Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Shaari, J. S."'
Autor:
Pirandola, S., Andersen, U. L., Banchi, L., Berta, M., Bunandar, D., Colbeck, R., Englund, D., Gehring, T., Lupo, C., Ottaviani, C., Pereira, J., Razavi, M., Shaari, J. S., Tomamichel, M., Usenko, V. C., Vallone, G., Villoresi, P., Wallden, P.
Publikováno v:
Adv. Opt. Photon. 12, 1012-1236 (2020)
Quantum cryptography is arguably the fastest growing area in quantum information science. Novel theoretical protocols are designed on a regular basis, security proofs are constantly improving, and experiments are gradually moving from proof-of-princi
Externí odkaz:
http://arxiv.org/abs/1906.01645
Autor:
Shaari, J. S., Suryadi
We present for the first time, a bidirectional Quantum Key Distribution protocol with minimal encoding operations derived from the use of two `nonorthogonal' unitary transformations selected from two mutually unbiased unitary bases; which are indisti
Externí odkaz:
http://arxiv.org/abs/1705.03170
We reply to the Comment made in arXiv:1107.4435v1 [quant-ph] (Phys. Lett. A \textbf{374} (2010) 1097) by noting some erroneous considerations therein resulting in a misleading view of the quantum key distribution protocol in question. We then correct
Externí odkaz:
http://arxiv.org/abs/1110.1170
Autor:
Shaari, J. S., Bahari, Iskandar
Publikováno v:
Physics Letters A, Volume 374, Issue 41, 2010, Pages 4205-4211
We review the study on a two way quantum key distribution protocol given imperfect settings through a simple analysis of a toy model and show that it can outperform a BB84 setup. We provide the sufficient condition for this as a ratio of optimal inte
Externí odkaz:
http://arxiv.org/abs/1009.3562
We study the possible application of the decoy state method on a basic two way quantum key distribution (QKD) scheme to extend its distance. Noting the obvious advantage of such a QKD scheme in allowing for single as well as double photon contributio
Externí odkaz:
http://arxiv.org/abs/1006.1693
We describe how to modify the BB84 protocol for quantum cryptography in order to make it deterministic. We study both theoretical and experimental aspects of this issue, showing that the new scheme is as secure as the old one, more efficient on small
Externí odkaz:
http://arxiv.org/abs/0707.3913
We propose in this paper a novel deterministic protocol using particular maximally entangled states of polarized photons for a genuine bidirectional secure communication setup. We further propose a plausible experimental setup for such a protocol usi
Externí odkaz:
http://arxiv.org/abs/quant-ph/0702084
Publikováno v:
Physics Letters A, Volume 372, Issue 12, 17 March 2008, Pages 1963-1967
We consider the problem of encoding classical information into unknown qudit states belonging to any basis, of a maximal set of mutually unbiased bases, by one party and then decoding by another party who has perfect knowledge of the basis. Working w
Externí odkaz:
http://arxiv.org/abs/quant-ph/0701055
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.