scholarly journals Benchmarking a Quantum Teleportation Protocol in Superconducting Circuits Using Tomography and an Entanglement Witness

2012 ◽  
Vol 108 (4) ◽  
Author(s):  
M. Baur ◽  
A. Fedorov ◽  
L. Steffen ◽  
S. Filipp ◽  
M. P. da Silva ◽  
...  
2012 ◽  
Vol 85 (5) ◽  
Author(s):  
Ming-Jing Zhao ◽  
Shao-Ming Fei ◽  
Xianqing Li-Jost

2013 ◽  
Vol 110 (11) ◽  
Author(s):  
N. Friis ◽  
A. R. Lee ◽  
K. Truong ◽  
C. Sabín ◽  
E. Solano ◽  
...  

2011 ◽  
Vol 107 (27) ◽  
Author(s):  
Nirman Ganguly ◽  
Satyabrata Adhikari ◽  
A. S. Majumdar ◽  
Jyotishman Chatterjee

2001 ◽  
Vol 171 (11) ◽  
pp. 1264 ◽  
Author(s):  
Ivan V. Sokolov ◽  
A. Gatti ◽  
M.I. Kolobov ◽  
L.A. Lugiato

Author(s):  
D. Sowmya ◽  
S. Sivasankaran

In the cloud environment, it is difficult to provide security to the monolithic collection of data as it is easily accessed by breaking the algorithms which are based on mathematical computations and on the other hand, it takes much time for uploading and downloading the data. This paper proposes the concept of implementing quantum teleportation i.e., telecommunication + transportation in the cloud environment for the enhancement of cloud security and also to improve speed of data transfer through the quantum repeaters. This technological idea is extracted from the law of quantum physics where the particles say photons can be entangled and encoded to be teleported over large distances. As the transfer of photons called qubits allowed to travel through the optical fiber, it must be polarized and encoded with QKD (Quantum Key Distribution) for the security purpose. Then, for the enhancement of the data transfer speed, qubits are used in which the state of quantum bits can be encoded as 0 and 1 concurrently using the Shors algorithm. Then, the Quantum parallelism will help qubits to travel as fast as possible to reach the destination at a single communication channel which cannot be eavesdropped at any point because, it prevents from creating copies of transmitted quantum key due to the implementation of no-cloning theorem so that the communication parties can only receive the intended data other than the intruders.


2020 ◽  
Vol 101 (1) ◽  
Author(s):  
Arkaprabha Ghosal ◽  
Debarshi Das ◽  
Saptarshi Roy ◽  
Somshubhro Bandyopadhyay

2007 ◽  
Vol 99 (11) ◽  
Author(s):  
Hidehiro Yonezawa ◽  
Samuel L. Braunstein ◽  
Akira Furusawa

Sign in / Sign up

Export Citation Format

Share Document