A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?
Secure communication has achieved a new dimension with the advent of the schemes of
quantum key distribution (QKD) as in contrast with classical cryptography, quantum …
quantum key distribution (QKD) as in contrast with classical cryptography, quantum …
[BOOK][B] Elements of quantum computation and quantum communication
A Pathak - 2013 - api.taylorfrancis.com
This introductory textbook is written primarily for undergraduate students of physics,
mathematics, computer science and other related disciplines. It is also expected to be …
mathematics, computer science and other related disciplines. It is also expected to be …
Controlled secure direct quantum communication inspired scheme for quantum identity authentication
To achieve unconditional security through quantum key distribution (QKD), users involved in
key distribution first need to authenticate each other. Classical identity authentication …
key distribution first need to authenticate each other. Classical identity authentication …
Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue
Semi-quantum protocols that allow some of the users to remain classical are proposed for a
large class of problems associated with secure communication and secure multiparty …
large class of problems associated with secure communication and secure multiparty …
Classical light vs. nonclassical light: characterizations and interesting applications
A Pathak, A Ghatak - Journal of Electromagnetic Waves and …, 2018 - Taylor & Francis
We briefly review the ideas that have shaped modern optics and have led to various
applications of light ranging from spectroscopy to astrophysics, and street lights to quantum …
applications of light ranging from spectroscopy to astrophysics, and street lights to quantum …
Protocols of quantum key agreement solely using Bell states and Bell measurement
Two protocols of quantum key agreement (QKA) that solely use Bell state and Bell
measurement are proposed. The first protocol of QKA proposed here is designed for two …
measurement are proposed. The first protocol of QKA proposed here is designed for two …
Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment
Private comparison is a primitive for many cryptographic tasks, and recently several
schemes for the quantum private comparison (QPC) have been proposed, where two users …
schemes for the quantum private comparison (QPC) have been proposed, where two users …
New quantum key agreement protocols based on cluster states
YG Yang, BR Li, SY Kang, XB Chen, YH Zhou… - Quantum Information …, 2019 - Springer
A new two-party quantum key agreement (QKA) protocol is proposed based on four-qubit
cluster states. Encoded four-qubit cluster states can be transmitted directly by means of …
cluster states. Encoded four-qubit cluster states can be transmitted directly by means of …
Quantum key agreement protocols with four-qubit cluster states
YF He, WP Ma - Quantum Information Processing, 2015 - Springer
Based on unitary operations and four-qubit cluster states, a two-party and a three-party
quantum key agreement protocols are proposed, respectively, in this paper. The two-party …
quantum key agreement protocols are proposed, respectively, in this paper. The two-party …
Two-party quantum key agreement with four-qubit cluster states
DS Shen, WP Ma, L Wang - Quantum information processing, 2014 - Springer
Based on four-qubit cluster states, we present a two-party quantum key agreement (QKA)
scheme using unitary operations. In this scheme, two participants perform the unitary …
scheme using unitary operations. In this scheme, two participants perform the unitary …