Skip to main content

    Pramode Verma

    In this paper we describe a free-space optics (FSO) based mobile sensor network that is not subject to RF interference common to wireless sensor networks. FSO-based mobile sensor networks can.
    Quantum key distribution has been a relatively recent addition to data security and integrity. It is based on advanced ideas that emanate from quantum theory. Additionally, the optical network and the quantum photon provide a formidable... more
    Quantum key distribution has been a relatively recent addition to data security and integrity. It is based on advanced ideas that emanate from quantum theory. Additionally, the optical network and the quantum photon provide a formidable basis for the application of quantum key distribution. We propose a new way of distributing encryption keys over quantum channels. The proposed method takes advantage of dual quantum channels between the communicating entities and complementary measuring bases in order to improve the efficiency with which the keys can be exchanged.
    It is well known that the quality of service as measured by latency in a packet switched network degrades rapidly when the incident traffic exceeds the design limits of the network. A higher latency would result in customer... more
    It is well known that the quality of service as measured by latency in a packet switched network degrades rapidly when the incident traffic exceeds the design limits of the network. A higher latency would result in customer dissatisfaction and likely large scale customer flight to alternative service providers with the attendant loss of revenue to the service provider. This paper presents a mechanism that introduces a priority system with the objective of providing a higher and a lower quality of service to the two customer groups. The non-priority traffic carries a lower price tag and a lower quality of service. An important characteristic of the proposed pricing schemes is that the overall revenue associated with the network remains constant as long as the total demand is confined within a relatively large bound, termed the region of operation, for the network.
    Super resolution reconstruction produces a higher resolution image based on a set of low resolution images, taken from the same scene. Recently, many papers have been published, proposing a variety algorithms of video super resolution.... more
    Super resolution reconstruction produces a higher resolution image based on a set of low resolution images, taken from the same scene. Recently, many papers have been published, proposing a variety algorithms of video super resolution. This paper presents a new approach to video super resolution, based on sparse coding and belief propagation. First, find the candidate pixels on multiple frames using sparse coding and belief propagation. Second, exploit the similarities of candidate pixels using the Non-local Means method to average out the noise among similar patches. The experimental results show the effectiveness of our method and demonstrate its robustness to other super resolution methods.
    Transmission and reflection spectra of periodic and random stacks comprising positive index materials and metamaterials have been extensively studied. In this paper we investigate the effectiveness of periodic stacks of PIM/NIM for use as... more
    Transmission and reflection spectra of periodic and random stacks comprising positive index materials and metamaterials have been extensively studied. In this paper we investigate the effectiveness of periodic stacks of PIM/NIM for use as a sensor. The transfer matrix method is used to find the transmittance and reflectance. Differences between the zero average refractive index bandgap and Bragg bandgap are illustrated. It is shown how these bandgaps can be used as the basis for designing sensors with minimal cross-sensitivity.
    Advantage creation through intrusion-level detection used by BB84-based QKD protocols is only one possibility permitted by quantum effects. In the early 2000s, another class of quantum cryptography protocols, called keyed communication in... more
    Advantage creation through intrusion-level detection used by BB84-based QKD protocols is only one possibility permitted by quantum effects. In the early 2000s, another class of quantum cryptography protocols, called keyed communication in quantum noise (KCQ) based on quantum detection and communication theory, was proposed. A main advantage of the KCQ protocols is that they generally allow the use of hundreds or thousands of photons in a signal pulse in contrast to the nominally single photon per pulse in BB84-based QKD protocols. This chapter introduces the concept of KCQ and describes certain implementations of the KCQ protocol.
    This paper proposes a quantum secure communication protocol using multiple photons to represent each bit of a message to be shared. The multi-photon tolerant approach to quantum cryptography provides a quantum level security while using... more
    This paper proposes a quantum secure communication protocol using multiple photons to represent each bit of a message to be shared. The multi-photon tolerant approach to quantum cryptography provides a quantum level security while using more than a single photon per transmission. The protocol proposed is a multi-stage protocol; an explanation of its operation and implementation are provided. The multi-stage protocol is based on the use of unitary transformations known only to Alice and Bob. This paper studies the security aspects of the multi-stage protocol by assessing its vulnerability to different attacks. It is well known that as the number of photons increases, the level of vulnerability of the multi-stage protocol increases. This paper sets a limit on the number of photons that can be used while keeping the multi-stage protocol a multi-photon tolerant quantum secure method for communication. The analysis of the number of photons to be used is based on the probability of success of a Helstrom discrimination done by an eavesdropper on the channel. Limiting the number of photons up to certain threshold per stage makes it impossible for an eavesdropper to decipher the message sent over the channel. The proposed protocol obviates the disadvantages associated with single photon implementations, such as limited data rates and distances along with the need to have no more than a single photon per time slot. The multi-stage protocol is a step toward direct quantum communication rather than quantum key distribution associated with single photon approaches.
    ABSTRACT
    In quantum information processing, one of the most common methods to represent a qubit is by means of the polarization degree of freedom of a photon. Efficient methods to determine the photon polarization state are hence the fundamental... more
    In quantum information processing, one of the most common methods to represent a qubit is by means of the polarization degree of freedom of a photon. Efficient methods to determine the photon polarization state are hence the fundamental tools in the studies of qubit systems. In fact, both theoretically optimal and practical polarization measurement schemes have been investigated extensively in the past two decades. These studies nevertheless focus on the situation when a definite number of photons are given and the results demonstrate the polarization estimation performance in terms of the mean fidelity. In practical quantum communication, one nevertheless often utilizes a coherent state with a small mean photon number to approximate a single photon. In certain quantum communication protocols, mesoscopic pulses of light are even used to increase the efficiency of information transmission. In this work, we present an optimal positive operator-valued measure (POVM) for polarization measurement that is applicable to quantum states with arbitrary photon number distributions. We focus on those states that can be written as an incoherent superposition of Fock states, which correspond to the situation when the phase information of the pulses is removed to increase the security of the communication protocols. We show that the POVM is the maximum-likelihood estimate of the polarization and give the analytical expressions for the mean fidelity as well as the error probability of estimation. In addition, the variance of the fidelity is calculated to evaluate the estimation accuracy beyond the mean value. These results are compared against the “greedy scheme”, which is an asymptotic optimal POVM for a light pulse with a finite but unfixed number of photons. Since the photon number distribution can be arbitrary, we have also studied light pulses following the thermal distribution and found that the estimation performance scales very differently from that of Poisson distribution or Fock states. Our results suggest that light sources other than a single mode laser could potentially provide stronger security for quantum communication.
    This chapter introduces the three-stage multi-photon protocol, its operation and implementation in a laboratory environment. The implementation uses free-space optics as the transmission medium. Parts of this chapter are based on the... more
    This chapter introduces the three-stage multi-photon protocol, its operation and implementation in a laboratory environment. The implementation uses free-space optics as the transmission medium. Parts of this chapter are based on the authors’ work previously reported in [1].
    A recent paper has discussed the implementation of the three-stage protocol as a multi-photon tolerant protocol. In this paper, we present a powerful algorithm to further enhance the security of the three-stage protocol. Using this... more
    A recent paper has discussed the implementation of the three-stage protocol as a multi-photon tolerant protocol. In this paper, we present a powerful algorithm to further enhance the security of the three-stage protocol. Using this algorithm, the three-stage protocol will be provided with yet another layer of security by provisioning an initialization vector between the two communicating parties. The addition of this contrivance makes it theoretically impossible for any intruder to recover the plaintext except under the condition when the intruder has simultaneous real-time access to four elements in the implementation of the protocol. In this paper, it is postulated that the concept can be extended to an electronic implementation with minor enhancement.
    This chapter extends the application space of the multi-stage multi-photon protocol to wireless communication. In particular, it examines the viability of using the multi-stage multi-photon protocol for secure key distribution in the IEEE... more
    This chapter extends the application space of the multi-stage multi-photon protocol to wireless communication. In particular, it examines the viability of using the multi-stage multi-photon protocol for secure key distribution in the IEEE 802.11i protocol.
    This chapter presents an ultra-secure router-to-router key exchange system. The key exchange process can be initiated by either router at will and can be carried out as often as required. The cryptographic strength of the proposed... more
    This chapter presents an ultra-secure router-to-router key exchange system. The key exchange process can be initiated by either router at will and can be carried out as often as required. The cryptographic strength of the proposed protocols lies in the use of multi-stage transmission where the number of variables exceeds the number of stages by one, ensuring that the number of possible measurements is one less that the number of variables. The proposed system carries out all processing in electronics and is not vulnerable to the man in the middle attack. The treatment presented in this chapter is based on the authors’ work in [1, 2].
    Advantage creation through intrusion-level detection used by BB84-based QKD protocols is only one possibility permitted by quantum effects. In the early 2000s, another class of quantum cryptography protocols, called keyed communication in... more
    Advantage creation through intrusion-level detection used by BB84-based QKD protocols is only one possibility permitted by quantum effects. In the early 2000s, another class of quantum cryptography protocols, called keyed communication in quantum noise (KCQ) based on quantum detection and communication theory, was proposed. A main advantage of the KCQ protocols is that they generally allow the use of hundreds or thousands of photons in a signal pulse in contrast to the nominally single photon per pulse in BB84-based QKD protocols. This chapter introduces the concept of KCQ and describes certain implementations of the KCQ protocol.
    This chapter generalizes the three-stage protocol into a family of multi-stage protocols. It compares the multi-stage protocol with single-photon protocols and illustrates how a multi-photon protocol can be made secure against... more
    This chapter generalizes the three-stage protocol into a family of multi-stage protocols. It compares the multi-stage protocol with single-photon protocols and illustrates how a multi-photon protocol can be made secure against man-in-the-middle attack. Since a multi-photon protocol is, in general, subject to photon-siphoning attacks, the protocol introduces another variable to thwart such attacks. Parts of this chapter are based on the authors’ work previously reported in [1, 2, 3].
    This chapter discusses an application of the polarization property of light in detecting intrusion on an optical fiber with the objective of stealing information flowing through it. Detection of intrusion, if timely accomplished, will... more
    This chapter discusses an application of the polarization property of light in detecting intrusion on an optical fiber with the objective of stealing information flowing through it. Detection of intrusion, if timely accomplished, will offer an effective means to prevent information from being captured by a malicious agent. The material presented in this chapter is based on the authors’ work previously published in [1].
    In this article, we present a privacy preserving genomic data dissemination algorithm based on compressed sensing. We participated in the challenge at the iDASH on March 24, 2014 in La Jolla, California and the result of the challenge are... more
    In this article, we present a privacy preserving genomic data dissemination algorithm based on compressed sensing. We participated in the challenge at the iDASH on March 24, 2014 in La Jolla, California and the result of the challenge are available online. In our proposed method, we are adding noise to the sparse representation of the input vector to make it differentially private. First, we find the sparse representation using SubSpace Pursuit and then perturb it with sufficient Laplacian noise. We also compared our method with a state-of-the-art compressed sensing privacy protection method.
    Preceding chapters of the book have explored using the polarization channel of an optical fiber for transmitting secure information without the need for encryption keys. In addition, Chap. 10 has offered a means to use the polarization... more
    Preceding chapters of the book have explored using the polarization channel of an optical fiber for transmitting secure information without the need for encryption keys. In addition, Chap. 10 has offered a means to use the polarization channel for detecting any malicious attempt to pilfer information in transit over an optical fiber. This chapter introduces the use of the polarization channel of an optical fiber to transfer data; more specifically, exchange symmetric keys between the two ends of the optical fiber. Use of the symmetric keys will allow any conventional symmetric encryption to take place between any number of data channels supported by the optical fiber. We do note that any encryption based on symmetric keys can be only computationally secure but, since the keys can be exchanged at a rapid rate, we can still achieve a high level of security on the data channel. Parts of this chapter have been previously published in [7, 8].
    This chapter presents a security analysis of the multi-stage protocol assessing its vulnerability to known security attacks. It shows that the multi-stage protocol can offer quantum level security under certain conditions. The material... more
    This chapter presents a security analysis of the multi-stage protocol assessing its vulnerability to known security attacks. It shows that the multi-stage protocol can offer quantum level security under certain conditions. The material presented in this chapter is based on the authors’ work previously published in [12, 13].
    Economic Divide has been an issue throughout the history of civilization. We believe we now have the opportunity to narrow this divide to an acceptable degree for the first time in the history of civilization. In this paper, we explore... more
    Economic Divide has been an issue throughout the history of civilization. We believe we now have the opportunity to narrow this divide to an acceptable degree for the first time in the history of civilization. In this paper, we explore the digital divide as a potential consequence of economic divide, and the digital phenomenon as a potential means of addressing the economic divide in the information era.

    And 146 more