Authenticated semi-quantum direct communication protocols using Bell states

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Controlled Quantum Secure Direct Communication Protocols

We study controlled quantum secure direct communication (CQSDC), a cryptographic scheme where a sender can send a secret bit-string to an intended recipient, without any secure classical channel, who can obtain the complete bit-string only with the permission of a controller. We report an efficient protocol to realize CQSDC using Cluster state and then go on to construct a (2-3)-CQSDC using Bro...

متن کامل

W-states and Quantum Communication Protocols

We consider W-states and generalized W-states for n-qubit systems. We obtain conditions to use these states as quantum resources to teleport unknown states. Only a limited class of multiqubit states can be teleported. For one-qubit states, we use protocols which are simple extensions of the conventional teleportation protocol. We also show that these resource states can be used to transmit at m...

متن کامل

Quantum communication protocols using the vacuum

Entanglement is in the eyes of the beholder. Unitary transformations that affect the definition of one’s systems change, in general, the amount of entanglement in a given state. For instance, the Lorentz transformation of the spin degrees of freedom of a particle depends on its momentum. Thus the entanglement between the spin and momentum of a particle is not a Lorentz-invariant concept [1]. On...

متن کامل

A random quantum key distribution by using Bell states

We proposed a new scheme for quantum key distribution based on entanglement swapping. By this protocol Alice can securely share a random quantum key with Bob, without transporting any particle.

متن کامل

Authenticated communication from quantum readout of PUFs

Quantum Readout of Physical Unclonable Functions (PUFs) is a recently introduced method for remote authentication of objects. We present an extension of the protocol to enable the authentication of data: a verifier can check if received classical data was sent by the PUF holder. We call this modification QR-d or, in the case of the optical-PUF implementation, QSA-d. We discuss how QSA-d can be ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Quantum Information Processing

سال: 2015

ISSN: 1570-0755,1573-1332

DOI: 10.1007/s11128-015-1182-y