Towards secure communication using intra-particle entanglement

Feb 12, 2015 - Toward secure communication using intra-particle entanglement. S. Adhikari · Dipankar Home. A. S. Majumdar · A. K. Pan. Akshata Sheno...

0 downloads 8 Views 379KB Size

Recommend Documents

Feb 1, 2008 - After the qubit has arrived at Bob, with probability λc he activates control mode, so Eve has no chance to adapt her strategy. If she has been replacing the travel qubit with another qubit, using intercept-resend or man-in-the-middle s

operating at room temperature was reported [24]. The single pulses are emitted on demand and the secure bit rate is 7700bits/s. And quantum logic operations using linear optical elements can be realized with today's technology. [25]. The implementati

models that could affect the transmission of the quantum data on the quantum channels, and how to treat ... security of the transmission than the QKD and also ... In our protocol of the quantum secure direct communication we use the maximally entangl

allowing asymptotically secure key distribution and quasi-secure direct ... He keeps one photon, the “home qubit”, and sends the other ..... The storage of one.

A character, tradi- tionally called .... At the end of transmission Eve will measure ε and η ancil- lae and, by ... protocol, but at the expense of the transmission rate.

Mar 17, 2005 - Abstract. A two-layer quantum protocol for secure transmission of data using qubits is pre- sented. The protocol is an improvement over the BB84 QKD protocol. BB84, in con- junction with the one-time pad algorithm, has been shown to be

Jul 28, 2003 - that could provide unconditional security in long distance .... able to Eve, including perfect detectors and unlimited ... Calling Π1 and Π0.

Apr 28, 2009 - Eve will be assumed to collect all the photons that are lost en route from Alice to Bob and from Bob to. Alice [10], i.e., she has at her disposal the mode pairs. { cSm , cRm : 1 ≤ m ≤ M }, where. cSm ..... nal Processing, Bangalor

copies of a state are given as input to an LOCC protocol, which then outputs m ..... operation to their share of qubits, outputs the first qubit and discard the rest.

Jan 19, 2009 - ... conclusions are presented. We will briefly give the definition of fractional derivative, of the following form. Dα t x(t) := Im−α( ddt)m x(t),α> 0,. (1).

the sender (Alice) and the receiver (Bob). It is impor- tant to remember that some shared secret key is needed .... modulator. This system operates, with bulk optics, at. 200kHz rate for demonstration purposes and faster fiber .... ∗E-mail: barbosa

Apr 21, 2003 - (L) are used to optimize the beam Rayleigh range within the EOMs. A personal computer containing an interface card (National Instruments ...

quantum entanglement and Alice's (the message sender's) public announcement, the eavesdropping can be detected provided that the number of the checking groups is big enough. ... and local unitary operations. This communication protocol can be used to

Jul 26, 2016 - In this protocol, we consider Alice as the sender who wants to send secret message to Bob the receiver and Charlie controls the communication. The proposed CQSC consists of the following steps,. (a). (b). Figure 1: CQSC with one contro

widely performed in practice, with computer login se- quences and .... Such entangled “money” would have the desirable prop- erties of ..... one would want to use the catalysis protocol instead of the maximally-entangled protocol. For then the pr

Aug 5, 2016 - An alternative energy storage with infinite capacity is also studied to serve as an upper bound. We further derive closed-form expressions for two secrecy metrics, i.e., secrecy outage probability and probability of positive secrecy cap

Dec 22, 2013 - signal, the error in the fit gives sufficient information to decode the modulating signal. For analog implementation, a ... by Short, the modulating signal is. ∗e-mail address: [email protected] ... the transmitted variable x(t)

Oct 23, 2015 - Hokkaido University, Kita14-Nishi9, Kita-ku, Sapporo 060-0814, Japan ... ment operation has been predicted to improve the fidelity and the ...

Jul 23, 2013 - Brassard et al. [2] offer an improved anonymous communication protocol that sets no limit on the number ... wants to send a qubit privately and anonymously to a re- ceiver. In the context of voting, each qubit ... of the password to a

Aug 19, 2016 - School of Physics and Electronics, Henan University, Kaifeng 475001, China. (e-mail: [email protected]). H.-M. Wang, W. Wang and ... online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TCOMM.2016.XXXXX ...... Universit

Z. J. Zhang and Z. X. Man ... Much attention has been focused on QKD after the pioneering work of Bennett ... After Bob receives the photons, he perform Bell-basis measurement on each with its partner photon in the initial pair. Since U0|Ψ−〉 = |

arXiv:quant-ph/0601147v1 21 Jan 2006. Multi-step quantum secure direct communication using multi-particle. Green-Horne-Zeilinger state. Chuan Wang1, Fu Guo Deng3 and Gui Lu Long1,2. 1 Department of Physics and Key Laboratory For Quantum Information a

Apr 20, 2012 - prepares a Bell state (say |ψ+〉), keeps one photon as home photon .... The security of the proposed protocol is also described in this section. ..... [1] C. H. Bennett and G. Brassard, in Proceedings of the IEEE International Confer

(4) One cannot draw pictures of individual quantum processes. (5) One cannot duplicate an unknown quantum state. These characters of ..... S. Wiener, then at Columbia University, was first to propose ideas closely related to QC in the 1970s. Since it