2010 IEEE International Symposium on Information Theory 2010
DOI: 10.1109/isit.2010.5513644
|View full text |Cite
|
Sign up to set email alerts
|

Perfect quantum network communication protocol based on classical network coding

Abstract: This paper considers a problem of quantum communication between parties that are connected through a network of quantum channels. The model in this paper assumes that there is no prior entanglement shared among any of the parties, but that classical communication is free. The task is to perfectly transfer an unknown quantum state from a source subsystem to a target subsystem, where both source and target are formed by ordered sets of some of the nodes. It is proved that a lower bound of the rate at which this … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
94
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 72 publications
(95 citation statements)
references
References 13 publications
0
94
0
Order By: Relevance
“…Unlike the entanglement quantization of a classical channel910111213141516, it may be quantized with a continuous physical channel2627282930313233343536, and the transmission information may be quantized with quantized electromagnetic fields of identical frequencies. To distinguish the decoded quantum states for different nodes, special phase-shift operations may be designed to index different incoming quantum states, using phase shifters [coupling the optical fields to driven Duffing oscillators] or gauge transformations33.…”
mentioning
confidence: 99%
“…Unlike the entanglement quantization of a classical channel910111213141516, it may be quantized with a continuous physical channel2627282930313233343536, and the transmission information may be quantized with quantized electromagnetic fields of identical frequencies. To distinguish the decoded quantum states for different nodes, special phase-shift operations may be designed to index different incoming quantum states, using phase shifters [coupling the optical fields to driven Duffing oscillators] or gauge transformations33.…”
mentioning
confidence: 99%
“…Th e one time pad (based on Vernam cipher) offers unconditional security [9]. Th e main drawback of this method is that all the parties exchanging secret information should be aware of a secret sequence of random numbers, i.e.…”
Section: Problem Of Quantum Key Distribution (Qkd)mentioning
confidence: 99%
“…Once a secure distribution of keys has been established, one can use (indisputedly secure) code Vernam [9] which provides absolute security. Th is has a huge advantage as it eliminates the risk built in the systems based on the security of current commercial cryptographic solutions (which are based on the computational complexity and which have been proven to lose their security due to unpredicted development in hardware and algorithms).…”
Section: Secure Key Exchangementioning
confidence: 99%
“…Because quantum signals are teleportated with triplet states, the most possible attack is the attack on the entangled state [36,37] |R S i described in (7). Assume Eve can entangle her ancilla system [38] with |R S i which can be simplified as…”
Section: Securitymentioning
confidence: 99%