5,432 research outputs found
Which verification qubits perform best for secure communication in noisy channel?
In secure quantum communication protocols, a set of single qubits prepared
using 2 or more mutually unbiased bases or a set of -qubit ()
entangled states of a particular form are usually used to form a verification
string which is subsequently used to detect traces of eavesdropping. The qubits
that form a verification string are referred to as decoy qubits, and there
exists a large set of different quantum states that can be used as decoy
qubits. In the absence of noise, any choice of decoy qubits provides equivalent
security. In this paper, we examine such equivalence for noisy environment
(e.g., in amplitude damping, phase damping, collective dephasing and collective
rotation noise channels) by comparing the decoy-qubit assisted schemes of
secure quantum communication that use single qubit states as decoy qubits with
the schemes that use entangled states as decoy qubits. Our study reveals that
the single qubit assisted scheme perform better in some noisy environments,
while some entangled qubits assisted schemes perform better in other noisy
environments. Specifically, single qubits assisted schemes perform better in
amplitude damping and phase damping noisy channels, whereas a few
Bell-state-based decoy schemes are found to perform better in the presence of
the collective noise. Thus, if the kind of noise present in a communication
channel (i.e., the characteristics of the channel) is known or measured, then
the present study can provide the best choice of decoy qubits required for
implementation of schemes of secure quantum communication through that channel.Comment: 11 pages, 4 figure
Controlled and secure direct communication using GHZ state and teleportation
A theoretical scheme for controlled and secure direct communication is
proposed. The communication is based on GHZ state and controlled quantum
teleportation. After insuring the security of the quantum channel (a set of
qubits in the GHZ state), Alice encodes the secret message directly on a
sequence of particle states and transmits them to Bob supervised by Charlie
using controlled quantum teleportation. Bob can read out the encoded messages
directly by the measurement on his qubits. In this scheme, the controlled
quantum teleportation transmits Alice's message without revealing any
information to a potential eavesdropper. Because there is not a transmission of
the qubit carrying the secret messages between Alice and Bob in the public
channel, it is completely secure for controlled and direct secret communication
if perfect quantum channel is used. The feature of this scheme is that the
communication between two sides depends on the agreement of the third side.Comment: 4 pages, no figur
Using of small-scale quantum computers in cryptography with many-qubit entangled states
We propose a new cryptographic protocol. It is suggested to encode
information in ordinary binary form into many-qubit entangled states with the
help of a quantum computer. A state of qubits (realized, e.g., with photons) is
transmitted through a quantum channel to the addressee, who applies a quantum
computer tuned to realize the inverse unitary transformation decoding of the
message. Different ways of eavesdropping are considered, and an estimate of the
time needed for determining the secret unitary transformation is given. It is
shown that using even small quantum computers can serve as a basis for very
efficient cryptographic protocols. For a suggested cryptographic protocol, the
time scale on which communication can be considered secure is exponential in
the number of qubits in the entangled states and in the number of gates used to
construct the quantum network
Quantum e-commerce: A comparative study of possible protocols for online shopping and other tasks related to e-commerce
A set of quantum protocols for online shopping is proposed and analyzed to
establish that it is possible to perform secure online shopping using different
types of quantum resources. Specifically, a single photon based, a Bell state
based and two 3-qubit entangled state based quantum online shopping schemes are
proposed. The Bell state based scheme, being a completely orthogonal state
based protocol, is fundamentally different from the earlier proposed schemes
which were based on conjugate coding. One of the 3-qubit entangled state based
scheme is build on the principle of entanglement swapping which enables us to
accomplish the task without transmission of the message encoded qubits through
the channel. Possible ways of generalizing the entangled state based schemes
proposed here to the schemes which use multiqubit entangled states is also
discussed. Further, all the proposed protocols are shown to be free from the
limitations of the recently proposed protocol of Huang et al. (Quantum Inf.
Process. 14, 2211-2225, 2015) which allows the buyer (Alice) to change her
order at a later time (after initially placing the order and getting it
authenticated by the controller). The proposed schemes are also compared with
the existing schemes using qubit efficiency.Comment: It's shown that quantum e-commerce is not a difficult task, and it
can be done in various way
- …