3,165 research outputs found
Asymmetric Quantum Dialogue in Noisy Environment
A notion of asymmetric quantum dialogue (AQD) is introduced. Conventional
protocols of quantum dialogue are essentially symmetric as both the users
(Alice and Bob) can encode the same amount of classical information. In
contrast, the scheme for AQD introduced here provides different amount of
communication powers to Alice and Bob. The proposed scheme, offers an
architecture, where the entangled state and the encoding scheme to be shared
between Alice and Bob depends on the amount of classical information they want
to exchange with each other. The general structure for the AQD scheme has been
obtained using a group theoretic structure of the operators introduced in
(Shukla et al., Phys. Lett. A, 377 (2013) 518). The effect of different types
of noises (e.g., amplitude damping and phase damping noise) on the proposed
scheme is investigated, and it is shown that the proposed AQD is robust and
uses optimized amount of quantum resources.Comment: 11 pages, 2 figure
A comparative study of protocols for secure quantum communication under noisy environment: single-qubit-based protocols versus entangled-state-based protocols
The effect of noise on various protocols of secure quantum communication has
been studied. Specifically, we have investigated the effect of amplitude
damping, phase damping, squeezed generalized amplitude damping, Pauli type as
well as various collective noise models on the protocols of quantum key
distribution, quantum key agreement,quantum secure direct quantum communication
and quantum dialogue. From each type of protocol of secure quantum
communication, we have chosen two protocols for our comparative study; one
based on single qubit states and the other one on entangled states. The
comparative study reported here has revealed that single-qubit-based schemes
are generally found to perform better in the presence of amplitude damping,
phase damping, squeezed generalized amplitude damping noises, while
entanglement-based protocols turn out to be preferable in the presence of
collective noises. It is also observed that the effect of noise entirely
depends upon the number of rounds of quantum communication involved in a scheme
of quantum communication. Further, it is observed that squeezing, a completely
quantum mechanical resource present in the squeezed generalized amplitude
channel, can be used in a beneficial way as it may yield higher fidelity
compared to the corresponding zero squeezing case.Comment: 23 pages 7 figure
Kak's three-stage protocol of secure quantum communication revisited: Hitherto unknown strengths and weaknesses of the protocol
Kak's three-stage protocol for quantum key distribution is revisited with
special focus on its hitherto unknown strengths and weaknesses. It is shown
that this protocol can be used for secure direct quantum communication.
Further, the implementability of this protocol in the realistic situation is
analyzed by considering various Markovian noise models. It is found that the
Kak's protocol and its variants in their original form can be implemented only
in a restricted class of noisy channels, where the protocols can be transformed
to corresponding protocols based on logical qubits in decoherence free
subspace. Specifically, it is observed that Kak's protocol can be implemented
in the presence of collective rotation and collective dephasing noise, but
cannot be implemented in its original form in the presence of other types of
noise, like amplitude damping and phase damping noise. Further, the performance
of the protocol in the noisy environment is quantified by computing average
fidelity under various noise models, and subsequently a set of preferred states
for secure communication in noisy environment have also been identified.Comment: Kak's protocol is not suitable for quantum cryptography in presence
of nois
Kak's three-stage protocol of secure quantum communication revisited: Hitherto unknown strengths and weaknesses of the protocol
Kak's three-stage protocol for quantum key distribution is revisited with
special focus on its hitherto unknown strengths and weaknesses. It is shown
that this protocol can be used for secure direct quantum communication.
Further, the implementability of this protocol in the realistic situation is
analyzed by considering various Markovian noise models. It is found that the
Kak's protocol and its variants in their original form can be implemented only
in a restricted class of noisy channels, where the protocols can be transformed
to corresponding protocols based on logical qubits in decoherence free
subspace. Specifically, it is observed that Kak's protocol can be implemented
in the presence of collective rotation and collective dephasing noise, but
cannot be implemented in its original form in the presence of other types of
noise, like amplitude damping and phase damping noise. Further, the performance
of the protocol in the noisy environment is quantified by computing average
fidelity under various noise models, and subsequently a set of preferred states
for secure communication in noisy environment have also been identified.Comment: Kak's protocol is not suitable for quantum cryptography in presence
of nois
Effect of Noise on Practical Quantum Communication Systems
Entanglement is an important resource for various applications of quantum computation. Another important endeavor is to establish the role of entanglement in practical implementation where system of interest is affected by various kinds of noisy channels. Here, a single classical bit is used to send information under the influence of a noisy quantum channel. The entanglement content of quantum states is computed under noisy channels such as amplitude damping, phase damping, squeesed generalised amplitude damping, Pauli channels and various collective noise models on the protocols of quantum key distribution.
Semi-quantum communication: Protocols for key agreement, controlled secure direct communication and dialogue
Semi-quantum protocols that allow some of the users to remain classical are
proposed for a large class of problems associated with secure communication and
secure multiparty computation. Specifically, first time semi-quantum protocols
are proposed for key agreement, controlled deterministic secure communication
and dialogue, and it is shown that the semi-quantum protocols for controlled
deterministic secure communication and dialogue can be reduced to semi-quantum
protocols for e-commerce and private comparison (socialist millionaire
problem), respectively. Complementing with the earlier proposed semi-quantum
schemes for key distribution, secret sharing and deterministic secure
communication, set of schemes proposed here and subsequent discussions have
established that almost every secure communication and computation tasks that
can be performed using fully quantum protocols can also be performed in
semi-quantum manner. Further, it addresses a fundamental question in context of
a large number problems- how much quantumness is (how many quantum parties are)
required to perform a specific secure communication task? Some of the proposed
schemes are completely orthogonal-state-based, and thus, fundamentally
different from the existing semi-quantum schemes that are
conjugate-coding-based. Security, efficiency and applicability of the proposed
schemes have been discussed with appropriate importance.Comment: 19 pages 1 figur
Experimental Study of the Quantum States of Light and Realization of a Quantum Communication Protocol\ud
I present how to obtain and characterize quantum states of light potentially useful for quantum communication protocols. The control of the frequency correlations,\ud
and the bandwidth, of single and paired photons is an essential ingredient in specific quantum applications, from quantum imaging to quantum clock synchronization.\ud
I show both theoretical and experimental spectral correlations of pairs of photons generated in non-collinear spontaneous parametric down conversion (SPDC). In the second part of the work, a scheme for quantum key distribution using the two-way LM05 protocol [PRL 94, 140501 (2005)] and its implementation is presented too. A preliminary transmission test is discussed together with\ud
an experimental study for the security of the generated key in presence of noise in the channels. The noise is modulated as to simulate the effect of an eavesdropper.\u
- …