Physics of Particles and Nuclei Letters

, Volume 4, Issue 2, pp 158–161 | Cite as

Simulation on quantum authentication

  • M. Dobšíček
Article
  • 31 Downloads

Abstract

This paper divides into two main parts. The first one discusses authentication of quantum messages. The protocol proposed in [1] for one qubit message-length case is especially considered. The protocol uses a shared EPR pair as a secret key. In the second part, it is shown how such a protocol can be simulated using the Quantum-Octave package. Quantum-Octave is a set of functions for a Matlab-like numerical environment allowing calculations with general density matrices.

PACS numbers

03.67.-a 03.67.Lx 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    M. Curty et al., “Qubit Authentication,” Phys. Rev. A 66, 022301 (2002).Google Scholar
  2. 2.
    D. W. Leung, “Quantum Vernam Cipher,” Quant. Inform. & Computation 2(1), 14–34 (2002).Google Scholar
  3. 3.
    H. Barnum et al., “Authentication of Quantum Messages,” Proc. 43rd Annual IEEE Symposium on the Foundations of Computer Science (FOCS’02), pp. 449–458, IEEE Press, 2002; quant-ph/0205128.Google Scholar
  4. 4.
    C. H. Bennett et al., “Purification of Noisy Entanglement and Faithful Teleportation Via Noisy Channels,” Phys. Rev. Lett. 76, 722–725 (1996).CrossRefADSGoogle Scholar
  5. 5.
    B. Ömer, “Structured Quantum Programming,” PhD Thesis (TU Vienna, Vienna, 2003).Google Scholar

Copyright information

© Pleiades Publishing, Ltd. 2007

Authors and Affiliations

  • M. Dobšíček
    • 1
  1. 1.Department of Computer Science and EngineeringFEE CTUPragueCzech Republic

Personalised recommendations