Results 21 to 30 of about 996 (38)
In this comment, we show that the special attack [S.-J. Qin, F. Gao, Q.-Y. Wen, F.-C. Zhu, Opt. Commun. 281 (2008) 5472.], which claims to be able to obtain all the transmitted secret message bit values of the protocol of the multiparty quantum secret ...
Cheng-An Yen +5 more
core +1 more source
Proposal of an experimental scheme for realising a translucent eavesdropping on a quantum cryptographic channel [PDF]
Purpose of this paper is to suggest a scheme, which can be realised with today's technology and could be used for entangling a probe to a photon qubit based on polarisation.
A.K. Eckert +39 more
core +2 more sources
Comment on "Information flow of quantum states interacting with closed timelike curves"
We show that recent results on the interaction of causality-respecting particles with particles on closed timelike curves derived in [Phys. Rev. A 82, 062330 (2010)] depend on ambiguous assumption about the form of the state which is inputted into the ...
Grudka, Andrzej +2 more
core +1 more source
Prime Factorization in the Duality Computer
We give algorithms to factorize large integers in the duality computer. We provide three duality algorithms for factorization based on a naive factorization method, the Shor algorithm in quantum computing, and the Fermat's method in classical computing ...
Donald E. Knuth +9 more
core +1 more source
In a recent paper [S. Bagherinezhad and V. Karimipour, Phys. Rev. A 67, 044302 (2003)], a quantum secret sharing protocol based on reusable GHZ states was proposed.
Gao, Fei +3 more
core +1 more source
Optimal eavesdropping in cryptography with three-dimensional quantum states
We study optimal eavesdropping in quantum cryptography with three-dimensional systems, and show that this scheme is more secure than protocols using two-dimensional states. We generalize the according eavesdropping transformation to arbitrary dimensions,
C. Fuchs +12 more
core +1 more source
Experimental quantum cryptography scheme based on orthogonal states
Since, in general, non-orthogonal states cannot be cloned, any eavesdropping attempt in a Quantum Communication scheme using non-orthogonal states as carriers of information introduces some errors in the transmission, leading to the possibility of ...
Alessio Avella +7 more
core +1 more source
Secure Key Distribution by Swapping Quantum Entanglement
We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles.
A. Beige, C. H. Bennett, Daegene Song
core +1 more source
Quantum discord from system-environment correlations
In an initially uncorrelated mixed separable bi-partite system, quantum correlations can emerge under the action of a local measurement or local noise [A. Streltsov, H. Kampermann, and D. Bru\ss{}, Phys. Rev. Lett. 107, 170502 (2011)].
Korolkova, Natalia, Tatham, Richard
core +1 more source
Stability of Phase-modulated Quantum Key Distribution System
Phase drift and random fluctuation of interference visibility in double unbalanced M-Z QKD system are observed and distinguished. It has been found that the interference visibilities are influenced deeply by the disturbance of transmission fiber.
Gui, You-Zhen +3 more
core +1 more source

