#### Filter Results:

#### Publication Year

2005

2016

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

- Iman Marvian, Seth Lloyd
- 2016

We propose a quantum algorithm that emulates the action of an unknown unitary transformation on a given input state, using multiple copies of some unknown sample input states of the unitary and their corresponding output states. The algorithm does not assume any prior information about the unitary to be emulated, or the sample input states. To emulate the… (More)

- Iman Marvian, Robert W. Spekkens
- TQC
- 2012

- I. Marvian
- 2008

All elementary Hamiltonians in nature are expected to be invariant under rotation. Despite this restriction, we usually assume that any arbitrary measurement or unitary time evolution can be implemented on a physical system, an assumption whose validity is not obvious. We introduce two different schemes by which any arbitrary unitary time evolution and… (More)

- Iman Marvian, Saied Hosseini-Khayat
- The Sixth IEEE International Conference on…
- 2006

A quantum protocol for secure transmission of data using qubits is presented. This protocol sends one qubit in a round-trip to transmit one bit of data. The protocol offers an improvement over the BB84 QKD protocol. BB84, in conjunction with one-time pad encryption, has been shown to be unconditionally secure. However its security relies on the assumption… (More)

Let an EPR source which generates maximally entangled pairs be located so that it has distances L 1 and L 2 to two users. After taking into account various effects like loss of photons, deficiencies in the source and detectors, an entangled pair traveling through the channel may loose its perfect correlation due to errors in the channel. How the… (More)

- Saied Hosseini-Khayat, Iman Marvian
- ArXiv
- 2005

A two-layer quantum protocol for secure transmission of data using qubits is presented. The protocol is an improvement over the BB84 QKD protocol. BB84, in conjunction with the one-time pad algorithm, has been shown to be unconditionally secure. However it suffers from two drawbacks: (1) Its security relies on the assumption that Alice's qubit source is… (More)

- ‹
- 1
- ›