-
arXiv:2403.19156 [pdf, ps, other]
Information Disturbance Tradeoff in Bidirectional QKD
Abstract: Making use of the Quantum Network formalism of \textit{Phys. Rev. A,} \textbf{82} (2010) 062305, we present the case for quantum networks with finite outcomes, more specifically one which could distinguish only between specific unitary operators in a given basis for operators. Despite its simplicity, we proceed to build a network derived from the optimal strategy in \textit{Phys. Rev. A,} \textbf{… ▽ More
Submitted 28 March, 2024; originally announced March 2024.
Comments: 12 pages and 6 figures
-
arXiv:2011.11832 [pdf, ps, other]
Entropic Bounds as Uncertainty Measure of Unitary Operators
Abstract: We reformulate the notion of uncertainty of pairs of unitary operators within the context of guessing games and derive an entropic uncertainty relation for a pair of such operators. We show how distinguishable operators are compatible while maximal incompatibility of unitary operators can be connected to bases for some subspace of operators which are mutually unbiased.
Submitted 23 November, 2020; originally announced November 2020.
Journal ref: PHYSICS LETTERS A Volume 398, 17 May 2021, 127277
-
Mutually Unbiased Unitary Bases of Operators on $d$-dimensional Hilbert Space
Abstract: Analogous to the notion of mutually unbiased bases for Hilbert spaces, we consider mutually unbiased unitary bases (MUUB) for the space of operators, $M(d, \mathbb{C})$, acting on such Hilbert spaces. The notion of MUUB reflects the equiprobable guesses of unitary in one bases of $M(d, \mathbb{C})$ when estimating a unitary operator in another. Though, for prime dimension $d$, the maximal number o… ▽ More
Submitted 26 March, 2020; originally announced March 2020.
Comments: 11 pages, 1 figure
Journal ref: International Journal of Quantum Information 18 (2020) 1941926
-
arXiv:1910.07665 [pdf, ps, other]
Entropic Bounds For Unitary Testers and Mutually Unbiased Unitary Bases
Abstract: We define the entropic bounds, i.e minimal uncertainty for pairs of unitary testers in distinguishing between unitary transformations not unlike the well known entropic bounds for observables. We show that in the case of specific sets of testers which pairwise saturate the trivial zero bound, the testers are all equivalent in the sense their statistics are the same. On the other hand, when maximal… ▽ More
Submitted 15 March, 2021; v1 submitted 16 October, 2019; originally announced October 2019.
Comments: Added a more comprehensive background on testers and included some minor changes on notation
Journal ref: Annals of Physics 412 (2020) 168043
-
arXiv:1906.01645 [pdf, ps, other]
Advances in Quantum Cryptography
Abstract: Quantum cryptography is arguably the fastest growing area in quantum information science. Novel theoretical protocols are designed on a regular basis, security proofs are constantly improving, and experiments are gradually moving from proof-of-principle lab demonstrations to in-field implementations and technological prototypes. In this review, we provide both a general introduction and a state of… ▽ More
Submitted 4 June, 2019; originally announced June 2019.
Comments: Review article. Comments and suggestions are welcome. REVTeX: 118 pages, 20 figures, 785 references
Journal ref: Adv. Opt. Photon. 12, 1012-1236 (2020)
-
arXiv:1811.07314 [pdf, ps, other]
On Mutually Unbiased Unitary Bases in prime dimensional Hilbert spaces
Abstract: Akin to the idea of complete sets of Mutually Unbiased Bases for prime dimensional Hilbert spaces, $\mathcal{H}_d$, we study its analogue for a $d$ dimensional subspace of $M (d,\mathbb{C})$, i.e. Mutually Unbiased Unitary Bases (MUUBs) comprising of unitary operators. We note an obvious isomorphism between the vector spaces and beyond that, we define a relevant monoid structure for… ▽ More
Submitted 22 March, 2019; v1 submitted 18 November, 2018; originally announced November 2018.
Comments: Lemma 5 corrected, new appendixes B, D included, typos corrected
Journal ref: Quantum Inf Process (2019) 18: 178
-
arXiv:1805.01651 [pdf, ps, other]
On the security of two-way quantum key distribution
Abstract: An author (arXiv:1709.09262 [quant-ph] (2017), Nanoscale Research Letters (2017) 12:552) has recently questioned the security of two-way quantum key distribution schemes by referring to attack strategies which leave no errors in the (raw) key shared by the legitimate parties. We argue that the article is based on a flawed understanding of the actual workings of a two-way protocol, thus the erroneo… ▽ More
Submitted 21 October, 2019; v1 submitted 4 May, 2018; originally announced May 2018.
-
Indistinguishable Encoding for Bidirectional Quantum Key Distribution: Theory to Experiment
Abstract: We present for the first time, a bidirectional Quantum Key Distribution protocol with minimal encoding operations derived from the use of two `nonorthogonal' unitary transformations selected from two mutually unbiased unitary bases; which are indistinguishable in principle for a single use. Along with its decoding procedure, it is a stark contrast to its `orthogonal encoding' predecessors. Definin… ▽ More
Submitted 9 May, 2017; originally announced May 2017.
Comments: 9 pages, 3 figures
-
arXiv:1603.06189 [pdf, ps, other]
Mutually Unbiased Unitaries Bases
Abstract: We consider the notion of unitary transformations forming bases for subspaces of $M(d,\mathbb{C})$ such that the square of Hilbert-Schmidt inner product of matrices from the differing bases is a constant. Moving from the qubit case, weconstruct the maximal number of such bases for the 4 and 2 dimensional subspaces while proving the nonexistence of such a construction for the 3 dimensional case. Ex… ▽ More
Submitted 23 November, 2016; v1 submitted 20 March, 2016; originally announced March 2016.
Comments: revised version
Journal ref: Phys. Rev. A 94, 052328, 2016
-
arXiv:1503.01498 [pdf, ps, other]
Finite key size analysis of two-way quantum cryptography
Abstract: Quantum cryptographic protocols solve the longstanding problem of distributing a shared secret string to two distant users by typically making use of one-way quantum channel. However, alternative protocols exploiting two-way quantum channel have been proposed for the same goal and with potential advantages. Here we overview a security proof for two-way quantum key distribution protocols, against t… ▽ More
Submitted 4 March, 2015; originally announced March 2015.
Journal ref: Entropy 2015, 17(5), 2723-2740
-
arXiv:1110.1170 [pdf, ps, other]
Reply to Comment on "Deterministic six states protocol for quantum communication" [arXiv:1107.4435v1 [quant-ph] / Phys. Lett. A 374 (2010) 1097]
Abstract: We reply to the Comment made in arXiv:1107.4435v1 [quant-ph] (Phys. Lett. A \textbf{374} (2010) 1097) by noting some erroneous considerations therein resulting in a misleading view of the quantum key distribution protocol in question. We then correct the rates provided for the Intercept-and-Resend attack and we complete the analysis of Eve's attack based on a double CNOT gate.
Submitted 6 October, 2011; originally announced October 2011.
-
arXiv:1009.3562 [pdf, ps, other]
Independent Attacks in Imperfect Settings; A Case for A Two Way Quantum Key Distribution Scheme
Abstract: We review the study on a two way quantum key distribution protocol given imperfect settings through a simple analysis of a toy model and show that it can outperform a BB84 setup. We provide the sufficient condition for this as a ratio of optimal intensities for the protocols.
Submitted 18 September, 2010; originally announced September 2010.
Journal ref: Physics Letters A, Volume 374, Issue 41, 2010, Pages 4205-4211
-
arXiv:1006.1693 [pdf, ps, other]
Decoy States and Two Way Quantum Key Distribution Schemes
Abstract: We study the possible application of the decoy state method on a basic two way quantum key distribution (QKD) scheme to extend its distance. Noting the obvious advantage of such a QKD scheme in allowing for single as well as double photon contributions, we derive relevant lower-bounds on the corresponding gains in a practical decoy state implementation using two intensities for decoy states. We wo… ▽ More
Submitted 24 September, 2010; v1 submitted 8 June, 2010; originally announced June 2010.
Comments: Much revised from original manuscript. Accepted for publication in Optics Communications (some variations may exist in some wordings in the text)
-
arXiv:0707.3913 [pdf, ps, other]
Deterministic Rendering of BB84 for Practical Quantum Cryptography
Abstract: We describe how to modify the BB84 protocol for quantum cryptography in order to make it deterministic. We study both theoretical and experimental aspects of this issue, showing that the new scheme is as secure as the old one, more efficient on small-scale distances, and within the range of current technology.
Submitted 26 July, 2007; originally announced July 2007.
Comments: 9 pages, 2 figures
-
Secure Quantum Telephones
Abstract: We propose in this paper a novel deterministic protocol using particular maximally entangled states of polarized photons for a genuine bidirectional secure communication setup. We further propose a plausible experimental setup for such a protocol using currently available optical technology which liberates two communicating party from sharing identical apparatus. We note that security of the pro… ▽ More
Submitted 7 March, 2007; v1 submitted 9 February, 2007; originally announced February 2007.
Comments: Substantial changes made to ensure security of protocol
-
Blind encoding into qudits
Abstract: We consider the problem of encoding classical information into unknown qudit states belonging to any basis, of a maximal set of mutually unbiased bases, by one party and then decoding by another party who has perfect knowledge of the basis. Working with qudits of prime dimensions, we point out a no-go theorem that forbids shift operations on arbitrary unknown states. We then provide the necessar… ▽ More
Submitted 2 September, 2007; v1 submitted 10 January, 2007; originally announced January 2007.
Comments: To appear in Physics Letters A
Journal ref: Physics Letters A, Volume 372, Issue 12, 17 March 2008, Pages 1963-1967