Iman Marvian

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
We propose a quantum algorithm that emulates the action of an unknown unitary transformation on a given input state, using multiple copies of some unknown sample input states of the unitary and their corresponding output states. The algorithm does not assume any prior information about the unitary to be emulated, or the sample input states. To emulate the(More)
A quantum protocol for secure transmission of data using qubits is presented. This protocol sends one qubit in a round-trip to transmit one bit of data. The protocol offers an improvement over the BB84 QKD protocol. BB84, in conjunction with one-time pad encryption, has been shown to be unconditionally secure. However its security relies on the assumption(More)
Let an EPR source which generates maximally entangled pairs be located so that it has distances L 1 and L 2 to two users. After taking into account various effects like loss of photons, deficiencies in the source and detectors, an entangled pair traveling through the channel may loose its perfect correlation due to errors in the channel. How the(More)
A two-layer quantum protocol for secure transmission of data using qubits is presented. The protocol is an improvement over the BB84 QKD protocol. BB84, in conjunction with the one-time pad algorithm, has been shown to be unconditionally secure. However it suffers from two drawbacks: (1) Its security relies on the assumption that Alice's qubit source is(More)
  • 1