Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

A quantum secure direct communication protocol using entangled modified spin coherent states

A quantum secure direct communication protocol using entangled modified spin coherent states In this paper, a new direct quantum communication protocol based on a modified spin coherent state as decoy particles is to be depicted, before that both the scheme of the communication and the modified spin coherent state of the $$SU(2)$$ group will be presented. The final phase is to be devoted to the study of the transmission security analysis and the quantity information depending on the method of the entropy theory, using the constraint between the information which can be obtained by the eavesdropper and the occurring interference. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Quantum Information Processing Springer Journals

A quantum secure direct communication protocol using entangled modified spin coherent states

Quantum Information Processing , Volume 12 (7) – Mar 7, 2013

Loading next page...
 
/lp/springer_journal/a-quantum-secure-direct-communication-protocol-using-entangled-Nj962iGeKY

References (48)

Publisher
Springer Journals
Copyright
Copyright © 2013 by Springer Science+Business Media New York
Subject
Physics; Quantum Information Technology, Spintronics; Quantum Computing; Data Structures, Cryptology and Information Theory; Quantum Physics; Mathematical Physics
ISSN
1570-0755
eISSN
1573-1332
DOI
10.1007/s11128-013-0546-4
Publisher site
See Article on Publisher Site

Abstract

In this paper, a new direct quantum communication protocol based on a modified spin coherent state as decoy particles is to be depicted, before that both the scheme of the communication and the modified spin coherent state of the $$SU(2)$$ group will be presented. The final phase is to be devoted to the study of the transmission security analysis and the quantity information depending on the method of the entropy theory, using the constraint between the information which can be obtained by the eavesdropper and the occurring interference.

Journal

Quantum Information ProcessingSpringer Journals

Published: Mar 7, 2013

There are no references for this article.