532 research outputs found
Optimal dimensionality for quantum cryptography
We perform a comparison of two protocols for generating a cryptographic key
composed from d-valued symbols: one exploiting a string of independent qubits
and another one utilizing d-level systems prepared in states belonging to d+1
mutually unbiased bases. We show that the protocol based on qubits is optimal
for quantum cryptography, since it provides higher security and higher key
generation rate.Comment: Revtex, 4 pages, 1 eps figur
Nonlinear quantum state transformation of spin-1/2
A non-linear quantum state transformation is presented. The transformation,
which operates on pairs of spin-1/2, can be used to distinguish optimally
between two non-orthogonal states. Similar transformations applied locally on
each component of an entangled pair of spin-1/2 can be used to transform a
mixed nonlocal state into a quasi-pure maximally entangled singlet state. In
both cases the transformation makes use of the basic building block of the
quantum computer, namely the quantum-XOR gate.Comment: 12 pages, LaTeX, amssym, epsfig (2 figures included
Reduced randomness in quantum cryptography with sequences of qubits encoded in the same basis
We consider the cloning of sequences of qubits prepared in the states used in
the BB84 or 6-state quantum cryptography protocol, and show that the
single-qubit fidelity is unaffected even if entire sequences of qubits are
prepared in the same basis. This result is of great importance for practical
quantum cryptosystems because it reduces the need for high-speed random number
generation without impairing on the security against finite-size attacks.Comment: 8 pages, submitted to PR
Quantum Key Distribution between N partners: optimal eavesdropping and Bell's inequalities
Quantum secret-sharing protocols involving N partners (NQSS) are key
distribution protocols in which Alice encodes her key into qubits, in
such a way that all the other partners must cooperate in order to retrieve the
key. On these protocols, several eavesdropping scenarios are possible: some
partners may want to reconstruct the key without the help of the other ones,
and consequently collaborate with an Eve that eavesdrops on the other partners'
channels. For each of these scenarios, we give the optimal individual attack
that the Eve can perform. In case of such an optimal attack, the authorized
partners have a higher information on the key than the unauthorized ones if and
only if they can violate a Bell's inequality.Comment: 14 pages, 1 figur
Bell inequality, Bell states and maximally entangled states for n qubits
First, we present a Bell type inequality for n qubits, assuming that m out of
the n qubits are independent. Quantum mechanics violates this inequality by a
ratio that increases exponentially with m. Hence an experiment on n qubits
violating of this inequality sets a lower bound on the number m of entangled
qubits. Next, we propose a definition of maximally entangled states of n
qubits. For this purpose we study 5 different criteria. Four of these criteria
are found compatible. For any number n of qubits, they determine an orthogonal
basis consisting of maximally entangled states generalizing the Bell states.Comment: 8 pages, no figur
Atmospheric stability in CFD – Representation of the diurnal cycle in the atmospheric boundary layer
- âŚ