Filters








464 Hits in 5.7 sec

A General Scheme for Information Interception in the Ping-Pong Protocol

Piotr Zawadzki, Jarosław Adam Miszczak
<span title="">2016</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/dur7nzaqy5hezkanc3eeianfuy" style="color: black;">Advances in Mathematical Physics</a> </i> &nbsp;
The existence of undetectable eavesdropping of dense coded information has been already demonstrated by Pavičić for the quantum direct communication based on the ping-pong paradigm.  ...  These deficiencies are removed in the presented contribution. A new generic eavesdropping scheme built on a firm theoretical background is proposed.  ...  Acknowledgments Piotr Zawadzki acknowledges the support from the statutory sources and Jarosław Adam Miszczak was supported by the Polish National Science Center (NCN) under Grant 2011/03/D/ST6/00413.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2016/3162012">doi:10.1155/2016/3162012</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/56svobowe5ctvhtrn6ygt27h2e">fatcat:56svobowe5ctvhtrn6ygt27h2e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190304104202/http://pdfs.semanticscholar.org/bc40/90749e5ac30783f5c033a7bb544d144d30b0.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bc/40/bc4090749e5ac30783f5c033a7bb544d144d30b0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2016/3162012"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

Modern quantum technologies of information security against cyber‐terrorist attacks

Oleksandr Korchenko, Yevhen Vasiliu, Sergiy Gnatyuk
<span title="">2010</span> <i title="Vilnius Gediminas Technical University"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jetyg6lr4rf2tfq27qwlc3xwpa" style="color: black;">Aviation</a> </i> &nbsp;
A qualitative analysis of the advantages and disadvantages of concrete quantum protocols is made.  ...  In this paper, the systematisation and classification of modern quantum technologies of information security against cyber-terrorist attack are carried out.  ...  I is Eve's information. A non-quantum method of security amplification for the ping-pong protocol is suggested in [76] . This method is as follows.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3846/aviation.2010.10">doi:10.3846/aviation.2010.10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/y4ykbjtn2ra3flhq2jqz7m4nbm">fatcat:y4ykbjtn2ra3flhq2jqz7m4nbm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190227233314/http://pdfs.semanticscholar.org/982f/5eedd3fbed2951a248319d6b36adb0d199df.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/98/2f/982f5eedd3fbed2951a248319d6b36adb0d199df.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3846/aviation.2010.10"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Improving security of the ping-pong protocol

Piotr Zawadzki
<span title="2012-02-02">2012</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/gepo2g7s2bchrk2kxigrls4zi4" style="color: black;">Quantum Information Processing</a> </i> &nbsp;
A security layer for the asymptotically secure ping-pong protocol is proposed and analyzed in the paper.  ...  Its role is similar to the privacy amplification algorithms known from the quantum key distribution schemes.  ...  The problem with the ping-pong protocol security lies in P.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11128-012-0363-1">doi:10.1007/s11128-012-0363-1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vrklwyl7mvbcxoubj7vydea4qa">fatcat:vrklwyl7mvbcxoubj7vydea4qa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171015084937/http://publisher-connector.core.ac.uk/resourcesync/data/Springer-OA/pdf/83c/aHR0cDovL2xpbmsuc3ByaW5nZXIuY29tLzEwLjEwMDcvczExMTI4LTAxMi0wMzYzLTEucGRm.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/21/ed/21ede55a8f988c4ddd29bf8e2134377754a25bb8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11128-012-0363-1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Quantum Secure Telecommunication Systems [chapter]

Oleksandr Korchenko, Petro Vorobiyenko, Maksym Lutskiy, Yevhen Vasiliu, Sergiy Gnatyuk
<span title="2012-03-30">2012</span> <i title="InTech"> Telecommunications Networks - Current Status and Future Trends </i> &nbsp;
A similar result for the ping-pong protocol using qutrit pairs is presented (Vasiliu, 2011) .  ...  A non-quantum method of security amplification for the ping-pong protocol is suggested in (Vasiliu & Nikolaenko, 2009; Korchenko et al., 2010c) .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5772/38832">doi:10.5772/38832</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ugyj3ypodjdvri4263a6dv72se">fatcat:ugyj3ypodjdvri4263a6dv72se</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190503163551/https://api.intechopen.com/chapter/pdf-download/33211" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7b/8f/7b8f81ad6b57fcf80adab9270740f59673775158.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5772/38832"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Security of ping-pong protocol based on pairs of completely entangled qudits

Piotr Zawadzki
<span title="2011-09-22">2011</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/gepo2g7s2bchrk2kxigrls4zi4" style="color: black;">Quantum Information Processing</a> </i> &nbsp;
The paper presents a general method of calculation of the eavesdropped information as a function of the attack detection probability.  ...  The method is applied to the ping-pong protocol based on completely entangled pairs of qudits.  ...  The ping-pong protocol in short In the provided protocol description, Alice and Bob are legitimate parties and Eve is a malicious eavesdropper. The ping-pong protocol operates in two modes.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11128-011-0307-1">doi:10.1007/s11128-011-0307-1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/o6m2iiwin5ccpcfuhbngq7dsh4">fatcat:o6m2iiwin5ccpcfuhbngq7dsh4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171014032954/http://publisher-connector.core.ac.uk/resourcesync/data/Springer-OA/pdf/6d3/aHR0cDovL2xpbmsuc3ByaW5nZXIuY29tLzEwLjEwMDcvczExMTI4LTAxMS0wMzA3LTEucGRm.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fa/14/fa1409d6728e817a1b9e18f5aa6eab9736d151e6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11128-011-0307-1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Security of the quantum direct communication based on pairs of completely entangled qudits

Piotr Zawadzki
<span title="2011-01-01">2011</span> <i title="Institute of Theoretical and Applied Informatics, Polish Academy of Sciences"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/3574m6cnq5d23kqe6oq6ruxl4i" style="color: black;">Theoretical and Applied Informatics</a> </i> &nbsp;
The paper presents a general method of calculation of the eavesdropped information as a function of the attack detection probability.  ...  The method is applied to the ping-pong protocol based on completely entangled pairs of qudits. The lower and upper bound on the amount of the leaked information is provided.  ...  Fortunately, the proposed general approach to the security analysis of the ping-pong protocols also may be used in such a case.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2478/v10179-011-0006-8">doi:10.2478/v10179-011-0006-8</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/72x24bbnijdhxgv74a5h6iiqce">fatcat:72x24bbnijdhxgv74a5h6iiqce</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721200939/https://taai.iitis.pl/taai/article/download/335/taai-vol.23-no.2-pp.85" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/85/83/858315b2239793fccbf740973149752e64d1c96b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2478/v10179-011-0006-8"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Quantum identity authentication based on ping-pong technique for photons

Zheshen Zhang, Guihua Zeng, Nanrun Zhou, Jin Xiong
<span title="">2006</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/j5vumr4o65agbmeqovmzt67pqe" style="color: black;">Physics Letters A</a> </i> &nbsp;
To prevent active attack, an one-way quantum identity authentication scheme is proposed by employing mechanism of ping-pong protocol and property of quantum controlled-NOT gate.  ...  It can verify the user's identity as well as distribute an updated key as the authentication key. Analytical results show the proposed scheme is secure under general individual attack.  ...  This work has been supported by the National Natural Science Foundation of China (Grant Nos. 60472018, 10547125).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.physleta.2006.03.048">doi:10.1016/j.physleta.2006.03.048</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5frw6upwt5dgxo2uftn62lipgq">fatcat:5frw6upwt5dgxo2uftn62lipgq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809004537/http://eelab.sjtu.edu.cn/jxcg/images/student/42%20Quantum%20identity%20authentication%20based%20on%20ping-pong%20technique%20for%20photons.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bd/3a/bd3af52c8428e2099cc765e491816705dc6f6de9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.physleta.2006.03.048"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

The security of Ping-Pong protocol [article]

Jian-Chuan Tan, An Min Wang
<span title="2008-08-28">2008</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Ping-Pong protocol is a type of quantum key distribution which makes use of two entangled photons in the EPR state.  ...  In this paper, we study the security of this protocol against some known quantum attacks, and present a scheme that may enhance its security to some degree.  ...  Acknowledgement: We are grateful to all the collaborators of our quantum theory group in the institute for theoretical physics of my university.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/0808.3880v1">arXiv:0808.3880v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/id6bbcjmqzd5tm6rxtchyrb2xm">fatcat:id6bbcjmqzd5tm6rxtchyrb2xm</a> </span>
<a target="_blank" rel="noopener" href="https://archive.org/download/arxiv-0808.3880/0808.3880.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> File Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/0808.3880v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Non-coherent attack on the ping-pong protocol with completely entangled pairs of qutrits

Eugene V. Vasiliu
<span title="2010-07-20">2010</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/gepo2g7s2bchrk2kxigrls4zi4" style="color: black;">Quantum Information Processing</a> </i> &nbsp;
It is also shown, that with the use by legitimate users in a control mode two mutually unbiased measuring bases the ping-pong protocol with pairs of qutrits, similar to the protocol with groups of qubits  ...  The general individual (non-coherent) attack on the ping-pong protocol with completely entangled pairs of three-dimensional quantum systems (qutrits) is analyzed.  ...  GENERAL INDIVIDUAL ATTACK USING QUANTUM ANCILLAS AGAINST THE PING-PONG PROTOCOL WITH ENTANGLED PAIRS OF QUTRITS According to the scheme of the ping-pong protocol Alice informs Bob via the public channel  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11128-010-0188-8">doi:10.1007/s11128-010-0188-8</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ty3lo5apfrh3jobkpldnf7rlku">fatcat:ty3lo5apfrh3jobkpldnf7rlku</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200908102027/https://arxiv.org/vc/arxiv/papers/0910/0910.2002v1.pdf" title="fulltext PDF download [not primary version]" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <span style="color: #f43e3e;">&#10033;</span> <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d0/cc/d0cc6067f1601fa859eaa73c5b6de4e70f96d952.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11128-010-0188-8"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

On the security of the ping-pong protocol

Kim Boström, Timo Felbinger
<span title="">2008</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/j5vumr4o65agbmeqovmzt67pqe" style="color: black;">Physics Letters A</a> </i> &nbsp;
We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol.  ...  We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.  ...  WOJCIK'S ATTACK ON A LOSSY QUANTUM CHANNEL So far, the ping-pong protocol is provably secure only for the case of a perfect quantum channel.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.physleta.2008.03.048">doi:10.1016/j.physleta.2008.03.048</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kadwrjzxtvhapik3nzvqj6utka">fatcat:kadwrjzxtvhapik3nzvqj6utka</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200826012458/https://arxiv.org/pdf/0708.2986v1.pdf" title="fulltext PDF download [not primary version]" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <span style="color: #f43e3e;">&#10033;</span> <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ba/1e/ba1e639ab3ebaf225a2e2d95d3da85be2b28a9c2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.physleta.2008.03.048"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Quantum secure direct communication based on order rearrangement of single photons

Jian Wang, Quan Zhang, Chao-jing Tang
<span title="">2006</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/j5vumr4o65agbmeqovmzt67pqe" style="color: black;">Physics Letters A</a> </i> &nbsp;
The present scheme is efficient in that all of the polarized photons are used to transmit the sender's secret message except those chosen for eavesdropping check.  ...  We also generalize this scheme to a multiparty controlled quantum secret direct communication scheme which the sender's secret message can only be recovered by the receiver under the permission of all  ...  Acknowledgments This work is supported by the National Natural Science Foundation of China under Grant No. 60472032.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.physleta.2006.05.035">doi:10.1016/j.physleta.2006.05.035</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mba573jhjzafnesfkayz446uk4">fatcat:mba573jhjzafnesfkayz446uk4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180723105142/http://cds.cern.ch/record/937232/files/0603100.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/21/c1/21c1dc73f523d61ace23f7dedbb5684242ca93cc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.physleta.2006.05.035"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

On the implementation of a deterministic secure coding protocol using polarization entangled photons

Martin Ostermeyer, Nino Walenta
<span title="">2008</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7htih4lbifdrfgkjfts6iewfoa" style="color: black;">Optics Communications</a> </i> &nbsp;
We demonstrate a prototype-implementation of deterministic information encoding for quantum key distribution (QKD) following the ping-pong coding protocol [K. Bostroem, T. Felbinger, Phys. Rev.  ...  In the course of our implementation we analyze the practicability of the protocol and discuss some security aspects of information transfer in such a deterministic scheme.  ...  Different from single photon QKD in the ping-pong-coding scheme the travel photon is not an information carrier as pointed out above.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.optcom.2008.04.068">doi:10.1016/j.optcom.2008.04.068</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/62fhsmzknna5hmipgr4xy5p7ya">fatcat:62fhsmzknna5hmipgr4xy5p7ya</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20121114220837/http://nlo.physik.uni-potsdam.de/assets/files/publications/ping_pong_oc.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6d/af/6dafc2ac55506e07667ab4da10b46c18ab1910e9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.optcom.2008.04.068"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Quantum Three-Pass protocol: Key distribution using quantum superposition states [article]

Yoshito KanamoriUniversity of Alaska Anchorage, Alaska, USA, The University of Alabama in Huntsville, Alabama, USA)
<span title="2010-04-05">2010</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Our protocol utilizes a photon in superposition state for single-bit data transmission instead of a classical electrical/optical signal.  ...  This letter proposes a novel key distribution protocol with no key exchange in advance, which is secure as the BB84 quantum key distribution protocol.  ...  Ping-pong QSDC uses EPR pairs [18] . The weaknesses of the ping-pong scheme were found by Wójcik [19] and Cai [20] . They improved the ping-pong scheme.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1004.0599v1">arXiv:1004.0599v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xf6lhlcaxfbqnnpzudd6rmav2u">fatcat:xf6lhlcaxfbqnnpzudd6rmav2u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200905201534/https://arxiv.org/ftp/arxiv/papers/1004/1004.0599.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/05/5b/055b68ece13863e10c58f091ab59bb93d66735c9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1004.0599v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Quantum Secure Group Communication

Zheng-Hong Li, M. Suhail Zubairy, M. Al-Amri
<span title="2018-03-01">2018</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/tnqhc2x2aneavcd3gx5h7mswhm" style="color: black;">Scientific Reports</a> </i> &nbsp;
In the Ping-Pong protocol, Alice (the message Published: xx xx xxxx OPEN www.nature.com/scientificreports/ 2 ScIentIfIc RepORTS | (2018) 8:3899 |  ...  Our protocol is based on the Ping-Pong protocol 6 , which is one kind of direct secure quantum communication protocol between two communicators.  ...  This work is also supported by a grant from the King Abdulaziz city for Science and Technology (KACST). Z.-H. Li thanks the Young Eastern Scholar (QD2016018) at Shanghai Institutions of Higher.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1038/s41598-018-21743-w">doi:10.1038/s41598-018-21743-w</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/29497080">pmid:29497080</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC5832868/">pmcid:PMC5832868</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/24rxxfa4w5aofmkazkythav65y">fatcat:24rxxfa4w5aofmkazkythav65y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200211071801/http://europepmc.org/backend/ptpmcrender.fcgi?accid=PMC5832868&amp;blobtype=pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6a/01/6a012db85ca6e79f917e98909df8a0f1f6056746.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1038/s41598-018-21743-w"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5832868" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

One Step Quantum Key Distribution Based on EPR Entanglement

Jian Li, Na Li, Lei-Lei Li, Tao Wang
<span title="2016-06-30">2016</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/tnqhc2x2aneavcd3gx5h7mswhm" style="color: black;">Scientific Reports</a> </i> &nbsp;
In ref. 38, Boström and Felbinger presented a famous QSDC protocol which is called "Ping-pong" protocol. But researchers have found much vulnerability 39-42 in the "Ping-pong" protocol.  ...  Quantum mechanics offers some unique capabilities for the processing of the information, such as quantum computation and quantum communication.  ...  Results New QKD Protocol. Referring to the BB84 protocol and "Ping-pong" protocol, a new one step quantum key distribution protocol is proposed, which based on entanglement and dense coding.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1038/srep28767">doi:10.1038/srep28767</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/27357865">pmid:27357865</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC4928064/">pmcid:PMC4928064</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/us7usegxy5dczpflvqrnx3xbbi">fatcat:us7usegxy5dczpflvqrnx3xbbi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200313152720/https://www.nature.com/articles/srep28767.pdf?error=cookies_not_supported&amp;code=8d13dddf-6c37-4f39-9579-2ff3ac27d888" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f3/42/f3420d83df6095de5d2ca38e8c03b60c3070e4b6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1038/srep28767"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4928064" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 464 results