Efficient controlled quantum secure direct communication based on GHZ-like states
S Hassanpour, M Houshmand - Quantum Information Processing, 2015 - Springer
In this paper, a three-party controlled quantum secure direct communication protocol based
on GHZ-like state is proposed. In this scheme, the receiver can obtain the sender's two …
on GHZ-like state is proposed. In this scheme, the receiver can obtain the sender's two …
Effectively combined multi-party quantum secret sharing and secure direct communication
M Khorrampanah, M Houshmand - Optical and Quantum Electronics, 2022 - Springer
In this paper using quantum secret sharing based on quantum secure direct communication,
four-bit secret message is transmitted, that any of the receivers cannot achieve any rate of …
four-bit secret message is transmitted, that any of the receivers cannot achieve any rate of …
n-Bit Quantum Secret Sharing Protocol Using Quantum Secure Direct Communication
MS Sadeghi-Zadeh, M Khorrampanah… - International Journal of …, 2021 - Springer
The proposed quantum secret sharing protocol in this article conveys n bit secret messages
from the sender to the n receivers making use of a secure direct communication. In this …
from the sender to the n receivers making use of a secure direct communication. In this …
Quantum cryptography with an emphasis on the security analysis of QKD protocols
R Kavuri, S Voruganti, S Mohammed… - … and Applications of …, 2023 - Wiley Online Library
Quantum computing is a fast‐developing technology that uses the principles of quantum
physics to solve issues that are too complicated for conventional computers. Even the most …
physics to solve issues that are too complicated for conventional computers. Even the most …
Simulation of quantum key distribution in a secure star topology optimization in quantum channel
S Praveenkumar, T Jaya, K Vijayan… - Microprocessors and …, 2021 - Elsevier
The field of quantum cryptography is mostly theoretical therefore in this paper we represent
its implementation by means of virtual scenarios. The central issue in cryptography is the …
its implementation by means of virtual scenarios. The central issue in cryptography is the …
Metrology Challenges in Quantum Key Distribution
Y Gui, D Unnikrishnan, M Stanley… - Journal of Physics …, 2022 - iopscience.iop.org
The metrology of the QKD devices and systems grows increasingly important in recent years
not only because of the needs for conformance and performance testing in the …
not only because of the needs for conformance and performance testing in the …
Design of a quantum one-way trapdoor function
PS Goswami, T Chakraborty - … in Modelling and Graphics: Proceedings of …, 2020 - Springer
Of late security has become a key concern of data transmission mechanism over a
communications channel. In an asymmetric cryptographic system, a public key is shared …
communications channel. In an asymmetric cryptographic system, a public key is shared …
A nature-inspired DNA encoding technique for Quantum Session Key Exchange protocol
PS Goswami, T Chakraborty… - Advances in Nature …, 2022 - Springer
Security is today's foremost concern over the transmission channel. To lessen this security
threat, DNA-based cryptography has emerged as an alternative to encryption of the data and …
threat, DNA-based cryptography has emerged as an alternative to encryption of the data and …
An efficient quantum secret sharing using secure direct communication
M Khorrampanah, M Houshmand - 2013 21st Iranian …, 2013 - ieeexplore.ieee.org
Inspired by quantum secure direct communication, a three-party quantum secret sharing
approach is proposed. In the preparation phase, the sender shares a GHZ state among …
approach is proposed. In the preparation phase, the sender shares a GHZ state among …
Improved quantum secret sharing based on entanglement swapping
M Khorrampanah, M Houshmand… - 2021 29th Iranian …, 2021 - ieeexplore.ieee.org
Using entanglement swapping, a quantum secret sharing protocol is proposed. After sharing
three-EPR among users, for encoding the message, the sender prepares an auxiliary EPR …
three-EPR among users, for encoding the message, the sender prepares an auxiliary EPR …