Simulation on quantum authentication
This paper divides into two main parts. The first one discusses authentication of quantum messages. The protocol proposed in  for one qubit message-length case is especially considered. The protocol uses a shared EPR pair as a secret key. In the second part, it is shown how such a protocol can be simulated using the Quantum-Octave package. Quantum-Octave is a set of functions for a Matlab-like numerical environment allowing calculations with general density matrices.
PACS numbers03.67.-a 03.67.Lx
Unable to display preview. Download preview PDF.
- 1.M. Curty et al., “Qubit Authentication,” Phys. Rev. A 66, 022301 (2002).Google Scholar
- 2.D. W. Leung, “Quantum Vernam Cipher,” Quant. Inform. & Computation 2(1), 14–34 (2002).Google Scholar
- 3.H. Barnum et al., “Authentication of Quantum Messages,” Proc. 43rd Annual IEEE Symposium on the Foundations of Computer Science (FOCS’02), pp. 449–458, IEEE Press, 2002; quant-ph/0205128.Google Scholar
- 5.B. Ömer, “Structured Quantum Programming,” PhD Thesis (TU Vienna, Vienna, 2003).Google Scholar