Efficient quantum private comparison protocol utilizing single photons and rotational encryption

TY Kou, BC Che, Z Dou, XB Chen, YP Lai… - Chinese Physics …, 2022 - iopscience.iop.org
As a branch of quantum secure multiparty computation, quantum private comparison is
applied frequently in many fields, such as secret elections, private voting, and identification …

Quantum routing of few photons using a nonlinear cavity coupled to two chiral waveguides

JS Liu, Y Yang, J Lu, L Zhou - Chinese Physics B, 2022 - iopscience.iop.org
We investigate few-photon scattering properties in two one-dimensional waveguides chirally
coupled to a nonlinear cavity. The quantum states of scattered few photons are solved …

Reference-frame-independent and measurement-device-independent quantum key distribution using one single source

Q Li, C Zhu, S Ma, K Wei, C Pei - International Journal of Theoretical …, 2018 - Springer
Measurement-device-independent quantum key distribution (MDI-QKD) is immune to all
detector side-channel attacks. However, practical implementations of MDI-QKD, which …

Influence of atmospheric turbulence on the quantum polarization state

R Yang, Y Xue, Y Li, L Shi, Y Zhu… - Young Scientists Forum …, 2018 - spiedigitallibrary.org
In order to study the influence of atmospheric turbulence on the polarization state of the free
space quantum communication, the relationship between the refractive index and altitude …

Optical designs for realization of a set of schemes for quantum cryptography

M Sisodia, K Thapliyal, A Pathak - Optical and Quantum Electronics, 2021 - Springer
Several quantum cryptographic schemes have been proposed and realized experimentally
in the past. However, even with an advancement in quantum technology and escalated …

Improving continuous-variable quantum key distribution under local oscillator intensity attack using entanglement in the middle

FL Yang, Y Guo, JJ Shi, HL Wang, JJ Pan - Chinese Physics B, 2017 - iopscience.iop.org
A modified continuous-variable quantum key distribution (CVQKD) protocol is proposed by
originating the entangled source from a malicious third party Eve in the middle instead of …

Design and Analysis of Communication Protocols using Quantum Resources

M Sisodia - arxiv preprint arxiv:2002.09278, 2020 - arxiv.org
This thesis is focused on the design and analysis of quantum communication protocols.
Several schemes for quantum communication have been introduced in the recent past. For …

Optical sideband interference using optical IQ and Mach-Zehnder modulators

G Kumar, N Chandra… - … National Conference on …, 2021 - ieeexplore.ieee.org
We observe optical sideband interference using an optical IQ modulator at the transmitter
and a Mach-Zehnder modulator at the receiver. We measure 82% interference visibility in …

Passive round-robin differential-quadrature-phase-shift quantum key distribution scheme with untrusted detectors

H Liu, W Qu, T Dou, J Wang, Y Zhang, H Ma - Chinese Physics B, 2018 - iopscience.iop.org
In this paper, we proposed the scheme for a passive round-robin differential-phase-shift
quantum key distribution (RRDPS-QKD) set-up based on the principle of Hong–Ou–Mandel …