• Title/Summary/Keyword: Quantum Direct Communication

Search Result 7, Processing Time 0.024 seconds

Quantum Secure Direct Community using Time Lag (시간지연을 이용한 양자비밀직접통신)

  • Rim, Kwang-cheol;Lim, Dong-ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.12
    • /
    • pp.2318-2324
    • /
    • 2017
  • Quantum cryptography, which is emerging as a next generation password, is being studied by quantum cryptographic transfer protocols and quantum secret communication. Quantum key transfer protocol can be used in combination with the modern password because of the inefficiency of the use of the password, or the use of OTP(one time password). In this paper an algorithm for direct communication by means of direct cryptographic communications rather than quantum keys. The method of implementing quantum secure direct community was adopted using 2-channel methods using Einstein gravity field. Two channels were designed to adopt a quantum secret communication protocol that applies time delay between 2-channels of channel to apply time difference between 2-channels. The proposed time delay effect reflects the time delay by reflecting the gravitational lensing phenomenon. Gravity generator with centrifugal acceleration is incorporated in the viscometer, and the time delay using this implies the correlation between the variance of the metametry.

Quantum Computing Impact on SCM and Hotel Performance

  • Adhikari, Binaya;Chang, Byeong-Yun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.1-6
    • /
    • 2021
  • For competitive hotel business, the hotel must have a sound prediction capability to balance the demand and supply of hospitality products. To have a sound prediction capability in the hotel, it should be prepared to be equipped with a new technology such as quantum computing. The quantum computing is a brand new cutting-edge technology. It will change hotel business and even the whole world too. Therefore, we study the impact of quantum computing on supply chain management (SCM) and hotel performance. Toward the goal we have developed the research model including six constructs: quantum (computing) prediction, communication, supplier relationship, service quality, non-financial performance, and financial performance. The result of the study shows a significant influence of quantum (computing) prediction on hotel performance through the mediating role of SCM in the hotel. Quantum prediction is highly significant in enhancing the SCM in the hotel. However, the direct effect between the quantum prediction and hotel performance is not significant. The finding indicates that hotels which would install the quantum computing technology and utilize the quantum prediction could hugely benefit from the performance improvement.

Simulative Investigation of Spectral Amplitude Coding Based OCDMA System Using Quantum Logic Gate Code with NAND and Direct Detection Techniques

  • Sharma, Teena;Maddila, Ravi Kumar;Aljunid, Syed Alwee
    • Current Optics and Photonics
    • /
    • v.3 no.6
    • /
    • pp.531-540
    • /
    • 2019
  • Spectral Amplitude Coding Optical Code Division Multiple Access (SAC OCDMA) is an advanced technique in asynchronous environments. This paper proposes design and implementation of a novel quantum logic gate (QLG) code, with code construction algorithm generated without following any code mapping procedures for SAC system. The proposed code has a unitary matrices property with maximum overlap of one chip for various clients and no overlaps in spectra for the rest of the subscribers. Results indicate that a single algorithm produces the same length increment for codes with weight greater than two and follows the same signal to noise ratio (SNR) and bit error rate (BER) calculations for a higher number of users. This paper further examines the performance of a QLG code based SAC-OCDMA system with NAND and direct detection techniques. BER analysis was carried out for the proposed code and results were compared with existing MDW, RD and GMP codes. We demonstrate that the QLG code based system performs better in terms of cardinality, which is followed by improved BER. Numerical analysis reveals that for error free transmission (10-9), the suggested code supports approximately 170 users with code weight 4. Our results also conclude that the proposed code provides improvement in the code construction, cross-correlation and minimization of noises.

Scaling theory to minimize the roll-off of threshold voltage for ultra fine MOSFET (미세 구조 MOSFET에서 문턱전압 변화를 최소화하기 위한 최적의 스켈링 이론)

  • 정학기;김재홍;고석웅
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.4
    • /
    • pp.719-724
    • /
    • 2003
  • In this paper, we have presented the simulation results about threshold voltage of nano scale lightly doped drain (LDD) MOSFET with halo doping profile. Device size is scaled down from 100nm to 40nm using generalized scaling. We have investigated the threshold voltage for constant field scaling and constant voltage scaling using the Van Dort Quantum Correction Model (QM) and direct tunneling current for each gate oxide thickness. We know that threshold voltage is decreasing in the constant field scaling and increasing in the constant voltage scaling when gate length is reducing, and direct tunneling current is increasing when gate oxide thickness is reducing. To minimize the roll off characteristics for threshold voltage of MOSFET with decreasing channel length, we know $\alpha$ value must be nearly 1 in the generalized scaling.

Quantum cryptography-used Key Distribution Model Design of U-healthcare environment (양자 암호를 이용한 유헬스케어 환경의 키 분배 모델 설계)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.389-395
    • /
    • 2013
  • As fusing IT and medical technique, the number of patients who adhere medical equipment inside of them is increasing. However there is a problem of for the third person to tap or modulate the patient's biometric data viciously. This paper suggests quantum encryption-based key distribution model to share key for the third person not to tap or modulate the patient's biometric data between patient and hospital staff. The proposed model uses one-time pad key that shares key sending random bits not direct sending message of quantum data. Also, it guarantees patient's anonymity because the biometric data of injected-device in the body doesn't be exposed unnecessarily.

Self-consistent Solution Method of Multi-Subband BTE in Quantum Well Device Modeling (양자 우물 소자 모델링에 있어서 다중 에너지 부준위 Boltzmann 방정식의 Self-consistent한 해법의 개발)

  • Lee, Eun-Ju
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.39 no.2
    • /
    • pp.27-38
    • /
    • 2002
  • A new self-consistent mathematical model for semiconductor quantum well device was developed. The model was based on the direct solution of the Boltzmann transport equation, coupled to the Schrodinger and Poisson equations. The solution yielded the distribution function for a two-dimensional electron gas(2DEG) in quantum well devices. To solve the Boltzmann equation, it was transformed into a tractable form using a Legendre polynomial expansion. The Legendre expansion facilitated analytical evaluation of the collision integral, and allowed for a reduction of the dimensionality of the problem. The transformed Boltzmann equation was then discretized and solved using sparce matrix algebra. The overall system was solved by iteration between Poisson, Schrodinger and Boltzmann equations until convergence was attained.

Secure Direct Communication protocol Using Entanglement Swapping (Entanglement Swapping을 이용한 안전한 직접 통신 프로토콜)

  • Hong Chang-ho;Lee Hwa-yean;Kim Ji-in;Lim Jong-in;Yang Hyung-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.1
    • /
    • pp.3-12
    • /
    • 2006
  • We propose a direct communication protocol using entanglement swapping. The safety of this protocol is guaranteed by the basic properties of entanglement swapping. This protocol is efficient to transmit two classical bits of information per one session. This efficiency is better than that of ping-pong protocol suggested by Bostrom and Felbinger. Even if an eavesdropper intervenes in midway, the eavesdropper will be detected with the probability of $75\%$ in the verification process of one bit. Therefore the perfect security is guaranteed if we use enough amount of bits for the verification process.