scientific article

From MaRDI portal
Publication:2843433

zbMath1280.81002MaRDI QIDQ2843433

Anirban Pathak

Publication date: 22 August 2013


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (54)

A general method for selecting quantum channel for bidirectional controlled state teleportation and other schemes of controlled quantum communicationMilestone developments in quantum information and no-go theoremsWhich verification qubits perform best for secure communication in noisy channel?Quasiprobability distributions in open quantum systems: spin-qubit systemsQuantum entanglement and the Bell matrixPairwise entanglement in a three-cavity optomechanical systemQuantum sealed-bid auction using a modified scheme for multiparty circular quantum key agreementQuantum cryptography over non-Markovian channelsTeleportation of a qubit using entangled non-orthogonal states: a comparative studyContinuous variable direct secure quantum communication using Gaussian statesSpacetime topology from holographic entanglementLower‐ and Higher‐Order Nonclassical Properties of Photon Added and Subtracted Displaced Fock StatesEnhancement of Non‐Gaussianity and Nonclassicality of Photon‐Added Displaced Fock State: A Quantitative ApproachManipulating Nonclassicality via Quantum State Engineering Processes: Vacuum Filtration and Single Photon AdditionLower Order and Higher Order Entanglement in Four‐Wave Mixing ProcessHigher‐Order Nonclassicality in Photon Added and Subtracted Qudit StatesComparison the performance of five-qubit IBM quantum computers in terms of Bell states preparationNoisy three-player dilemma game: robustness of the quantum advantageA study of the quasi-probability distributions of the Tavis-Cummings model under different quantum channelsContinuous variable B92 quantum key distribution protocol using single photon added and subtracted coherent statesHierarchical quantum network using hybrid entanglementQuantum and semi-quantum lottery: strategies and advantagesCharacterization of quantumness of non-Gaussian states under the influence of Gaussian channelA comprehensive review of quantum random number generators: concepts, classification and the origin of randomnessSemi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogueA review on quantum search algorithmsHierarchical joint remote state preparation in noisy environmentAsymmetric quantum dialogue in noisy environmentProtocols for quantum binary votingContinuous variable controlled quantum dialogue and secure multiparty quantum computationOrthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environmentQuantum Cryptography: Key Distribution and BeyondTwo-step orthogonal-state-based protocol of quantum secure direct communication with the help of order-rearrangement techniqueProtocols of quantum key agreement solely using Bell states and Bell measurementAnalysis of atmospheric effects on satellite-based quantum communication: a comparative studyEntanglement concentration protocols for GHZ-type entangled coherent state based on linear opticsA comparative study of protocols for secure quantum communication under noisy environment: single-qubit-based protocols versus entangled-state-based protocolsKak's three-stage protocol of secure quantum communication revisited: hitherto unknown strengths and weaknesses of the protocolAutomated error correction in IBM quantum computer and explicit generalizationQuantum conferenceDecoherence can help quantum cryptographic securitySemi-quantum key agreement and private comparison protocols using Bell statesHigher-order nonclassicalities of finite dimensional coherent states: a comparative studyApplications of quantum cryptographic switch: various tasks related to controlled quantum communication can be performed using Bell states and permutation of particlesControlled bidirectional remote state preparation in noisy environment: a generalized viewEntropy fluctuations to quantify mixednessSecure quantum communication with orthogonal statesOrthogonal-state-based cryptography in quantum mechanics and local post-quantum theoriesQuantum e-commerce: a comparative study of possible protocols for online shopping and other tasks related to e-commerceA short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?A theoretical study of controlled quantum teleportation scheme for \(n\)-qubit quantum stateHide and seek with quantum resources: new and modified protocols for quantum steganographyControlled secure direct quantum communication inspired scheme for quantum identity authenticationEfficient protocols for unidirectional and bidirectional controlled deterministic secure quantum communication: different alternative approaches






This page was built for publication: