The evolution of quantum secure direct communication: on the road to the qinternet
Communication security has to evolve to a higher plane in the face of the threat from the
massive computing power of the emerging quantum computers. Quantum secure direct …
massive computing power of the emerging quantum computers. Quantum secure direct …
A comprehensive review of quantum random number generators: Concepts, classification and the origin of randomness
Random numbers are central to cryptography and various other tasks. The intrinsic
probabilistic nature of quantum mechanics has allowed us to construct a large number of …
probabilistic nature of quantum mechanics has allowed us to construct a large number of …
Controlled secure direct quantum communication inspired scheme for quantum identity authentication
To achieve unconditional security through quantum key distribution (QKD), users involved in
key distribution first need to authenticate each other. Classical identity authentication …
key distribution first need to authenticate each other. Classical identity authentication …
A review on quantum information processing in cavities
The processing of information and computation is undergoing a paradigmatic shift since the
realization of the enormous potential of quantum features to perform these tasks. Coupled …
realization of the enormous potential of quantum features to perform these tasks. Coupled …
Experimental realization of controlled quantum teleportation of arbitrary qubit states via cluster states
Controlled quantum teleportation involves a third party as a controller for the teleportation of
state. Here, we present the novel protocols for controlling teleportation of the arbitrary two …
state. Here, we present the novel protocols for controlling teleportation of the arbitrary two …
Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue
Semi-quantum protocols that allow some of the users to remain classical are proposed for a
large class of problems associated with secure communication and secure multiparty …
large class of problems associated with secure communication and secure multiparty …
Quantum cryptography: Key distribution and beyond
Quantum Cryptography: Key Distribution and Beyond Page 1 Quantum Cryptography: Key
Distribution and Beyond Akshata Shenoy-Hejamadi 1, Anirban Pathak 2 & Srikanth …
Distribution and Beyond Akshata Shenoy-Hejamadi 1, Anirban Pathak 2 & Srikanth …
Quantum machine learning: A review and current status
Quantum machine learning is at the intersection of two of the most sought after research
areas—quantum computing and classical machine learning. Quantum machine learning …
areas—quantum computing and classical machine learning. Quantum machine learning …
A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?
Secure communication has achieved a new dimension with the advent of the schemes of
quantum key distribution (QKD) as in contrast with classical cryptography, quantum …
quantum key distribution (QKD) as in contrast with classical cryptography, quantum …
Protocols of quantum key agreement solely using Bell states and Bell measurement
Two protocols of quantum key agreement (QKA) that solely use Bell state and Bell
measurement are proposed. The first protocol of QKA proposed here is designed for two …
measurement are proposed. The first protocol of QKA proposed here is designed for two …