Attributes | Values |
---|
rdf:type
| |
rdfs:seeAlso
| |
Description
| - We illustrate the principle of a cryptographic switch for a quantum scenario, in which a third party (Charlie) can control to a continuously varying degree the amount of information the receiver (Bob) receives, after the sender (Alice) has sent her information through a quantum channel. Suppose Charlie transmits a Bell state to Alice and Bob. Alice uses dense coding to transmit two bits to Bob. Only if the 2-bit information corresponding to the choice of the Bell state is made available by Charlie to Bob can the latter recover Alice's information. By varying the amount of information Charlie gives, he can continuously alter the information recovered by Bob. The performance of the protocol as subjected to the squeezed generalized amplitude damping channel is considered. We also present a number of practical situations where a cryptographic switch would be of use.
- We illustrate the principle of a cryptographic switch for a quantum scenario, in which a third party (Charlie) can control to a continuously varying degree the amount of information the receiver (Bob) receives, after the sender (Alice) has sent her information through a quantum channel. Suppose Charlie transmits a Bell state to Alice and Bob. Alice uses dense coding to transmit two bits to Bob. Only if the 2-bit information corresponding to the choice of the Bell state is made available by Charlie to Bob can the latter recover Alice's information. By varying the amount of information Charlie gives, he can continuously alter the information recovered by Bob. The performance of the protocol as subjected to the squeezed generalized amplitude damping channel is considered. We also present a number of practical situations where a cryptographic switch would be of use. (en)
|
Title
| - The quantum cryptographic switch
- The quantum cryptographic switch (en)
|
skos:prefLabel
| - The quantum cryptographic switch
- The quantum cryptographic switch (en)
|
skos:notation
| - RIV/61989592:15310/14:33149243!RIV15-MSM-15310___
|
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...iv/cisloPeriodika
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/61989592:15310/14:33149243
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - Secure communication; Quantum cryptography; Quantum communication (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...odStatuVydavatele
| - US - Spojené státy americké
|
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...i/riv/nazevZdroje
| - Quantum Information Processing
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...vavai/riv/projekt
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...v/svazekPeriodika
| |
http://linked.open...iv/tvurceVysledku
| - Pathak, Anirban
- Srikanth, R.
- Banerjee, Subhashish
- Omkar, S.
- Srinatha, N.
|
http://linked.open...ain/vavai/riv/wos
| |
issn
| |
number of pages
| |
http://bibframe.org/vocab/doi
| - 10.1007/s11128-012-0487-3
|
http://localhost/t...ganizacniJednotka
| |