An attack on the Needham-Schroeder public-key authentication protocol
Information Processing Letters
A Categorical Semantics of Quantum Protocols
LICS '04 Proceedings of the 19th Annual IEEE Symposium on Logic in Computer Science
Dagger Compact Closed Categories and Completely Positive Maps
Electronic Notes in Theoretical Computer Science (ENTCS)
Interacting Quantum Observables
ICALP '08 Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II
Bases in Diagrammatic Quantum Protocols
Electronic Notes in Theoretical Computer Science (ENTCS)
Quantum and Classical Structures in Nondeterminstic Computation
QI '09 Proceedings of the 3rd International Symposium on Quantum Interaction
Graph States and the Necessity of Euler Decomposition
CiE '09 Proceedings of the 5th Conference on Computability in Europe: Mathematical Theory and Computational Practice
Toy Quantum Categories (Extended Abstract)
Electronic Notes in Theoretical Computer Science (ENTCS)
The compositional structure of multipartite quantum entanglement
ICALP'10 Proceedings of the 37th international colloquium conference on Automata, languages and programming: Part II
Environment and classical channels in categorical quantum mechanics
CSL'10/EACSL'10 Proceedings of the 24th international conference/19th annual conference on Computer science logic
Hi-index | 0.00 |
Controlled complementary measurements are key to quantum key distribution protocols, among many other things. We axiomatize controlled complementary measurements within symmetric monoidal categories, which provides them with a corresponding graphical calculus. We study the BB84 and Ekert91 protocols within this calculus, including the case where there is an intercept-resend attack.