Counterfactual protocol within device independent framework and its insecurity
We consider the counterfactual protocol proposed in Phys. Rev. Lett., 103, 230501 (2009) within a device independent framework and show how its security can easily be compromised. Capitalising on the fact that the protocol is based on the use of a single photon entanglement phenomenon, we propose an...
Saved in:
Main Authors: | Kamaruddin, Suhaili, Shamsul Shaari, Jesni, Kolenderski, Piotr |
---|---|
Format: | Article |
Language: | English English |
Published: |
Springer Nature
2020
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/80002/7/80002%20Counterfactual%20protocol%20within.pdf http://irep.iium.edu.my/80002/8/80002%20Counterfactual%20protocol%20within%20SCOPUS.pdf http://irep.iium.edu.my/80002/ https://www.nature.com/articles/s41598-020-62812-3.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Optimal device independent quantum key distribution
by: Kamaruddin, Suhaili, et al.
Published: (2016) -
Device-independent quantum key distribution using single-photon entanglement
by: Kamaruddin, Suhaili, et al.
Published: (2015) -
Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme
by: Shamsul Shaari, Jesni, et al.
Published: (2010) -
Nonorthogonal unitaries in two-way quantum key distribution
by: Shamsul Shaari, Jesni
Published: (2014) -
Finite key size analysis of two-way quantum cryptography
by: Shamsul Shaari, Jesni, et al.
Published: (2015)