532 research outputs found

    Optimal dimensionality for quantum cryptography

    Get PDF
    We perform a comparison of two protocols for generating a cryptographic key composed from d-valued symbols: one exploiting a string of independent qubits and another one utilizing d-level systems prepared in states belonging to d+1 mutually unbiased bases. We show that the protocol based on qubits is optimal for quantum cryptography, since it provides higher security and higher key generation rate.Comment: Revtex, 4 pages, 1 eps figur

    Nonlinear quantum state transformation of spin-1/2

    Get PDF
    A non-linear quantum state transformation is presented. The transformation, which operates on pairs of spin-1/2, can be used to distinguish optimally between two non-orthogonal states. Similar transformations applied locally on each component of an entangled pair of spin-1/2 can be used to transform a mixed nonlocal state into a quasi-pure maximally entangled singlet state. In both cases the transformation makes use of the basic building block of the quantum computer, namely the quantum-XOR gate.Comment: 12 pages, LaTeX, amssym, epsfig (2 figures included

    Improved Inlet Conditions for Terrain CFD

    Get PDF

    Reduced randomness in quantum cryptography with sequences of qubits encoded in the same basis

    Full text link
    We consider the cloning of sequences of qubits prepared in the states used in the BB84 or 6-state quantum cryptography protocol, and show that the single-qubit fidelity is unaffected even if entire sequences of qubits are prepared in the same basis. This result is of great importance for practical quantum cryptosystems because it reduces the need for high-speed random number generation without impairing on the security against finite-size attacks.Comment: 8 pages, submitted to PR

    Quantum Key Distribution between N partners: optimal eavesdropping and Bell's inequalities

    Get PDF
    Quantum secret-sharing protocols involving N partners (NQSS) are key distribution protocols in which Alice encodes her key into N−1N-1 qubits, in such a way that all the other partners must cooperate in order to retrieve the key. On these protocols, several eavesdropping scenarios are possible: some partners may want to reconstruct the key without the help of the other ones, and consequently collaborate with an Eve that eavesdrops on the other partners' channels. For each of these scenarios, we give the optimal individual attack that the Eve can perform. In case of such an optimal attack, the authorized partners have a higher information on the key than the unauthorized ones if and only if they can violate a Bell's inequality.Comment: 14 pages, 1 figur

    Bell inequality, Bell states and maximally entangled states for n qubits

    Full text link
    First, we present a Bell type inequality for n qubits, assuming that m out of the n qubits are independent. Quantum mechanics violates this inequality by a ratio that increases exponentially with m. Hence an experiment on n qubits violating of this inequality sets a lower bound on the number m of entangled qubits. Next, we propose a definition of maximally entangled states of n qubits. For this purpose we study 5 different criteria. Four of these criteria are found compatible. For any number n of qubits, they determine an orthogonal basis consisting of maximally entangled states generalizing the Bell states.Comment: 8 pages, no figur
    • …
    corecore