The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2022
DOI: 10.1140/epjd/s10053-022-00532-1
|View full text |Cite
|
Sign up to set email alerts
|

Qubit and bit-based quantum hybrid secret key generation

Abstract: For the generation of a secret key, hardly a quantum algorithms integrating states and bits have yet developed. Integrating random states and bits is difficult for a combiner component. The underlying problems of the study are the design of a quantum circuit, an algorithm, state polarization setup, and the concatenation of bits and states. By combining either rectilinear, orthogonal (superposition), or both states with bits, we have investigated three different possibilities for the quantum hybrid protocol. We… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 36 publications
0
3
0
Order By: Relevance
“…To address that challenge, further research is needed to investigate the potential of hybrid quantum algorithms for data fitting, for instance, in [39], [40], [129], [145]. "Hybrid" encoding patterns aim to leverage the advantages of the best appropriate approaches and enhance the representation and manipulation of classical data in quantum states.…”
Section: Challenges and Future Research Prospectsmentioning
confidence: 99%
“…To address that challenge, further research is needed to investigate the potential of hybrid quantum algorithms for data fitting, for instance, in [39], [40], [129], [145]. "Hybrid" encoding patterns aim to leverage the advantages of the best appropriate approaches and enhance the representation and manipulation of classical data in quantum states.…”
Section: Challenges and Future Research Prospectsmentioning
confidence: 99%
“…A small structure known as a footer or trailer may occur at the end of the frame, which typically only contains information for error-checking. Control information is always included in the header since it is the first component of a packet or frame that a networking device, such as a switch or router [24][25].…”
Section: Quantum Headermentioning
confidence: 99%
“…[11][12][13][14] Other QKD methods include the B92, SARG04, and six-state protocols, which aim to securely distribute keys based on quantum principles. [11,[15][16][17][18][19][20] However, QKD protocols are vulnerable to side-channel attacks, requiring techniques like digital signatures for mitigation. Understanding these protocols helps in exploring advancements that enhance security, improve key rates, and overcome implementation challenges.…”
Section: Related Workmentioning
confidence: 99%