Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Arpita Maitra is active.

Publication


Featured researches published by Arpita Maitra.


Information Processing Letters | 2013

Eavesdropping in semiquantum key distribution protocol

Arpita Maitra; Goutam Paul

Abstract In semiquantum key-distribution (Boyer et al.) Alice has the same capability as in BB84 protocol, but Bob can measure and prepare qubits only in { | 0 〉 , | 1 〉 } basis and reflect any other qubit. We study an eavesdropping strategy on this scheme that listens to the channel in both the directions. With the same level of disturbance induced in the channel, Eve can extract more information using our two-way strategy than what can be obtained by the direct application of one-way eavesdropping in BB84.


International Journal of Theoretical Physics | 2015

A Resilient Quantum Secret Sharing Scheme

Arpita Maitra; Goutam Paul

A resilient secret sharing scheme is supposed to generate the secret correctly even after some shares are damaged. In this paper, we show how quantum error correcting codes can be exploited to design a resilient quantum secret sharing scheme, where a quantum state is shared among more than one parties.


Quantum Information Processing | 2014

Efficient quantum algorithms to construct arbitrary Dicke states

Kaushik Chakraborty; Byung-Soo Choi; Arpita Maitra; Subhamoy Maitra

In this paper, we study several quantum algorithms toward the efficient construction of arbitrary arbitrary Dicke state. The proposed algorithms use proper symmetric Boolean functions that involve manipulation with Krawtchouk polynomials. Deutsch–Jozsa algorithm, Grover algorithm, and the parity measurement technique are stitched together to devise the complete algorithm. In addition to that we explore how the biased Hadamard transformation can be utilized into our strategy, motivated by the work of Childs et al. (Quantum Inf Comput 2(3):181–191, 2002).


international conference on cryptology in india | 2012

Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84

Arpita Maitra; Goutam Paul

The BB84 protocol is used by Alice (the sender) and Bob (the receiver) to settle on a secret classical bit-string by communicating qubits over an insecure quantum channel where Eve (the Eavesdropper) can have access. In this paper, we revisit a well known eavesdropping technique against BB84. We claim that there exist certain gaps in understanding the existing eavesdropping strategy in terms of cryptanalytic view and we try to bridge those gaps in this paper.


Chinese Physics Letters | 2012

On Universality of Quantum Fourier Transform

Arpita Maitra; Santanu Sarkar

A methodology is presented to obtain the basis of qudits which are admissible to quantum Fourier transform (QFT) in the sense that the set of such kets are related by the QFT in the same way as the kets of the computational basis. We first study this method for qubits to characterize the ensemble that works for the Hadamard transformation (QFT for two dimension). In this regard we identify certain incompleteness in the result of Maitra and Parashar (Int. J. Quantum Inform. 4 (2006) 653). Next we characterize the ensemble of qutrits for which QFT is possible. Further, some theoretical results related to higher dimensions are also discussed. Considering the unitary matrix Un related to QFT, the issue boils down to the problem of characterizing matrices that commute with Un.


international conference on information systems security | 2016

Collaborative Information Service - Privacy Algebra for User Defined Security

Asim K. Pal; Subrata Bose; Arpita Maitra

With the increased activity over the internet and globalization of the market economy collaborative computing becomes an important area of research. Security is an increasing concern because of chances of malicious elements breaching the network of collaborating partners. Further the level of mutual belief among the collaborators would not be identical and may change with experience. Thus the concept of user defined flexible security requirements arose. The idea of user defined privacy template was brought in IRaaS (Information Retrieval as a Service) (Pal and Bose 2013) which is a flexible system of information services to customers who seek information from various sources through a service provider. The idea was further extended to CIS (Collaborative Information Service) (Pal and Bose 2016) which provides a framework for general information exchange activities (not restricted to retrievals only) for a set of collaborating partners. The current work extends CIS by introducing privacy algebra to be applied on templates to get a concise expression of privacy restrictions. CIS is a step towards a privacy aware collaborative computing problem.


Physical Review A | 2015

A Proposal for Quantum Rational Secret Sharing.

Arpita Maitra; Sourya Joyee De; Goutam Paul; Asim K. Pal


International Journal of Quantum Information | 2006

HADAMARD TYPE OPERATIONS FOR QUBITS

Arpita Maitra; Preeti Parashar


arXiv: Quantum Physics | 2018

Proposal for Dimensionality Testing in Quantum Private Query

Arpita Maitra; Bibhas Adhikari; Satyabrata Adhikari


arXiv: Quantum Physics | 2017

A Note on Measurement Device Independent Quantum Private Query with Qutrits

Sarbani Roy; Arpita Maitra; Sourav Mukhopadhyay

Collaboration


Dive into the Arpita Maitra's collaboration.

Top Co-Authors

Avatar

Goutam Paul

Indian Statistical Institute

View shared research outputs
Top Co-Authors

Avatar

Asim K. Pal

Indian Institute of Management Calcutta

View shared research outputs
Top Co-Authors

Avatar

Subhamoy Maitra

Indian Statistical Institute

View shared research outputs
Top Co-Authors

Avatar

Bibhas Adhikari

Indian Institute of Technology Kharagpur

View shared research outputs
Top Co-Authors

Avatar

Kaushik Chakraborty

French Institute for Research in Computer Science and Automation

View shared research outputs
Top Co-Authors

Avatar

Preeti Parashar

Indian Statistical Institute

View shared research outputs
Top Co-Authors

Avatar

Santanu Sarkar

Chennai Mathematical Institute

View shared research outputs
Top Co-Authors

Avatar

Sarbani Roy

Indian Institute of Technology Kharagpur

View shared research outputs
Top Co-Authors

Avatar

Satyabrata Adhikari

S.N. Bose National Centre for Basic Sciences

View shared research outputs
Top Co-Authors

Avatar

Sourav Mukhopadhyay

Indian Institute of Technology Kharagpur

View shared research outputs
Researchain Logo
Decentralizing Knowledge