A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?
Secure communication has achieved a new dimension with the advent of the schemes of
quantum key distribution (QKD) as in contrast with classical cryptography, quantum …
quantum key distribution (QKD) as in contrast with classical cryptography, quantum …
Controlled secure direct quantum communication inspired scheme for quantum identity authentication
To achieve unconditional security through quantum key distribution (QKD), users involved in
key distribution first need to authenticate each other. Classical identity authentication …
key distribution first need to authenticate each other. Classical identity authentication …
Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue
Semi-quantum protocols that allow some of the users to remain classical are proposed for a
large class of problems associated with secure communication and secure multiparty …
large class of problems associated with secure communication and secure multiparty …
Quantum cryptography: Key distribution and beyond
Quantum Cryptography: Key Distribution and Beyond Page 1 Quantum Cryptography: Key
Distribution and Beyond Akshata Shenoy-Hejamadi 1, Anirban Pathak 2 & Srikanth …
Distribution and Beyond Akshata Shenoy-Hejamadi 1, Anirban Pathak 2 & Srikanth …
Classical light vs. nonclassical light: characterizations and interesting applications
A Pathak, A Ghatak - Journal of Electromagnetic Waves and …, 2018 - Taylor & Francis
We briefly review the ideas that have shaped modern optics and have led to various
applications of light ranging from spectroscopy to astrophysics, and street lights to quantum …
applications of light ranging from spectroscopy to astrophysics, and street lights to quantum …
Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment
Private comparison is a primitive for many cryptographic tasks, and recently several
schemes for the quantum private comparison (QPC) have been proposed, where two users …
schemes for the quantum private comparison (QPC) have been proposed, where two users …
New quantum key agreement protocols based on cluster states
YG Yang, BR Li, SY Kang, XB Chen, YH Zhou… - Quantum Information …, 2019 - Springer
A new two-party quantum key agreement (QKA) protocol is proposed based on four-qubit
cluster states. Encoded four-qubit cluster states can be transmitted directly by means of …
cluster states. Encoded four-qubit cluster states can be transmitted directly by means of …
Quantum anonymous veto: a set of new protocols
We propose a set of protocols for quantum anonymous veto (QAV) broadly categorized
under the probabilistic, iterative, and deterministic schemes. The schemes are based upon …
under the probabilistic, iterative, and deterministic schemes. The schemes are based upon …
A comparative study of protocols for secure quantum communication under noisy environment: single-qubit-based protocols versus entangled-state-based protocols
The effect of noise on various protocols of secure quantum communication has been
studied. Specifically, we have investigated the effect of amplitude dam**, phase dam** …
studied. Specifically, we have investigated the effect of amplitude dam**, phase dam** …
Hierarchical joint remote state preparation in noisy environment
A novel scheme for quantum communication having substantial applications in practical life
is designed and analyzed. Specifically, we have proposed a hierarchical counterpart of the …
is designed and analyzed. Specifically, we have proposed a hierarchical counterpart of the …