Design of a novel quantum computing primitive to demonstrate quantum cryptography

W. Stallings, Cryptography and network security, 4th edn. (Pearson Education India,2006),pp. 34–35

P.W. Shor,Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303–332 (1999)

C.H. Bennett, G.Brassard, quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 56(4), 7–11 (2014)

Article  Google Scholar 

M. Pereira,Currás-Lorenzo, G. Navarrete, Á. Mizutani, A. Kato, M. Curty, K. Tamaki, Modified BB84 quantum key distribution protocol robust to source imperfections. Phys. Rev. Res. 5(2), 023065 (2023)

Article  Google Scholar 

M.A. Nielsen,Isaac, L. Chuang, Quantum Computation and Quantum information,10th Edn (Cambridge University Press, 2010), pp. 48–49

K. Svozil, Staging quantum cryptography with chocolate balls. AmericanJournal Phys. 74(9), 800–803 (2006)

ADS  Google Scholar 

J.B. Miller, The M&M superposition principle. J. Chem. Educ. 77(7), 879–881 (2000)

Article  Google Scholar 

B. Mallick, P. Parida, C. Nayak, N. Ali, M.K. Panda, B. Prasad, G. Palai, Secure real-time transmission of multi-spectral satellite images inducing a 6D hyper-chaotic system and BB84 QKD protocol. Alexandria Eng. J. 122(1), 364–384 (2025)

Article  Google Scholar 

H. Singh, K.Singh,A watermarking-based asymmetric cryptosystem using gyrator transform, QZ modulation, and fractional vortex toroidal phase mask. J. Opt. 53(3), 1–14 (2024)

Google Scholar 

H. Anshula, Singh,Cryptanalysis for double-image encryption using the DTLM in frequency plane with QR decomposition and gyrator transform. Opt. Rev. 28(6), 596–610 (2021)

Article  Google Scholar 

R. Girija, H. Singh, Abirami,Noise Estimation in medical images based on fast discrete curvelet transform via wrapping. Results Opt. 19(1), 100820 (2025)

Article  Google Scholar 

G. Palai, Performance evaluation of the SARG04 protocol for photonic quantum key distribution in quantum computing. J. Opt. 54(2), 1–8 (2025)

Google Scholar 

G. Palai, P.R. Kshirsagar, S.B. Krishnan, P. Chakrabarti, S.V. Sonekar, P. Mishra, Architecting of quantum Algorithim for Z-gate optical qubit to realise efficient quantum communication system. J. Opt. 54(1), 1–8 (2025)

Google Scholar 

P. Bandana Mallick, C. Parida, P.K. Nayak, Sahoo, Gopinath palai, quantum key distribution over FSO channel using error reconciliation protocol. Wireless Netw. 29(5), 2161–2169 (2023)

Article  Google Scholar 

R. Wright, Generalized urn models. Found. Phys. 20(7), 881–903 (1990)

Article  ADS  MathSciNet  Google Scholar 

J. S. Bell, on the Einstein Podolsky rosen paradox. Phys. Phys. Fiz. 1(3), 195 (1964)

Alain Aspect, Philippe grangier, Gérard roger, experimental realization of Einstein-Podolsky-Rosen-Bohm gedankenexperiment: a new violation of bell’s inequalities. Phys. Rev. Lett. 49(2), 91 (1982)

Article  ADS  Google Scholar 

Alain, Aspect, Jean dalibard,gérard roger,experimental test of bell’s inequalities using time-varying analyzers. Phys. Rev. Lett. 49(25), 1804 (1982)

Article  ADS  MathSciNet  Google Scholar 

Eli, Biham, Bruno huttner,tal mor, quantum cryptographic network based on quantum memories. Phys. Rev. A 54(4), 2651 (1996)

Article  ADS  MathSciNet  Google Scholar 

F. Xu, X. Ma, Q. Zhang, Lo,Jian-Wei pan.,secure quantum key distribution with realistic devices. Rev. Mod. Phys. 92(2), 025002 (2020)

Article  ADS  Google Scholar 

M. Curty, F. Xu, W. Cui, C.C.W. Lim, K. Tamaki, Hoi-Kwong lo, Finite-key analysis for measurement-device-independent quantum key distribution. Nat. Commun. 5(1), 3732 (2014)

Article  ADS  Google Scholar 

Dominic Mayers, Unconditionally secure quantum bit commitment is impossible. Phys. Rev. Lett. 78(17), 3414 (1997)

Article  Google Scholar 

Comments (0)

No login
gif