Skip to main content

Showing 1–16 of 16 results for author: Shaari, J S

.
  1. arXiv:2403.19156  [pdf, ps, other

    quant-ph

    Information Disturbance Tradeoff in Bidirectional QKD

    Authors: Nur Rahimah Sakinah Abdul Salam, Jesni Shamsul Shaari, Stefano Mancini

    Abstract: Making use of the Quantum Network formalism of \textit{Phys. Rev. A,} \textbf{82} (2010) 062305, we present the case for quantum networks with finite outcomes, more specifically one which could distinguish only between specific unitary operators in a given basis for operators. Despite its simplicity, we proceed to build a network derived from the optimal strategy in \textit{Phys. Rev. A,} \textbf{… ▽ More

    Submitted 28 March, 2024; originally announced March 2024.

    Comments: 12 pages and 6 figures

  2. Entropic Bounds as Uncertainty Measure of Unitary Operators

    Authors: Jesni Shamsul Shaari, Rinie N. M. Nasir, Stefano Mancini

    Abstract: We reformulate the notion of uncertainty of pairs of unitary operators within the context of guessing games and derive an entropic uncertainty relation for a pair of such operators. We show how distinguishable operators are compatible while maximal incompatibility of unitary operators can be connected to bases for some subspace of operators which are mutually unbiased.

    Submitted 23 November, 2020; originally announced November 2020.

    Journal ref: PHYSICS LETTERS A Volume 398, 17 May 2021, 127277

  3. Mutually Unbiased Unitary Bases of Operators on $d$-dimensional Hilbert Space

    Authors: Rinie N. M. Nasir, Jesni Shamsul Shaari, Stefano Mancini

    Abstract: Analogous to the notion of mutually unbiased bases for Hilbert spaces, we consider mutually unbiased unitary bases (MUUB) for the space of operators, $M(d, \mathbb{C})$, acting on such Hilbert spaces. The notion of MUUB reflects the equiprobable guesses of unitary in one bases of $M(d, \mathbb{C})$ when estimating a unitary operator in another. Though, for prime dimension $d$, the maximal number o… ▽ More

    Submitted 26 March, 2020; originally announced March 2020.

    Comments: 11 pages, 1 figure

    Journal ref: International Journal of Quantum Information 18 (2020) 1941926

  4. Entropic Bounds For Unitary Testers and Mutually Unbiased Unitary Bases

    Authors: Jesni Shamsul Shaari, Stefano Mancini

    Abstract: We define the entropic bounds, i.e minimal uncertainty for pairs of unitary testers in distinguishing between unitary transformations not unlike the well known entropic bounds for observables. We show that in the case of specific sets of testers which pairwise saturate the trivial zero bound, the testers are all equivalent in the sense their statistics are the same. On the other hand, when maximal… ▽ More

    Submitted 15 March, 2021; v1 submitted 16 October, 2019; originally announced October 2019.

    Comments: Added a more comprehensive background on testers and included some minor changes on notation

    Journal ref: Annals of Physics 412 (2020) 168043

  5. arXiv:1906.01645  [pdf, ps, other

    quant-ph math-ph physics.app-ph physics.comp-ph physics.optics

    Advances in Quantum Cryptography

    Authors: S. Pirandola, U. L. Andersen, L. Banchi, M. Berta, D. Bunandar, R. Colbeck, D. Englund, T. Gehring, C. Lupo, C. Ottaviani, J. Pereira, M. Razavi, J. S. Shaari, M. Tomamichel, V. C. Usenko, G. Vallone, P. Villoresi, P. Wallden

    Abstract: Quantum cryptography is arguably the fastest growing area in quantum information science. Novel theoretical protocols are designed on a regular basis, security proofs are constantly improving, and experiments are gradually moving from proof-of-principle lab demonstrations to in-field implementations and technological prototypes. In this review, we provide both a general introduction and a state of… ▽ More

    Submitted 4 June, 2019; originally announced June 2019.

    Comments: Review article. Comments and suggestions are welcome. REVTeX: 118 pages, 20 figures, 785 references

    Journal ref: Adv. Opt. Photon. 12, 1012-1236 (2020)

  6. On Mutually Unbiased Unitary Bases in prime dimensional Hilbert spaces

    Authors: Rinie N. M. Nasir, Jesni Shamsul Shaari, Stefano Mancini

    Abstract: Akin to the idea of complete sets of Mutually Unbiased Bases for prime dimensional Hilbert spaces, $\mathcal{H}_d$, we study its analogue for a $d$ dimensional subspace of $M (d,\mathbb{C})$, i.e. Mutually Unbiased Unitary Bases (MUUBs) comprising of unitary operators. We note an obvious isomorphism between the vector spaces and beyond that, we define a relevant monoid structure for… ▽ More

    Submitted 22 March, 2019; v1 submitted 18 November, 2018; originally announced November 2018.

    Comments: Lemma 5 corrected, new appendixes B, D included, typos corrected

    Journal ref: Quantum Inf Process (2019) 18: 178

  7. arXiv:1805.01651  [pdf, ps, other

    quant-ph

    On the security of two-way quantum key distribution

    Authors: Jesni Shamsul Shaari, Stefano Mancini, Stefano Pirandola, Marco Lucamarini

    Abstract: An author (arXiv:1709.09262 [quant-ph] (2017), Nanoscale Research Letters (2017) 12:552) has recently questioned the security of two-way quantum key distribution schemes by referring to attack strategies which leave no errors in the (raw) key shared by the legitimate parties. We argue that the article is based on a flawed understanding of the actual workings of a two-way protocol, thus the erroneo… ▽ More

    Submitted 21 October, 2019; v1 submitted 4 May, 2018; originally announced May 2018.

  8. arXiv:1705.03170  [pdf, other

    quant-ph

    Indistinguishable Encoding for Bidirectional Quantum Key Distribution: Theory to Experiment

    Authors: J. S. Shaari, Suryadi

    Abstract: We present for the first time, a bidirectional Quantum Key Distribution protocol with minimal encoding operations derived from the use of two `nonorthogonal' unitary transformations selected from two mutually unbiased unitary bases; which are indistinguishable in principle for a single use. Along with its decoding procedure, it is a stark contrast to its `orthogonal encoding' predecessors. Definin… ▽ More

    Submitted 9 May, 2017; originally announced May 2017.

    Comments: 9 pages, 3 figures

  9. arXiv:1603.06189  [pdf, ps, other

    quant-ph

    Mutually Unbiased Unitaries Bases

    Authors: Jesni Shamsul Shaari, Rinie N. M. Nasir, Stefano Mancini

    Abstract: We consider the notion of unitary transformations forming bases for subspaces of $M(d,\mathbb{C})$ such that the square of Hilbert-Schmidt inner product of matrices from the differing bases is a constant. Moving from the qubit case, weconstruct the maximal number of such bases for the 4 and 2 dimensional subspaces while proving the nonexistence of such a construction for the 3 dimensional case. Ex… ▽ More

    Submitted 23 November, 2016; v1 submitted 20 March, 2016; originally announced March 2016.

    Comments: revised version

    Journal ref: Phys. Rev. A 94, 052328, 2016

  10. Finite key size analysis of two-way quantum cryptography

    Authors: Jesni Shamsul Shaari, Stefano Mancini

    Abstract: Quantum cryptographic protocols solve the longstanding problem of distributing a shared secret string to two distant users by typically making use of one-way quantum channel. However, alternative protocols exploiting two-way quantum channel have been proposed for the same goal and with potential advantages. Here we overview a security proof for two-way quantum key distribution protocols, against t… ▽ More

    Submitted 4 March, 2015; originally announced March 2015.

    Journal ref: Entropy 2015, 17(5), 2723-2740

  11. arXiv:1110.1170  [pdf, ps, other

    quant-ph

    Reply to Comment on "Deterministic six states protocol for quantum communication" [arXiv:1107.4435v1 [quant-ph] / Phys. Lett. A 374 (2010) 1097]

    Authors: J. S. Shaari, M. Lucamarini, Asma' Ahmad Bahari

    Abstract: We reply to the Comment made in arXiv:1107.4435v1 [quant-ph] (Phys. Lett. A \textbf{374} (2010) 1097) by noting some erroneous considerations therein resulting in a misleading view of the quantum key distribution protocol in question. We then correct the rates provided for the Intercept-and-Resend attack and we complete the analysis of Eve's attack based on a double CNOT gate.

    Submitted 6 October, 2011; originally announced October 2011.

  12. Independent Attacks in Imperfect Settings; A Case for A Two Way Quantum Key Distribution Scheme

    Authors: J. S. Shaari, Iskandar Bahari

    Abstract: We review the study on a two way quantum key distribution protocol given imperfect settings through a simple analysis of a toy model and show that it can outperform a BB84 setup. We provide the sufficient condition for this as a ratio of optimal intensities for the protocols.

    Submitted 18 September, 2010; originally announced September 2010.

    Journal ref: Physics Letters A, Volume 374, Issue 41, 2010, Pages 4205-4211

  13. Decoy States and Two Way Quantum Key Distribution Schemes

    Authors: J. S. Shaari, Iskandar Bahari, Sellami Ali

    Abstract: We study the possible application of the decoy state method on a basic two way quantum key distribution (QKD) scheme to extend its distance. Noting the obvious advantage of such a QKD scheme in allowing for single as well as double photon contributions, we derive relevant lower-bounds on the corresponding gains in a practical decoy state implementation using two intensities for decoy states. We wo… ▽ More

    Submitted 24 September, 2010; v1 submitted 8 June, 2010; originally announced June 2010.

    Comments: Much revised from original manuscript. Accepted for publication in Optics Communications (some variations may exist in some wordings in the text)

  14. arXiv:0707.3913  [pdf, ps, other

    quant-ph

    Deterministic Rendering of BB84 for Practical Quantum Cryptography

    Authors: M. Lucamarini, J. S. Shaari, M. R. B. Wahiddin

    Abstract: We describe how to modify the BB84 protocol for quantum cryptography in order to make it deterministic. We study both theoretical and experimental aspects of this issue, showing that the new scheme is as secure as the old one, more efficient on small-scale distances, and within the range of current technology.

    Submitted 26 July, 2007; originally announced July 2007.

    Comments: 9 pages, 2 figures

  15. arXiv:quant-ph/0702084  [pdf, ps, other

    quant-ph

    Secure Quantum Telephones

    Authors: J. S. Shaari, R. S. Said, M. R. B. Wahiddin

    Abstract: We propose in this paper a novel deterministic protocol using particular maximally entangled states of polarized photons for a genuine bidirectional secure communication setup. We further propose a plausible experimental setup for such a protocol using currently available optical technology which liberates two communicating party from sharing identical apparatus. We note that security of the pro… ▽ More

    Submitted 7 March, 2007; v1 submitted 9 February, 2007; originally announced February 2007.

    Comments: Substantial changes made to ensure security of protocol

  16. Blind encoding into qudits

    Authors: J. S. Shaari, M. R. B. Wahiddin, S. Mancini

    Abstract: We consider the problem of encoding classical information into unknown qudit states belonging to any basis, of a maximal set of mutually unbiased bases, by one party and then decoding by another party who has perfect knowledge of the basis. Working with qudits of prime dimensions, we point out a no-go theorem that forbids shift operations on arbitrary unknown states. We then provide the necessar… ▽ More

    Submitted 2 September, 2007; v1 submitted 10 January, 2007; originally announced January 2007.

    Comments: To appear in Physics Letters A

    Journal ref: Physics Letters A, Volume 372, Issue 12, 17 March 2008, Pages 1963-1967