TY - GEN
T1 - Improved model of quantum deterministic protocol implementation in channel with noise
AU - Qoussini, Alaa Edein
AU - Daradkeh, Yousef Ibrahim
AU - Al Tabib, Shaima Mohammad
AU - Gnatyuk, Sergiy
AU - Okhrimenko, Tetyana
AU - Kinzeryavyy, Vasyl
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019/9
Y1 - 2019/9
N2 - Traditional cryptographic methods have persistence, which are based on the alleged impossibility of solving a certain mathematical problem for a polynomial time. As an alternative quantum cryptography technologies don't depend on the computational capabilities of the intruder, because they use the unique properties of quantum particles, and are based on the principles of quantum physics laws inviolability. There are many methods and approaches used to solve the tasks of securing the privacy of message transmission without the use of encryption. One of the most advanced quantum cryptography technology is quantum direct secure communication, which allows information transmitting by an open channel without prior encryption. For this purpose, model of quantum deterministic protocol (for two modes of work) was created. Also the experimental studies of a deterministic protocol model in a channel with noise were carried out.
AB - Traditional cryptographic methods have persistence, which are based on the alleged impossibility of solving a certain mathematical problem for a polynomial time. As an alternative quantum cryptography technologies don't depend on the computational capabilities of the intruder, because they use the unique properties of quantum particles, and are based on the principles of quantum physics laws inviolability. There are many methods and approaches used to solve the tasks of securing the privacy of message transmission without the use of encryption. One of the most advanced quantum cryptography technology is quantum direct secure communication, which allows information transmitting by an open channel without prior encryption. For this purpose, model of quantum deterministic protocol (for two modes of work) was created. Also the experimental studies of a deterministic protocol model in a channel with noise were carried out.
KW - Deterministic protocol
KW - Information security
KW - Quantum cryptography
KW - Quantum direct secure communication
KW - Quantum key distribution
KW - Qubit
KW - Qutrit
UR - http://www.scopus.com/inward/record.url?scp=85077075476&partnerID=8YFLogxK
U2 - 10.1109/IDAACS.2019.8924287
DO - 10.1109/IDAACS.2019.8924287
M3 - Conference contribution
AN - SCOPUS:85077075476
T3 - Proceedings of the 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2019
SP - 572
EP - 578
BT - Proceedings of the 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2019
Y2 - 18 September 2019 through 21 September 2019
ER -