A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?

A Dutta, A Pathak - Quantum Information Processing, 2022 - Springer
Secure communication has achieved a new dimension with the advent of the schemes of
quantum key distribution (QKD) as in contrast with classical cryptography, quantum …

Controlled secure direct quantum communication inspired scheme for quantum identity authentication

A Dutta, A Pathak - Quantum Information Processing, 2022 - Springer
To achieve unconditional security through quantum key distribution (QKD), users involved in
key distribution first need to authenticate each other. Classical identity authentication …

Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue

C Shukla, K Thapliyal, A Pathak - Quantum Information Processing, 2017 - Springer
Semi-quantum protocols that allow some of the users to remain classical are proposed for a
large class of problems associated with secure communication and secure multiparty …

Quantum cryptography: Key distribution and beyond

A Pathak, R Srikanth - arxiv preprint arxiv:1802.05517, 2018 - arxiv.org
Quantum Cryptography: Key Distribution and Beyond Page 1 Quantum Cryptography: Key
Distribution and Beyond Akshata Shenoy-Hejamadi 1, Anirban Pathak 2 & Srikanth …

Classical light vs. nonclassical light: characterizations and interesting applications

A Pathak, A Ghatak - Journal of Electromagnetic Waves and …, 2018 - Taylor & Francis
We briefly review the ideas that have shaped modern optics and have led to various
applications of light ranging from spectroscopy to astrophysics, and street lights to quantum …

Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment

K Thapliyal, RD Sharma, A Pathak - International Journal of …, 2018 - World Scientific
Private comparison is a primitive for many cryptographic tasks, and recently several
schemes for the quantum private comparison (QPC) have been proposed, where two users …

New quantum key agreement protocols based on cluster states

YG Yang, BR Li, SY Kang, XB Chen, YH Zhou… - Quantum Information …, 2019 - Springer
A new two-party quantum key agreement (QKA) protocol is proposed based on four-qubit
cluster states. Encoded four-qubit cluster states can be transmitted directly by means of …

Quantum anonymous veto: a set of new protocols

S Mishra, K Thapliyal, A Parakh, A Pathak - EPJ Quantum Technology, 2022 - epjqt.epj.org
We propose a set of protocols for quantum anonymous veto (QAV) broadly categorized
under the probabilistic, iterative, and deterministic schemes. The schemes are based upon …

A comparative study of protocols for secure quantum communication under noisy environment: single-qubit-based protocols versus entangled-state-based protocols

V Sharma, K Thapliyal, A Pathak… - Quantum Information …, 2016 - Springer
The effect of noise on various protocols of secure quantum communication has been
studied. Specifically, we have investigated the effect of amplitude dam**, phase dam** …

Hierarchical joint remote state preparation in noisy environment

C Shukla, K Thapliyal, A Pathak - Quantum Information Processing, 2017 - Springer
A novel scheme for quantum communication having substantial applications in practical life
is designed and analyzed. Specifically, we have proposed a hierarchical counterpart of the …