General method for the security analysis in a quantum direct communication protocol
classification
🪐 quant-ph
cs.CR
keywords
methodquantumanalysiscommunicationdirecteavesdroppergeneralprotocol
pith:P3IRBYEB Add to your LaTeX paper
What is a Pith Number?\usepackage{pith}
\pithnumber{P3IRBYEB}
Prints a linked pith:P3IRBYEB badge after your title and writes the identifier into PDF metadata. Compiles on arXiv with no extra files. Learn more
read the original abstract
We introduce a general approach for the analysis of a quantum direct communication protocol. The method is based on the investigation of the superoperator acting on a joint system of the communicating parties and the eavesdropper. The introduced method is more versatile than the approaches used so far as it permits to incorporate different noise models in a unified way. Moreover, it make use of a well grounded theory of quantum discrimination for the purpose of estimating the eavesdropper's information gain.
This paper has not been read by Pith yet.
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.