Restricted Access. An open-access version is available at arXiv.org (one of the alternative locations)It is shown that maximally efficient protocols for secure direct quantum communications can be constructed using any arbitrary orthogonal basis. This establishes that no set of quantum states (e.g. GHZ states, W states, Brown states or Cluster states) has an advantage over the others, barring the relative difficulty in physical implementation. The work provides a wide choice of states for experimental realization of direct secure quantum communication protocols. We have also shown that this protocol can be generalized to a completely orthogonal-state-based protocol of Goldenberg–Vaidman (GV) type. The security of these protocols essentially...
We identify those properties of a quantum channel that are relevant for cryptography. We focus on ge...
Abstract. In this paper, we present a protocol in which two or more parties can share multipartite e...
We consider multi-party quantum cryptography. Suppose three parties, Alice, Bob and Charlie, share a...
In majority of protocols of secure quantum communication (such as, BB84, B92, etc.), the uncondition...
In recent years Quantum Key Distribution (QKD) has emerged as the most paradigmatic example of Quant...
This paper introduces two information-theoretically secure protocols that achieve quantum secure dir...
In this paper, we investigate the quantum state secure transmission in network communications. First...
Abstract—A secure quantum deterministic communication protocol is described. The protocol is based o...
The problem of security of quantum key protocols is examined. In addition to the distribution of cla...
We analyze the capacity of a simultaneous quantum secure direct communication scheme between the cen...
Since, in general, nonorthogonal states cannot be cloned, any eavesdropping attempt in a quantum-com...
Two quantum secure direct communication schemes are proposed based on pure entangled states and $d$-...
Most of quantum secure direct communication protocols need a pre-established secure quantum channel....
© 2017, Springer Science+Business Media, LLC. As we know, the information leakage problem should be ...
We propose a simultaneous quantum secure direct communication scheme between one party and other thr...
We identify those properties of a quantum channel that are relevant for cryptography. We focus on ge...
Abstract. In this paper, we present a protocol in which two or more parties can share multipartite e...
We consider multi-party quantum cryptography. Suppose three parties, Alice, Bob and Charlie, share a...
In majority of protocols of secure quantum communication (such as, BB84, B92, etc.), the uncondition...
In recent years Quantum Key Distribution (QKD) has emerged as the most paradigmatic example of Quant...
This paper introduces two information-theoretically secure protocols that achieve quantum secure dir...
In this paper, we investigate the quantum state secure transmission in network communications. First...
Abstract—A secure quantum deterministic communication protocol is described. The protocol is based o...
The problem of security of quantum key protocols is examined. In addition to the distribution of cla...
We analyze the capacity of a simultaneous quantum secure direct communication scheme between the cen...
Since, in general, nonorthogonal states cannot be cloned, any eavesdropping attempt in a quantum-com...
Two quantum secure direct communication schemes are proposed based on pure entangled states and $d$-...
Most of quantum secure direct communication protocols need a pre-established secure quantum channel....
© 2017, Springer Science+Business Media, LLC. As we know, the information leakage problem should be ...
We propose a simultaneous quantum secure direct communication scheme between one party and other thr...
We identify those properties of a quantum channel that are relevant for cryptography. We focus on ge...
Abstract. In this paper, we present a protocol in which two or more parties can share multipartite e...
We consider multi-party quantum cryptography. Suppose three parties, Alice, Bob and Charlie, share a...