2017
DOI: 10.1007/s11128-016-1508-4
|View full text |Cite
|
Sign up to set email alerts
|

Asymmetric quantum dialogue in noisy environment

Abstract: A notion of asymmetric quantum dialogue (AQD) is introduced. Conventional protocols of quantum dialogue are essentially symmetric as both the users (Alice and Bob) can encode the same amount of classical information. In contrast, the scheme for AQD introduced here provides different amount of communication powers to Alice and Bob. The proposed scheme, offers an architecture, where the entangled state and the encoding scheme to be shared between Alice and Bob depends on the amount of classical information they … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

3
46
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
8
1

Relationship

4
5

Authors

Journals

citations
Cited by 45 publications
(49 citation statements)
references
References 52 publications
(86 reference statements)
3
46
0
Order By: Relevance
“…Indeed, most of the attacks by an eavesdropper can be circumvented if the classical Bob is given power to permute the string of qubits with him, i.e., Bob can secure his raw key (information) in the proposed SQKA scheme by permuting the particles before sending to Alice. There are some other attacks (see [71,72] for details) which do not affect the security of the proposed protocol, like disturbance attack, denial of service attack, and impersonation attack (as it becomes void after incorporating an authentication protocol).…”
Section: Possible Attack Strategies and Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…Indeed, most of the attacks by an eavesdropper can be circumvented if the classical Bob is given power to permute the string of qubits with him, i.e., Bob can secure his raw key (information) in the proposed SQKA scheme by permuting the particles before sending to Alice. There are some other attacks (see [71,72] for details) which do not affect the security of the proposed protocol, like disturbance attack, denial of service attack, and impersonation attack (as it becomes void after incorporating an authentication protocol).…”
Section: Possible Attack Strategies and Securitymentioning
confidence: 99%
“…In addition, Charlie and Bob both being capable of performing quantum operations may perform BB84 subroutine (cf. [65,72,73] and references therein) to ensure a secure transmission of the qubits belonging to quantum channel. This would provide additional security against interceptresend attacks on Charlie-Bob quantum channel.…”
Section: Protocol 2: Controlled Direct Secure Semi-quantum Communicationmentioning
confidence: 99%
“…Further, entanglement is essential for implementation of various variants of teleportation and remote state preparation, such as probabilistic teleportation [180], teleportation using non-orthogonal states [181], quantum information splitting [182], joint remote state preparation [183], hierarchical joint remote state preparation [184], bidirectional controlled state teleportation [185,186], bidirectional controlled remote state preparation [187,186], bidirectional controlled joint remote state preparation [187,186]. It can be used to implement schemes for secure quantum communication, like-Ekert's protocol for QKD [188], Ping-pong protocol for QSDC [170], protocols for two-way secure direct quantum communication known as quantum dialogue 19 [191,192,193], and its variant asymmetric quantum dialogue [194], quantum key agreement [195,196] where two parties contribute equally to construct a key and no that the scheme proposed in [165] was actually a scheme for quantum secure direct communication. 18 Quantum teleportation is a very interesting process that nicely illustrates the power of quantum mechanics.…”
Section: Entangled State and Its Applicationsmentioning
confidence: 99%
“…In the Yang's scheme [35], LM05 protocol [8] of direct secure quantum communication was suitably modified to obtain a scheme for QSDC without quantum memory. Further, several direct communication schemes have been modified to obtain solutions of various cryptographic tasks, such as controlled [36,37], asymmetric [38] and multiparty [39] variants of direct communication schemes, quantum ecommerce [40], quantum voting [41], quantum sealed-bid auction [42], quantum private comparison [40,43]. Therefore, the use of quantum memory plays an instrumental role in the implementation of some of these schemes as well and modified Kak's protocol can help us to circumvent the use of quantum memory in the experimental realization of the above mentioned cryptographic tasks.…”
Section: Bob Applies Umentioning
confidence: 99%