A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?

A Dutta, A Pathak - Quantum Information Processing, 2022 - Springer
Secure communication has achieved a new dimension with the advent of the schemes of
quantum key distribution (QKD) as in contrast with classical cryptography, quantum …

[BOOK][B] Elements of quantum computation and quantum communication

A Pathak - 2013 - api.taylorfrancis.com
This introductory textbook is written primarily for undergraduate students of physics,
mathematics, computer science and other related disciplines. It is also expected to be …

Controlled secure direct quantum communication inspired scheme for quantum identity authentication

A Dutta, A Pathak - Quantum Information Processing, 2022 - Springer
To achieve unconditional security through quantum key distribution (QKD), users involved in
key distribution first need to authenticate each other. Classical identity authentication …

Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue

C Shukla, K Thapliyal, A Pathak - Quantum Information Processing, 2017 - Springer
Semi-quantum protocols that allow some of the users to remain classical are proposed for a
large class of problems associated with secure communication and secure multiparty …

Classical light vs. nonclassical light: characterizations and interesting applications

A Pathak, A Ghatak - Journal of Electromagnetic Waves and …, 2018 - Taylor & Francis
We briefly review the ideas that have shaped modern optics and have led to various
applications of light ranging from spectroscopy to astrophysics, and street lights to quantum …

Protocols of quantum key agreement solely using Bell states and Bell measurement

C Shukla, N Alam, A Pathak - Quantum information processing, 2014 - Springer
Two protocols of quantum key agreement (QKA) that solely use Bell state and Bell
measurement are proposed. The first protocol of QKA proposed here is designed for two …

Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment

K Thapliyal, RD Sharma, A Pathak - International Journal of …, 2018 - World Scientific
Private comparison is a primitive for many cryptographic tasks, and recently several
schemes for the quantum private comparison (QPC) have been proposed, where two users …

New quantum key agreement protocols based on cluster states

YG Yang, BR Li, SY Kang, XB Chen, YH Zhou… - Quantum Information …, 2019 - Springer
A new two-party quantum key agreement (QKA) protocol is proposed based on four-qubit
cluster states. Encoded four-qubit cluster states can be transmitted directly by means of …

Quantum key agreement protocols with four-qubit cluster states

YF He, WP Ma - Quantum Information Processing, 2015 - Springer
Based on unitary operations and four-qubit cluster states, a two-party and a three-party
quantum key agreement protocols are proposed, respectively, in this paper. The two-party …

Two-party quantum key agreement with four-qubit cluster states

DS Shen, WP Ma, L Wang - Quantum information processing, 2014 - Springer
Based on four-qubit cluster states, we present a two-party quantum key agreement (QKA)
scheme using unitary operations. In this scheme, two participants perform the unitary …