Towards secure communication using intra-particle entanglement

Feb 12, 2015 - Toward secure communication using intra-particle entanglement. S. Adhikari · Dipankar Home. A. S. Majumdar · A. K. Pan. Akshata Sheno...

0 downloads 6 Views 379KB Size

Recommend Documents

Feb 1, 2008 - After the qubit has arrived at Bob, with probability λc he activates control mode, so Eve has no chance to adapt her strategy. If she has been replacing the travel qubit with another qubit, using intercept-resend or man-in-the-middle s

operating at room temperature was reported [24]. The single pulses are emitted on demand and the secure bit rate is 7700bits/s. And quantum logic operations using linear optical elements can be realized with today's technology. [25]. The implementati

allowing asymptotically secure key distribution and quasi-secure direct ... He keeps one photon, the “home qubit”, and sends the other ..... The storage of one.

models that could affect the transmission of the quantum data on the quantum channels, and how to treat ... security of the transmission than the QKD and also ... In our protocol of the quantum secure direct communication we use the maximally entangl

A character, tradi- tionally called .... At the end of transmission Eve will measure ε and η ancil- lae and, by ... protocol, but at the expense of the transmission rate.

Mar 17, 2005 - Abstract. A two-layer quantum protocol for secure transmission of data using qubits is pre- sented. The protocol is an improvement over the BB84 QKD protocol. BB84, in con- junction with the one-time pad algorithm, has been shown to be

Jul 28, 2003 - that could provide unconditional security in long distance .... able to Eve, including perfect detectors and unlimited ... Calling Π1 and Π0.

copies of a state are given as input to an LOCC protocol, which then outputs m ..... operation to their share of qubits, outputs the first qubit and discard the rest.

Apr 28, 2009 - Eve will be assumed to collect all the photons that are lost en route from Alice to Bob and from Bob to. Alice [10], i.e., she has at her disposal the mode pairs. { cSm , cRm : 1 ≤ m ≤ M }, where. cSm ..... nal Processing, Bangalor

Jul 26, 2016 - In this protocol, we consider Alice as the sender who wants to send secret message to Bob the receiver and Charlie controls the communication. The proposed CQSC consists of the following steps,. (a). (b). Figure 1: CQSC with one contro

Apr 21, 2003 - (L) are used to optimize the beam Rayleigh range within the EOMs. A personal computer containing an interface card (National Instruments ...

the sender (Alice) and the receiver (Bob). It is impor- tant to remember that some shared secret key is needed .... modulator. This system operates, with bulk optics, at. 200kHz rate for demonstration purposes and faster fiber .... ∗E-mail: barbosa

quantum entanglement and Alice's (the message sender's) public announcement, the eavesdropping can be detected provided that the number of the checking groups is big enough. ... and local unitary operations. This communication protocol can be used to

Aug 5, 2016 - An alternative energy storage with infinite capacity is also studied to serve as an upper bound. We further derive closed-form expressions for two secrecy metrics, i.e., secrecy outage probability and probability of positive secrecy cap

Dec 22, 2013 - signal, the error in the fit gives sufficient information to decode the modulating signal. For analog implementation, a ... by Short, the modulating signal is. ∗e-mail address: [email protected] ... the transmitted variable x(t)

widely performed in practice, with computer login se- quences and .... Such entangled “money” would have the desirable prop- erties of ..... one would want to use the catalysis protocol instead of the maximally-entangled protocol. For then the pr

Oct 23, 2015 - Hokkaido University, Kita14-Nishi9, Kita-ku, Sapporo 060-0814, Japan ... ment operation has been predicted to improve the fidelity and the ...

Jul 23, 2013 - Brassard et al. [2] offer an improved anonymous communication protocol that sets no limit on the number ... wants to send a qubit privately and anonymously to a re- ceiver. In the context of voting, each qubit ... of the password to a

Jan 4, 2007 - has confidential information intended only for receiver 1. The confidential ...... Inform. Theory and its App. (ISITA), Parma, Italy, October 2004.

Dec 30, 2009 - communication stack and security measures might be designed by different teams or vendors; ... for VC systems [15]. Based on a set of design principles, SeVeCom defines an architecture that comprises .... firewall that controls the dat

Nov 19, 2003 - Since languages become the tool for communication, the desire and need .... there is a potential eavesdropper listening to their con- versation if ...

Aug 19, 2016 - School of Physics and Electronics, Henan University, Kaifeng 475001, China. (e-mail: [email protected]). H.-M. Wang, W. Wang and ... online at Digital Object Identifier 10.1109/TCOMM.2016.XXXXX ...... Universit

Apr 20, 2012 - prepares a Bell state (say |ψ+〉), keeps one photon as home photon .... The security of the proposed protocol is also described in this section. ..... [1] C. H. Bennett and G. Brassard, in Proceedings of the IEEE International Confer

arXiv:quant-ph/0601147v1 21 Jan 2006. Multi-step quantum secure direct communication using multi-particle. Green-Horne-Zeilinger state. Chuan Wang1, Fu Guo Deng3 and Gui Lu Long1,2. 1 Department of Physics and Key Laboratory For Quantum Information a