Jesni Shamsul Shaari
International Islamic University Malaysia
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jesni Shamsul Shaari.
Optics Communications | 2011
Jesni Shamsul Shaari; Iskandar Bahari; Sellami Ali
We study the possible application of the decoy state method on a basic two way quantum key distribution (QKD) scheme to extend its distance. Noting the obvious advantage of such a QKD scheme in allowing for single as well as double photon contributions, we derive relevant lower bounds on the corresponding gains in a practical decoy state implementation using two intensities for decoy states. We work with two different approaches in this vein and compare these with an ideal infinite decoy state case as well as the simulation of the original.
Physics Letters A | 2008
Jesni Shamsul Shaari; Mohamed Ridza Wahiddin; Stefano Mancini
Abstract We consider the problem of encoding classical information into unknown qudit states belonging to any basis, of a maximal set of mutually unbiased bases, by one party and then decoding by another party who has perfect knowledge of the basis. Working with qudits of prime dimensions, we point out a no-go theorem that forbids ‘shift’ operations on arbitrary unknown states. We then provide the necessary conditions for reliable encoding/decoding.
2007 First International Conference on Quantum, Nano, and Micro Technologies (ICQNM'07) | 2007
Jesni Shamsul Shaari; Mohamed Ridza Wahiddin
Works in two way deterministic quantum cryptography protocols using qubits and qutrits have seen the nontrivial generalization of the protocol to accommodate the use of all mutually unbiased bases (MUB). Here we consider the use of qunits (quantum systems of n dimensional Hilbert space) in a similar protocol and working with cases where the number of MUB is n +1 we show that n qunits are necessary to generalize the use of all available MUBs. We also provide a recipe that would allow for encoding with unitary efficiency.
Scientific Reports | 2016
Suhaili Kamaruddin; Jesni Shamsul Shaari
We consider an optimal quantum key distribution setup based on minimal number of measurement bases with binary yields used by parties against an eavesdropper limited only by the no-signaling principle. We note that in general, the maximal key rate can be achieved by determining the optimal tradeoff between measurements that attain the maximal Bell violation and those that maximise the bit correlation between the parties. We show that higher correlation between shared raw keys at the expense of maximal Bell violation provide for better key rates for low channel disturbance.
Entropy | 2015
Jesni Shamsul Shaari; Stefano Mancini
Quantum cryptographic protocols solve the longstanding problem of distributing a shared secret string to two distant users by typically making use of one-way quantum channel. However, alternative protocols exploiting two-way quantum channel have been proposed for the same goal and with potential advantages. Here, we overview a security proof for two-way quantum key distribution protocols, against the most general eavesdropping attack, that utilize an entropic uncertainty relation. Then, by resorting to the “smooth” version of involved entropies, we extend such a proof to the case of finite key size. The results will be compared to those available for one-way protocols showing some advantages.
EPL | 2015
S. Kamaruddin; Jesni Shamsul Shaari
Quantum key distribution (QKD) with security features based on the notion of nonlocality has provided valuable insights into the possibility of device-independent scenarios. The essential resource for nonlocality in Nature described by quantum physics has been mainly associated with entanglement of two particles or more, although it has been shown that nonlocality of a single particle is indeed possible. Here, we consider a quantum key distribution scheme based on Phys. Rev. A, 68 (2003) 012324 exploiting single-particle nonlocality testing to demonstrate its security. We present our analysis of security against individual attack within a device-independent scenario where Eve is constrained only by the no-signaling principle. We further consider a family of QKD protocols based on binary measurements and discuss the possibility of optimal scenarios.
Physical Review A | 2016
Jesni Shamsul Shaari; Rinie N. M. Nasir; Stefano Mancini
We consider the notion of unitary transformations forming bases for subspaces of
Physics Letters A | 2010
Jesni Shamsul Shaari; Iskandar Bahari
M(d,\mathbb{C})
International Conference on Quantum Information (2007), paper JWC65 | 2007
Mohamed Ridza Wahidin; Jesni Shamsul Shaari; Marco Lucamarni
such that the square of Hilbert-Schmidt inner product of matrices from the differing bases is a constant. Moving from the qubit case, weconstruct the maximal number of such bases for the 4 and 2 dimensional subspaces while proving the nonexistence of such a construction for the 3 dimensional case. Extending this to higher dimensions, we commit to such a construct for the case of qutrits and provide evidence for the existence of such unitaries for prime dimensional quantum systems. Focusing on the qubit case, we show that the average fidelity for estimating any of such a transformation is equal to the case for estimating a completely unknown unitary from
Physics Letters A | 2006
Jesni Shamsul Shaari; Marco Lucamarini; Mohamed Ridza Wahiddin
\text{SU}(2)