Quantum dialogue through non-destructive discrimination of cluster state
- URL: http://arxiv.org/abs/2506.04847v1
- Date: Thu, 05 Jun 2025 10:16:09 GMT
- Title: Quantum dialogue through non-destructive discrimination of cluster state
- Authors: Mandar Thatte, Shreya Banerjee, Prasanta K. Panigrahi,
- Abstract summary: We propose a quantum dialogue protocol that uses the non-destructive discrimination (NDD) of five qubit cluster states.<n>The proposed protocol is a measurement-based protocol, where ancilla qubits are used to perform measurement on the state without destroying its entanglement.
- Score: 0.6749750044497732
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: We propose a quantum dialogue protocol that uses the non-destructive discrimination (NDD) of five qubit cluster states. The proposed protocol is a measurement-based protocol, where ancilla qubits are used to perform measurement on the state without destroying its entanglement, allowing the state to be reused for further communication. We provide a detailed security analysis, demonstrating the protocol's resilience against various attack strategies and discuss the scalability of the scheme to n-qubit cluster states. We have introduced a stabilizer based single qubit error correction mechanism that enhances robustness against noise without requiring additional qubits.
Related papers
- Cryptographic Fragility of Standard Quantum Repeater Protocols [1.5469452301122173]
We show that the proposed quantum Internet relies on repeater protocols designed under the assumption of characterizable noise.<n>We propose a Cryptographic Network Stack centered on a trapdoor verification protocol to address these vulnerabilities.
arXiv Detail & Related papers (2026-02-26T14:30:03Z) - Robustness of quantum data hiding against entangled catalysts and memory [47.791962198275066]
We develop a general framework for state discrimination that unifies catalytic and memory-assisted local discrimination protocols.<n>We prove that when the hiding states are separable, neither entangled catalysts nor quantum memory can increase the optimal discrimination probability.<n>In contrast, for some entangled states, a reusable quantum memory turns locally indistinguishable states into ones that can be discriminated almost perfectly.
arXiv Detail & Related papers (2025-11-06T14:36:36Z) - Information recycling in coherent state discrimination [41.99844472131922]
We propose and analyze a strategy for distinguishing among N phase-symmetric coherent states.<n>We show that for N > 2, the "failure" states of UD retain residual information about the original input states.<n>Our results open up new possibilities for adaptive and sequential discrimination protocols in continuous-variable settings.
arXiv Detail & Related papers (2025-11-04T01:07:00Z) - Quantum Homogenization as a Quantum Steady State Protocol on NISQ Hardware [42.52549987351643]
Quantum homogenization is a reservoir-based quantum state approximation protocol.<n>We extend the standard quantum homogenization protocol to the dynamically-equivalent ($mathttSWAP$)$alpha$ formulation.<n>We show that our proposed protocol yields a completely positive, trace preserving (CPTP) map under which the code subspace is correctable.
arXiv Detail & Related papers (2024-12-19T05:50:54Z) - Orthogonal-state-based Measurement Device Independent Quantum Communication [32.244698777387995]
We propose a new protocol of measurement-device-independent quantum secure direct communication and quantum dialogue employing single basis, i.e., Bell basis as decoy qubits for eavesdropping detection.
Our protocols leverage fundamentally distinct resources to close the security loopholes linked to measurement devices, while also effectively doubling the distance for secure direct message transmission.
arXiv Detail & Related papers (2024-09-30T15:57:17Z) - Decoherence-assisted quantum key distribution [37.69303106863453]
We show that our method reduces the amount of information that an eavesdropper can obtain in the BB84 protocol under the entangling probe attack.
We demonstrate experimentally that Alice and Bob can agree on a scheme to that gives low values of the quantum bit error rate.
arXiv Detail & Related papers (2024-05-30T15:28:07Z) - Dimensional advantage in secure information trading via the noisy dense coding protocol [0.0]
We present the DC-based QKD protocol for higher dimensional systems.
We report the lower bounds on secret key rate, when the shared state is a two-qudit maximally entangled state.
We prove that the set of useless states in the DC-based QKD protocol is convex and compact.
arXiv Detail & Related papers (2023-10-31T17:50:48Z) - Security of a Continuous-Variable based Quantum Position Verification
Protocol [0.0]
We present and analyze a protocol that utilizes coherent states and its properties.
We prove security of the protocol against any unentangled attackers via entropic uncertainty relations.
We show that attackers who pre-share one continuous-variable EPR pair can break the protocol.
arXiv Detail & Related papers (2023-08-08T09:56:38Z) - Semi-device independent nonlocality certification for near-term quantum
networks [46.37108901286964]
Bell tests are the most rigorous method for verifying entanglement in quantum networks.
If there is any signaling between the parties, then the violation of Bell inequalities can no longer be used.
We propose a semi-device independent protocol that allows us to numerically correct for effects of correlations in experimental probability distributions.
arXiv Detail & Related papers (2023-05-23T14:39:08Z) - Single-photon-memory measurement-device-independent quantum secure
direct communication [63.75763893884079]
Quantum secure direct communication (QSDC) uses the quantum channel to transmit information reliably and securely.
In order to eliminate the security loopholes resulting from practical detectors, the measurement-device-independent (MDI) QSDC protocol has been proposed.
We propose a single-photon-memory MDI QSDC protocol (SPMQC) for dispensing with high-performance quantum memory.
arXiv Detail & Related papers (2022-12-12T02:23:57Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Performance analysis of continuous-variable quantum key distribution
using non-Gaussian states [0.0]
In this study, we analyze the efficiency of a protocol with discrete modulation of continuous variable non-Gaussian states.
We calculate the secure key generation rate against collective attacks using the fact that Eve's information can be bounded based on the protocol.
arXiv Detail & Related papers (2021-12-19T11:55:17Z) - Fault-tolerant parity readout on a shuttling-based trapped-ion quantum
computer [64.47265213752996]
We experimentally demonstrate a fault-tolerant weight-4 parity check measurement scheme.
We achieve a flag-conditioned parity measurement single-shot fidelity of 93.2(2)%.
The scheme is an essential building block in a broad class of stabilizer quantum error correction protocols.
arXiv Detail & Related papers (2021-07-13T20:08:04Z) - Four-state reference-frame-independent quantum key distribution with
non-qubit sources [8.362172668103643]
We analyze the security of the RFI-QKD protocol with non-qubit sources based on generalizing loss-tolerant techniques.
Our work can effectively defend against non-qubit sources including a misaligned reference frame, state preparation flaws, multiple optical modes, and Trojan horse attacks.
arXiv Detail & Related papers (2021-03-20T16:19:12Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Entanglement purification by counting and locating errors with
entangling measurements [62.997667081978825]
We consider entanglement purification protocols for multiple copies of qubit states.
We use high-dimensional auxiliary entangled systems to learn about number and positions of errors in the noisy ensemble.
arXiv Detail & Related papers (2020-11-13T19:02:33Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.