Secure quantum key distribution network with Bell states and local unitary operations

Physics – Quantum Physics

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

5 pages, 2 figures. The decoy-photon technique is presented in a clear way for preventing a potentially dishonest server on a

Scientific paper

10.1088/0256-307X/22/5/006

We propose a theoretical scheme for secure quantum key distribution network following the ideas in quantum dense coding. In this scheme, the server of the network provides the service for preparing and measuring the Bell states, and the users encodes the states with local unitary operations. For preventing the server from eavesdropping, we design a decoy when the particle is transmitted between the users. It has high capacity as one particle carries two bits of information and its efficiency for qubits approaches 100%. Moreover, it is not necessary for the users to store the quantum states, which makes this scheme more convenient for application than others.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Secure quantum key distribution network with Bell states and local unitary operations does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Secure quantum key distribution network with Bell states and local unitary operations, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure quantum key distribution network with Bell states and local unitary operations will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-620487

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.