Please use this identifier to cite or link to this item: http://hdl.handle.net/2289/5881
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSrinatha, N.-
dc.contributor.authorOmkar, S.-
dc.contributor.authorSrikanth, R.-
dc.contributor.authorBenerjee, Subhashish-
dc.contributor.authorPathak, A.-
dc.date.accessioned2014-05-14T09:58:08Z-
dc.date.available2014-05-14T09:58:08Z-
dc.date.issued2014-01-
dc.identifier.citationQuantum information processing, 2014, Vol.13, p58-70en
dc.identifier.issn1570-0755-
dc.identifier.issn1573-1332 (Online)-
dc.identifier.urihttp://hdl.handle.net/2289/5881-
dc.descriptionRestricted Access. An open-access version is available at arXiv.org (one of the alternative locations)en
dc.description.abstractWe illustrate the principle of a cryptographic switch for a quantum scenario, in which a third party (Charlie) can control to a continuously varying degree the amount of information the receiver (Bob) receives, after the sender (Alice) has sent her information through a quantum channel. Suppose Charlie transmits a Bell state to Alice and Bob. Alice uses dense coding to transmit two bits to Bob. Only if the 2-bit information corresponding to the choice of the Bell state is made available by Charlie to Bob can the latter recover Alice’s information. By varying the amount of information Charlie gives, he can continuously alter the information recovered by Bob. The performance of the protocol as subjected to the squeezed generalized amplitude damping channel is considered. We also present a number of practical situations where a cryptographic switch would be of use.en
dc.language.isoenen
dc.publisherSpringeren
dc.relation.urihttp://arxiv.org/abs/1111.4834en
dc.relation.urihttp://dx.doi.org/10.1007/s11128-012-0487-3en
dc.rights2014 Springer Science+Business Media, LLCen
dc.titleThe quantum cryptographic switchen
dc.typeArticleen
Appears in Collections:Research Papers (LAMP)

Files in This Item:
File Description SizeFormat 
2014_QIP_13_59.pdf
  Restricted Access
Restricted Access448.58 kBAdobe PDFView/Open Request a copy


Items in RRI Digital Repository are protected by copyright, with all rights reserved, unless otherwise indicated.