- Quantum Information and Cryptography
- Quantum Computing Algorithms and Architecture
- Quantum Mechanics and Applications
- Quantum optics and atomic interactions
- Chaos-based Image/Signal Encryption
- Cloud Data Security Solutions
- Cryptography and Data Security
- Security and Verification in Computing
- Computability, Logic, AI Algorithms
- Cloud Computing and Resource Management
- Distributed systems and fault tolerance
- Cold Atom Physics and Bose-Einstein Condensates
- Cryptographic Implementations and Security
- Radiation Effects in Electronics
- Diamond and Carbon-based Materials Research
- Spectroscopy and Quantum Chemical Studies
Université Ibn Zohr
2022
Mohammed V University
2014-2019
Mohamed I University
2019
Abdelmalek Essaâdi University
2018-2019
Quantum Key Distribution (QKD) protocols theo- retically propose a high-security level based on the advantages of quantum computing. This paper analyze security one most well-known QKD protocols, BB84, against man-in-the-middle attack strategy. Specifically, we leverage entanglement to enhance communication by injection malicious photon in middle transmission. In analysis, measure variation mutual information between sender-receiver and sender-attacker assess protocol's resilience potential attacks.
In this paper, we study the Big Data security based on quantum information theory. fact, discuss opportunities offered by Key distribution (QKD) protocols and algorithms to increase level of data. respect, used BB84 protocol transfer sent qubits via a channel Grover’s algorithm search in NoSql databases environment. order analyze effectiveness theory big data, compare obtained results with those classical approaches
In order to enhance the quantum key distribution (QKD) security, a new protocol, “QKDPRB” based on random bases is proposed. It consists of using standard encoding moving circularly with variable rotational angle [Formula: see text] which depends angular velocity text]; thus, traditional turn into relative ones. To prove security and efficiency we present universal demonstration proves high level proposed even in presence intercept resend attack. Finally, QKDPRB may improve QKD.
A quantum error-correcting code is established in entangled coherent states (CSs) with Markovian and non-Markovian environments. However, the dynamic behavior of these optical discussed terms correlation measurements, entanglement discord. By using correcting codes, correlations can be as robust possible against environmental effects. As number redundant CSs increases due to repetitive error correction, probabilities success also increase significantly. Based on different field parameters,...
In order to study and analyze quantum communications security, we propose in this work a new attack strategy alias: Malware Photon Injection Attack (MPIA). attack, based on the philosophy of classical "SQL Injection" physical properties entanglement. The effectiveness MPIA is proved by mutual information variation, between emitter-receiver emitter-Eavesdropper.
In order to reduce data processing time in NoSQL databases, we propose this paper a quantum approach extracting information from unstructured databases. fact, apply Grover's algorithm instead of classical algorithms search
In this paper, we analyze the effectiveness of quantum algorithms to solve some classical computing complexities. fact, focus in study on several famous algorithms, where discussed their impact using computer science.
In this paper, we study the privacy of data in cloud. fact, propose to encrypt before storage host company servers. Therefore, add an encryption box which includes different cryptographic algorithms cloud architecture scheme. Moreover, a quantum approach manage search cipher-Text.
In this paper, we propose a simple scheme for generating deformed cat state based on dissipative amplitude interaction between an anharmonic oscillator and special modified bosonic group. The nonclassical properties of the superposition result exhibit interesting behavior depending input parameters. Finally, discuss some prominent possibilities in creating generalized Bell state, resulting from approximate displacement operator under beam splitter interaction.