-
1
Sufficient conditions for quantum advantage in random access code protocols with two-qubit states
Published 2023Subjects: Get full text
Journal Article -
2
Cryptography in coherent optical information networks using dissipative metamaterial gates
Published 2019“…Here, we introduce an optical layer secure communication protocol that does not rely on nonlinear optical processes but instead uses energy redistribution of coherent optical waves interacting on a plasmonic metamaterial absorber. …”
Get full text
Get full text
Journal Article -
3
Amorphous metal-sulphide microfibers enable photonic synapses for brain-like computing
Published 2015“…This gives rise to an all-optical implementation of a number of interneuronal and intraneuronal communication protocols that underlie learning and cognition in the brain.…”
Get full text
Get full text
Journal Article -
4
Setting a disordered password on a photonic memory
Published 2018“…Our results pave ways to significantly reduce the exposure of memories, required for long-distance communication, to eavesdropping and therefore restrict the optimal attack on communication protocols. The present scheme also increases the sensitivity of detecting any eavesdropper and so raises the security level of photonic information technology.…”
Get full text
Get full text
Journal Article -
5
Correlation in hard distributions in communication complexity
Published 2018“…. - We study the same question in the distributional quantum setting, and show a lower bound of Omega((n(k+1))^{1/4}), and an upper bound (via constructing communication protocols), matching up to a logarithmic factor. - We show that there are total Boolean functions f_d that have distributional communication complexity O(log(n)) under all distributions of information up to o(n), while the (interactive) distributional complexity maximised over all distributions is Theta(log(d)) for n <= d <= 2^{n/100}. …”
Get full text
Get full text
Journal Article