-
Deutschian closed timelike curves can create entanglement
Authors:
Subhayan Roy Moulick,
Prasanta K. Panigrahi
Abstract:
We study the nature of entanglement in presence of Deutschian closed timelike curves (D-CTCs) and we observe that qubits traveling along a D-CTC allow unambiguous discrimination of Bell states with Local Operations and Classical Communications (LOCC), that is otherwise known to be impossible. A consequence of this leads us to discover that localized D-CTCs can create entanglement, using just local…
▽ More
We study the nature of entanglement in presence of Deutschian closed timelike curves (D-CTCs) and we observe that qubits traveling along a D-CTC allow unambiguous discrimination of Bell states with Local Operations and Classical Communications (LOCC), that is otherwise known to be impossible. A consequence of this leads us to discover that localized D-CTCs can create entanglement, using just local operations and classical communication. This contradicts the fundamental definition of entanglement.
△ Less
Submitted 6 January, 2016; v1 submitted 2 November, 2015;
originally announced November 2015.
-
Efficient Controlled Quantum Secure Direct Communication Protocols
Authors:
Siddharth Patwardhan,
Subhayan Roy Moulick,
Prasanta K. Panigrahi
Abstract:
We study controlled quantum secure direct communication (CQSDC), a cryptographic scheme where a sender can send a secret bit-string to an intended recipient, without any secure classical channel, who can obtain the complete bit-string only with the permission of a controller. We report an efficient protocol to realize CQSDC using Cluster state and then go on to construct a (2-3)-CQSDC using Brown…
▽ More
We study controlled quantum secure direct communication (CQSDC), a cryptographic scheme where a sender can send a secret bit-string to an intended recipient, without any secure classical channel, who can obtain the complete bit-string only with the permission of a controller. We report an efficient protocol to realize CQSDC using Cluster state and then go on to construct a (2-3)-CQSDC using Brown state, where a coalition of any two of the three controllers is required to retrieve the complete message. We argue both protocols to be unconditionally secure and analyze the efficiency of the protocols to show it to outperform the existing schemes while maintaining the same security specifications.
△ Less
Submitted 6 October, 2015; v1 submitted 19 September, 2015;
originally announced September 2015.
-
Signing Perfect Currency Bonds
Authors:
Subhayan Roy Moulick,
Prasanta K. Panigrahi
Abstract:
We propose the idea of a Quantum Cheque Scheme, a cryptographic protocol in which any legitimate client of a trusted bank can issue a cheque, that cannot be counterfeited or altered in anyway, and can be verified by a bank or any of its branches. We formally define a Quantum Cheque and present the first Unconditionally Secure Quantum Cheque Scheme and show it to be secure against any no-signaling…
▽ More
We propose the idea of a Quantum Cheque Scheme, a cryptographic protocol in which any legitimate client of a trusted bank can issue a cheque, that cannot be counterfeited or altered in anyway, and can be verified by a bank or any of its branches. We formally define a Quantum Cheque and present the first Unconditionally Secure Quantum Cheque Scheme and show it to be secure against any no-signaling adversary. The proposed Quantum Cheque Scheme can been perceived as the quantum analog of Electronic Data Interchange, as an alternate for current e-Payment Gateways.
△ Less
Submitted 6 August, 2015; v1 submitted 20 May, 2015;
originally announced May 2015.
-
Quantum Image Representation Through Two-Dimensional Quantum States and Normalized Amplitude
Authors:
Madhur Srivastava,
Subhayan R. Moulick,
Prasanta K. Panigrahi
Abstract:
We propose a novel method for image representation in quantum computers, which uses the two-dimensional (2-D) quantum states to locate each pixel in an image through row-location and column-location vectors for identifying each pixel location. The quantum state of an image is the linear superposition of the tensor product of the m-qubits row-location vector and the n-qubits column-location vector…
▽ More
We propose a novel method for image representation in quantum computers, which uses the two-dimensional (2-D) quantum states to locate each pixel in an image through row-location and column-location vectors for identifying each pixel location. The quantum state of an image is the linear superposition of the tensor product of the m-qubits row-location vector and the n-qubits column-location vector of each pixel. It enables the natural quantum representation of rectangular images that other methods lack. The amplitude/intensity of each pixel is incorporated into the coefficient values of the pixel's quantum state, without using any qubits. Due to the fact that linear superposition, tensor product and qubits form the fundamental basis of quantum computing, the proposed method presents the machine level representation of images on quantum computers. Unlike other methods, this method is a pure quantum representation without any classical components.
△ Less
Submitted 17 July, 2015; v1 submitted 9 May, 2013;
originally announced May 2013.