H. Amellal

ORCID: 0000-0002-7344-3246
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Quantum Information and Cryptography
  • Quantum Computing Algorithms and Architecture
  • Quantum Mechanics and Applications
  • Quantum optics and atomic interactions
  • Chaos-based Image/Signal Encryption
  • Cloud Data Security Solutions
  • Cryptography and Data Security
  • Security and Verification in Computing
  • Computability, Logic, AI Algorithms
  • Cloud Computing and Resource Management
  • Distributed systems and fault tolerance
  • Cold Atom Physics and Bose-Einstein Condensates
  • Cryptographic Implementations and Security
  • Radiation Effects in Electronics
  • Diamond and Carbon-based Materials Research
  • Spectroscopy and Quantum Chemical Studies

Université Ibn Zohr
2022

Mohammed V University
2014-2019

Mohamed I University
2019

Abdelmalek Essaâdi University
2018-2019

Quantum Key Distribution (QKD) protocols theo- retically propose a high-security level based on the advantages of quantum computing. This paper analyze security one most well-known QKD protocols, BB84, against man-in-the-middle attack strategy. Specifically, we leverage entanglement to enhance communication by injection malicious photon in middle transmission. In analysis, measure variation mutual information between sender-receiver and sender-attacker assess protocol's resilience potential attacks.

10.1109/ic3i59117.2023.10397711 article EN 2023-09-14

In this paper, we study the Big Data security based on quantum information theory. fact, discuss opportunities offered by Key distribution (QKD) protocols and algorithms to increase level of data. respect, used BB84 protocol transfer sent qubits via a channel Grover’s algorithm search in NoSql databases environment. order analyze effectiveness theory big data, compare obtained results with those classical approaches

10.1016/j.procs.2019.01.003 article EN Procedia Computer Science 2019-01-01

In order to enhance the quantum key distribution (QKD) security, a new protocol, “QKDPRB” based on random bases is proposed. It consists of using standard encoding moving circularly with variable rotational angle [Formula: see text] which depends angular velocity text]; thus, traditional turn into relative ones. To prove security and efficiency we present universal demonstration proves high level proposed even in presence intercept resend attack. Finally, QKDPRB may improve QKD.

10.1142/s0217979216500612 article EN International Journal of Modern Physics B 2016-04-05

A quantum error-correcting code is established in entangled coherent states (CSs) with Markovian and non-Markovian environments. However, the dynamic behavior of these optical discussed terms correlation measurements, entanglement discord. By using correcting codes, correlations can be as robust possible against environmental effects. As number redundant CSs increases due to repetitive error correction, probabilities success also increase significantly. Based on different field parameters,...

10.1142/s0219749919500448 article EN International Journal of Quantum Information 2019-08-01

In order to study and analyze quantum communications security, we propose in this work a new attack strategy alias: Malware Photon Injection Attack (MPIA). attack, based on the philosophy of classical "SQL Injection" physical properties entanglement. The effectiveness MPIA is proved by mutual information variation, between emitter-receiver emitter-Eavesdropper.

10.1109/wits.2017.7934654 article EN 2017-04-01

In order to reduce data processing time in NoSQL databases, we propose this paper a quantum approach extracting information from unstructured databases. fact, apply Grover's algorithm instead of classical algorithms search

10.1145/3286606.3286806 article EN 2018-10-10

In this paper, we analyze the effectiveness of quantum algorithms to solve some classical computing complexities. fact, focus in study on several famous algorithms, where discussed their impact using computer science.

10.1145/3286606.3286811 article EN 2018-10-10

In this paper, we study the privacy of data in cloud. fact, propose to encrypt before storage host company servers. Therefore, add an encryption box which includes different cryptographic algorithms cloud architecture scheme. Moreover, a quantum approach manage search cipher-Text.

10.1109/isaect.2018.8618834 article EN 2018-11-01

In this paper, we propose a simple scheme for generating deformed cat state based on dissipative amplitude interaction between an anharmonic oscillator and special modified bosonic group. The nonclassical properties of the superposition result exhibit interesting behavior depending input parameters. Finally, discuss some prominent possibilities in creating generalized Bell state, resulting from approximate displacement operator under beam splitter interaction.

10.1142/s021797921550232x article EN International Journal of Modern Physics B 2015-11-05
Coming Soon ...