… of decoy qubits required for implementation of schemes of secure quantum communication …
Secure communication using qubits
S Hosseini-Khayat, I Marvian - arXiv preprint quant-ph/0503157, 2005 - arxiv.org
… Then we present a protocol for sending secure data using authenticated qubits. … e) In
this and the next items, we show security against multi-qubit emission attack. Suppose a qubit …
this and the next items, we show security against multi-qubit emission attack. Suppose a qubit …
Secure communication with single-photon two-qubit states
… twoqubit states, rather than the one-qubit states used in conventional schemes. In particular,
we consider the realistic situation in which one qubit … for direct secure communication, that is …
we consider the realistic situation in which one qubit … for direct secure communication, that is …
A comparative study of protocols for secure quantum communication under noisy environment: single-qubit-based protocols versus entangled-state-based protocols
… secure quantum communication can be broadly divided in two classes: Class A: single-qubit-based
schemes which do not use … -state-based protocols, which use one or more entangled …
schemes which do not use … -state-based protocols, which use one or more entangled …
On the use of quantum entanglement in secure communications: a survey
K Shannon, E Towe, OK Tonguz - arXiv preprint arXiv:2003.07907, 2020 - arxiv.org
… Quantum communication is commonly described using qubits, the quantum analog of the
classical 0 or 1 bit. A qubit can have states |0〉 or |1〉, or superpositions of these two. For …
classical 0 or 1 bit. A qubit can have states |0〉 or |1〉, or superpositions of these two. For …
A photonic integrated quantum secure communication system
… performed in real time to produce information-theoretic secure keys for a 100 Gb s –1 line …
quantum secured communication system using feedback controls to stabilize the qubit phase …
quantum secured communication system using feedback controls to stabilize the qubit phase …
Bidirectional controlled quantum teleportation and secure direct communication using five-qubit entangled state
Y Li, X Li, M Sang, Y Nie, Z Wang - Quantum information processing, 2013 - Springer
… After measured a qubit by the controller, our five-qubit state becomes a direct couple of two
Bell states. Thus, it is easy to implement the bidirectional QT tasks. In our scheme, Alice may …
Bell states. Thus, it is easy to implement the bidirectional QT tasks. In our scheme, Alice may …
Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue
… using n-qubits. However, to ensure the secure transmission of those n-qubits, another 3n-qubits …
This is so because to ensure a secure communication of n qubits, an equal number of …
This is so because to ensure a secure communication of n qubits, an equal number of …
Quantum authentication and secure communication protocols
TS Lin, IM Tsai, HW Wang… - 2006 Sixth IEEE …, 2006 - ieeexplore.ieee.org
… 2, in each period control qubit and the suffix b represents Bob's control qubit. time, we do
secure communication before we transfer The suffix c represents the target qubit for transmitting …
secure communication before we transfer The suffix c represents the target qubit for transmitting …
Detecting relay attacks on RFID communication systems using quantum bits
H Jannati, E Ardeshir-Larijani - Quantum Information Processing, 2016 - Springer
… Similar to QKD, the security of our protocol is implied by “no-cloning” and “… using qubit
transmission and results in a more efficient protocol in terms of resources and communications. As …
transmission and results in a more efficient protocol in terms of resources and communications. As …