منابع مشابه
Satellite communication over quantum channel
Quantum computing offers revolutionary solutions in the field of computer sciences, applying the opportunities of quantum physics which are incomparably richer than classical physics. Although quantum computers are going to be the tools of the far future, there are already a few algorithms to solve problems which are very difficult to handle with traditional computers. Perhaps the easiest examp...
متن کاملQuantum Secure Direct Communication with Quantum Memory.
Quantum communication provides an absolute security advantage, and it has been widely developed over the past 30 years. As an important branch of quantum communication, quantum secure direct communication (QSDC) promotes high security and instantaneousness in communication through directly transmitting messages over a quantum channel. The full implementation of a quantum protocol always require...
متن کاملSecure communication via quantum illumination
In the quantum illumination (QI) protocol for secure communication, Alice prepares entangled signal and idler beams via spontaneous parametric downconversion. She sends the signal beam to Bob, while retaining the idler. Bob imposes message modulation on the beam he receives from Alice, amplifies it, and sends it back to her. Alice then decodes Bob’s information by making a joint quantum measure...
متن کاملQuantum Cryptographic Protocols for Secure Communication
Quantum Cryptography offers a secure method of sharing sequences of random numbers to be used as cryptographic keys. It can potentially eliminate many of the weaknesses of classical cryptographic methods. In this paper, we survey some results in quantum cryptography. After a brief introduction to classical cryptography, some fundamental quantum key distribution protocols are reviewed. The issue...
متن کاملQuantum-secure covert communication on bosonic channels.
Computational encryption, information-theoretic secrecy and quantum cryptography offer progressively stronger security against unauthorized decoding of messages contained in communication transmissions. However, these approaches do not ensure stealth--that the mere presence of message-bearing transmissions be undetectable. We characterize the ultimate limit of how much data can be reliably and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Science
سال: 2018
ISSN: 0036-8075,1095-9203
DOI: 10.1126/science.359.6378.881-a