Continuous Variable Controlled Quantum Conference

Foundations of Physics 53 (1):1-23 (2022)
  Copy   BIBTEX

Abstract

Using different quantum states (e.g., two mode squeezed-state, multipartite GHZ-like-states) as quantum resources, two protocols for "continuous variable (CV) controlled quantum conference" are proposed. These CV protocols for controlled quantum conferences (CQCs) are the first of their kind and can be reduced to CV protocols for various other cryptographic tasks. In the proposed protocols, Charlie is considered the controller, having the power to terminate the protocol at any time and to control the flow of information among the other users by using a parameterised control switch. Based on the information shared by Charlie with the participants of the conference, the control power of Charlie is evaluated and compared to the proposed protocols. The comparison of the efficiency of the proposed protocols has revealed that, under certain constraints, the 4-mode GHZ state-based protocol is more efficient than the two-mode squeezed state-based protocol. The control power Charlie is evaluated for the proposed protocols under certain constraints. A security analysis is also performed, and it is observed that the proposed protocols are secure against a variety of attacks, including but not limited to disturbance attacks, man-in-the-middle attacks, Trojan horse attacks, laser seeding attacks, cloning attacks, beam splitter attacks, and malicious user(s) attacks.

Other Versions

No versions found

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 100,865

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Is the Universe in a Mixed State?Shan Gao - 2023 - Foundations of Physics 54 (1):1-7.
Describing and Animating Quantum Protocols.Richard Bornat & Rajagopal Nagarajan - 2023 - In Alessandra Palmigiano & Mehrnoosh Sadrzadeh (eds.), Samson Abramsky on Logic and Structure in Computer Science and Beyond. Springer Verlag. pp. 447-473.
Conference report.Rafal Ablamowicz, Pertti Lounesto & Johannes Maks - 1991 - Foundations of Physics 21 (6):735-748.
LTL model checking for security protocols.Alessandro Armando, Roberto Carbone & Luca Compagna - 2009 - Journal of Applied Non-Classical Logics 19 (4):403-429.
Quantum Properties of a Single Beam Splitter.F. Laloë & W. J. Mullin - 2012 - Foundations of Physics 42 (1):53-67.

Analytics

Added to PP
2022-12-21

Downloads
27 (#822,464)

6 months
10 (#399,629)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references