DSpace Repository

Quantum Network Security :

Show simple item record

dc.contributor.author Muhaimin, Md. Sayem
dc.contributor.author Mia, Md Shahin
dc.date.accessioned 2025-04-28T10:39:30Z
dc.date.available 2025-04-28T10:39:30Z
dc.date.issued 2025-02-01
dc.identifier.uri http://ar.cou.ac.bd:8080/xmlui/handle/123456789/125
dc.description.abstract Quantum repeater networks are essential for long-distance quantum communication, utilizing entanglement to ensure ultra-secure information exchange. Unlike classical methods, quantum networks rely on qubits and entanglement-based protocols for enhanced security. However, they face challenges, particularly from passive eavesdroppers (”spinach observers”) who extract information without direct interference. This paper examines vulnerabilities in entanglement distribution, assessing risks in Quantum Key Distribution (QKD), quantum teleportation, and entanglement swapping. We present a mathematical framework to evaluate information leakage and countermeasures like quantum error correction and syndrome measurements. Our findings show that photon-to-atom entanglement mapping offers the highest security, while itinerant-photon controlled gates pose moderate risks due to phase noise exploitation. Integrating quantum repeaters with real-time syndrome measurement tracking is a promising approach to mitigate these risks. This study advances quantum network security by identifying vulnerabilities and proposing strategies to enhance robustness. Future research should explore hybrid entanglement techniques, advanced error correction, and scalable quantum repeaters for a resilient quantum internet en_US
dc.language.iso en en_US
dc.publisher Comilla University en_US
dc.subject Quantum repeater networks are essential for long-distance quantum communication en_US
dc.subject advanced error correction, en_US
dc.subject Future research should explore hybrid entanglement techniques, en_US
dc.subject proposing strategies to enhance robustness. en_US
dc.subject This study advances quantum network security by identifying vulnerabilities en_US
dc.subject Unlike classical methods, quantum networks rely on qubits and entanglement-based protocols for enhanced security en_US
dc.title Quantum Network Security : en_US
dc.title.alternative A comprehensive Inspection en_US
dc.title.alternative A comprehensive Inspection en_US
dc.type Other en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Browse

My Account