2020
DOI: 10.25046/aj050298
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Quantum No-Key Protocol for Many Bits Transfer with Error Correction Codes

Abstract: In this paper, a novel quantum transmission protocol which are based on the quantum nokey protocol is proposed. First, the quantum no-key protocol is discussed to show its important and its non-efficient on data transmission over quantum channel. Then, we improve it to carry many data bits via transmission. In addition, the error correction code is discussed and emerged into the proposed protocol to secure the transmission over quantum channel noise. Finally, the evaluation of transfer cost is discussed to sho… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…• quantum no-key protocol, 62,63 where it consists in a three-stage quantum cryptographic scheme based on a public key cryptography in which each party uses its own secret key. Unlike the Bennett-Brassard (BB84) protocol, 58 where the qubits are transmitted in only one direction and classical information exchanged thereafter, the communication in the proposed protocol remains quantum in each stage.…”
Section: Affinity With Quantum Cryptography Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…• quantum no-key protocol, 62,63 where it consists in a three-stage quantum cryptographic scheme based on a public key cryptography in which each party uses its own secret key. Unlike the Bennett-Brassard (BB84) protocol, 58 where the qubits are transmitted in only one direction and classical information exchanged thereafter, the communication in the proposed protocol remains quantum in each stage.…”
Section: Affinity With Quantum Cryptography Protocolsmentioning
confidence: 99%
“…In fact, these techniques have four possible security loopholes where an eavesdropper can steal: the key at the key distribution channel, the key while it is transferred from the key distribution to the communication terminal, the key when it is transferred from the key distribution to the communication terminal at the receiver's site, and the ciphertext in the public channel. Loopholes at users' sites are ignored usually, but it may turn out to be a serious problem when the sites become complicated and modern eavesdropping technology becomes more sophisticated. quantum no‐key protocol, 62,63 where it consists in a three‐stage quantum cryptographic scheme based on a public key cryptography in which each party uses its own secret key. Unlike the Bennett‐Brassard (BB84) protocol, 58 where the qubits are transmitted in only one direction and classical information exchanged thereafter, the communication in the proposed protocol remains quantum in each stage. deterministic secure quantum communication 64,65 is a quantum protocol for sending a deterministic message by encrypting each classical bit by two photons and using a quantum key.…”
Section: Satellite Quantum Repeatersmentioning
confidence: 99%
“…Quantum no-key protocol 5,6 . This protocol is divided into three stages, where each one has its own key, consisting of unitary transforms applied to the message transferred at each stage.…”
Section: Introductionmentioning
confidence: 99%
“…Quantum error control codes (QECC) are a suitable solution since they bring the advantages from classical error control codes [10][11][12][13][14][15]. Since the first QECC was proposed by Shor [16] for 9-qubits, there are many proposed methods for construction of QECC with various purposes such as adaptive code length [17][18][19][20], minimum distance [21][22][23][24] etc.…”
Section: Introductionmentioning
confidence: 99%