Quantum Computing and Communications: An Engineering Approach
Quantum Computing and Communications: An Engineering Approach
Novel geometrical solution to additivity problem of classical quantum channel capacity
Sarnoff'10 Proceedings of the 33rd IEEE conference on Sarnoff
WSEAS TRANSACTIONS on COMMUNICATIONS
Channel capacity restoration of noisy optical quantum channels
NEHIPISIC'11 Proceeding of 10th WSEAS international conference on electronics, hardware, wireless and optical communications, and 10th WSEAS international conference on signal processing, robotics and automation, and 3rd WSEAS international conference on nanotechnology, and 2nd WSEAS international conference on Plasma-fusion-nuclear physics
Hi-index | 0.00 |
The safety of quantum cryptography relies on the no-cloning theorem. In secret quantum communications, an eavesdropper cannot clone the sent qubits perfectly, however the best eavesdropping attacks for quantum cryptography are based on imperfect cloning machines. The eavesdropper's physically allowed quantum evolutions on the sent qubit can be described in terms of the quantum state's geometry. We use a fundamentally new computational geometrical method to analyze the informational theoretical impacts of cloning activity on the quantum channel. Our method uses Delaunay tessellation and convex hull calculation, with respect to quantum relative entropy as distance measure. The security analysis is focused on the four state (BB84) and Six state quantum cryptography protocols. The proposed geometrical method can be used to analyze efficiently the informational theoretical impacts of physically allowed quantum cloning transformations.