Quantum Computing and Communications: An Engineering Approach
Quantum Computing and Communications: An Engineering Approach
Quantum deformations of algebras associated with integrable Hamiltonian systems
AMATH'09 Proceedings of the 15th american conference on Applied mathematics
CIS'09 Proceedings of the international conference on Computational and information science 2009
Mathematical theory of information technology
DNCOCO'09 Proceedings of the 8th WSEAS international conference on Data networks, communications, computers
Physics of information representation, transmission and processing
DNCOCO'09 Proceedings of the 8th WSEAS international conference on Data networks, communications, computers
Mathematical characterization of quantum algorithm
MATH'09 Proceedings of the 14th WSEAS International Conference on Applied mathematics
Quantum teleportation with non-maximal entangled state
MATH'09 Proceedings of the 14th WSEAS International Conference on Applied mathematics
A categorical approach to quantum algorithm
MATH'09 Proceedings of the 14th WSEAS International Conference on Applied mathematics
CEA'10 Proceedings of the 4th WSEAS international conference on Computer engineering and applications
Hi-index | 0.00 |
In secret quantum communications the best eavesdropping attacks on quantum cryptography are based on imperfect cloning machines. The incoherent attack, based on quantum cloning, is the most common eavesdropping strategy. Using a probe, the eavesdropper imperfectly clones the sender's quantum state which keeps one copy and sends the other. The physically allowed transformations of Eve's quantum cloner on Bob's qubit can be described in terms of Completely Positive (CP), trace preserving maps. The map of the quantum cloner compresses the Bloch-ball, as an affine map. This affine map has to be a complete positive, trace preserving map, which shrinks the Bloch ball. The effects of a quantum cloner can be given in tetrahedron representation. In this paper we show a new, quantum information theoretical representation of eavesdropping detection, focused on the Four-state (BB84) and Six-state quantum cryptography protocols. We use a fundamentally new computational geometrical method to analyze the informational theoretical impacts of cloning activity on the quantum channel. The proposed algorithm uses Delaunay tessellation and convex hull calculation on the Bloch sphere, with respect to quantum relative entropy as distance measure. The improved core-set approach can be used to analyze efficiently the informational theoretical impacts of physically allowed quantum cloning attacks.