| dc.contributor.author | Muhaimin, Md. Sayem | |
| dc.contributor.author | Mia, Md Shahin | |
| dc.date.accessioned | 2025-04-28T10:39:30Z | |
| dc.date.available | 2025-04-28T10:39:30Z | |
| dc.date.issued | 2025-02-01 | |
| dc.identifier.uri | http://ar.cou.ac.bd:8080/xmlui/handle/123456789/125 | |
| dc.description.abstract | Quantum repeater networks are essential for long-distance quantum communication, utilizing entanglement to ensure ultra-secure information exchange. Unlike classical methods, quantum networks rely on qubits and entanglement-based protocols for enhanced security. However, they face challenges, particularly from passive eavesdroppers (”spinach observers”) who extract information without direct interference. This paper examines vulnerabilities in entanglement distribution, assessing risks in Quantum Key Distribution (QKD), quantum teleportation, and entanglement swapping. We present a mathematical framework to evaluate information leakage and countermeasures like quantum error correction and syndrome measurements. Our findings show that photon-to-atom entanglement mapping offers the highest security, while itinerant-photon controlled gates pose moderate risks due to phase noise exploitation. Integrating quantum repeaters with real-time syndrome measurement tracking is a promising approach to mitigate these risks. This study advances quantum network security by identifying vulnerabilities and proposing strategies to enhance robustness. Future research should explore hybrid entanglement techniques, advanced error correction, and scalable quantum repeaters for a resilient quantum internet | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | Comilla University | en_US |
| dc.subject | Quantum repeater networks are essential for long-distance quantum communication | en_US |
| dc.subject | advanced error correction, | en_US |
| dc.subject | Future research should explore hybrid entanglement techniques, | en_US |
| dc.subject | proposing strategies to enhance robustness. | en_US |
| dc.subject | This study advances quantum network security by identifying vulnerabilities | en_US |
| dc.subject | Unlike classical methods, quantum networks rely on qubits and entanglement-based protocols for enhanced security | en_US |
| dc.title | Quantum Network Security : | en_US |
| dc.title.alternative | A comprehensive Inspection | en_US |
| dc.title.alternative | A comprehensive Inspection | en_US |
| dc.type | Other | en_US |