2021
DOI: 10.1007/s11467-021-1063-z
|View full text |Cite
|
Sign up to set email alerts
|

Quantum deleting and cloning in a pseudo-unitary system

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 41 publications
0
10
0
Order By: Relevance
“…But the most dangerous attack is the one which exploits any vulnerability to access the controller and thus destroys the entire network. of the transferred quantum, both of party will discover an eavesdropper presence on the communication channel based on the rules of the mechanics of quantum and the no-cloning theorem [12]. Several researchers have presented work on using quantum protocols to achieve key distribution instead of using traditional cryptographic methods (e.g., RSA), where Czermann, Márton et al [13] demonstrated the successful distribution of quantum keys using the BB84 protocol in practice on a fiber-optic system.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…But the most dangerous attack is the one which exploits any vulnerability to access the controller and thus destroys the entire network. of the transferred quantum, both of party will discover an eavesdropper presence on the communication channel based on the rules of the mechanics of quantum and the no-cloning theorem [12]. Several researchers have presented work on using quantum protocols to achieve key distribution instead of using traditional cryptographic methods (e.g., RSA), where Czermann, Márton et al [13] demonstrated the successful distribution of quantum keys using the BB84 protocol in practice on a fiber-optic system.…”
Section: Related Workmentioning
confidence: 99%
“…In our work, the hybrid key was used to achieve authentication between the two parties at two levels in addition to using it to encrypt the channel. First Level: through the classical methods using exchange of certificates between the two parties while the second level: physical authentication through the quantum channel of QKD protocol and exploiting of the physical properties of quantum [12]. Therefore, It can be said that this study has achieved more secure authentication between the control plane and the data plane in SDN as well as between the virtualization layer and control layer in NS addition to secure the communication channel between the data layer and the virtualization layer.…”
Section: Security Analysismentioning
confidence: 99%
“…In order to define a ground-state or excited states as Hermitian systems [95][96][97][98][99][100], we assume all the eigenvalues are real, E i (λ) = E * i (λ), which is possible when the system has a special symmetry. For instance, in parity-time (PT) symmetric non-Hermitian systems, the energy spectra are real in the PT symmetry unbroken regime [95][96][97][98][99][100]. It is well known that the Hamiltonian H(λ) can be diagonalized as…”
Section: Perturbation Theorymentioning
confidence: 99%
“…Over the years, pseudo-unitary quantum mechanics grew fast from the interest in pseudo-Hermitian Hamiltonians [1]: in the early 2000 to describe PT-symmetric quantum systems [2], and recently to simulate and experiment pseudo-unitary quantum cloning and quantum deletion in optical circuits ( [3], [4]). Furthermore, controlling Hilbert-space inner products [5] for fast quantum algorithms in PT-symmetric systems ( [6], [7]) is a direct implication of knowing to manipulate pseudo-unitary groups.…”
Section: Introductionmentioning
confidence: 99%