1,332 research outputs found
Hierarchical Joint Remote State Preparation in Noisy Environment
A novel scheme for quantum communication having substantial applications in
practical life is designed and analyzed. Specifically, we have proposed a
hierarchical counterpart of the joint remote state preparation (JRSP) protocol,
where two senders can jointly and remotely prepare a quantum state. One sender
has the information regarding amplitude, while the other one has the phase
information of a quantum state to be jointly prepared at the receiver's port.
However, there exists a hierarchy among the receivers, as far as powers to
reconstruct the quantum state is concerned. A 5-qubit cluster state has been
used here to perform the task. Further, it is established that the proposed
scheme for hierarchical JRSP (HJRSP) is of enormous practical importance in
critical situations involving defense and other sectors, where it is essential
to ensure that an important decision/order that can severely affect a society
or an organization is not taken by a single person, and once the order is
issued all the receivers don't possess an equal right to implement it. Further,
the effect of different noise models (e.g., amplitude damping (AD), phase
damping (PD), collective noise and Pauli noise models) on the HJRSP protocol
proposed here is investigated. It is found that in AD and PD noise models a
higher power agent can reconstruct the quantum state to be remotely prepared
with higher fidelity than that done by the lower power agent(s). In contrast,
the opposite may happen in the presence of collective noise models. We have
also proposed a scheme for probabilistic HJRSP using a non-maximally entangled
5-qubit cluster state.Comment: 24 pages, 6 figure
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that
allows the secure distribution of a bit string, used as key in cryptographic
protocols. When it was noted that quantum computers could break public key
cryptosystems based on number theory extensive studies have been undertaken on
QKD. Based on quantum mechanics, QKD offers unconditionally secure
communication. Now, the progress of research in this field allows the
anticipation of QKD to be available outside of laboratories within the next few
years. Efforts are made to improve the performance and reliability of the
implemented technologies. But several challenges remain despite this big
progress. The task of how to test the apparatuses of QKD For example did not
yet receive enough attention. These devises become complex and demand a big
verification effort. In this paper we are interested in an approach based on
the technique of probabilistic model checking for studying quantum information.
Precisely, we use the PRISM tool to analyze the security of BB84 protocol and
we are focused on the specific security property of eavesdropping detection. We
show that this property is affected by the parameters of quantum channel and
the power of eavesdropper.Comment: 12 Pages, IJNS
Quantum cryptography: key distribution and beyond
Uniquely among the sciences, quantum cryptography has driven both
foundational research as well as practical real-life applications. We review
the progress of quantum cryptography in the last decade, covering quantum key
distribution and other applications.Comment: It's a review on quantum cryptography and it is not restricted to QK
- …