/ 01 01 09 8 v 2 18 S ep 2 00 1 Quantum cryptography
نویسنده
چکیده
II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical (public-key) cryptosystems . . . . . . . . . . . . . . . 3 2 Symmetrical (secret-key) cryptosystems . . . . . . . . . . . . . . . . . 4 3 The one-time-pad as “classical teleportation” . . . . . . . . . . . . . . 5 C The example of the BB84 protocol . . . 5 1 Principle . . . . . . . . . . . . . . . 5 2 No cloning theorem . . . . . . . . . 6 3 Intercept-resend strategy . . . . . . 6 4 Error correction, privacy amplification and quantum secret growing . . 6 5 Advantage distillation . . . . . . . . 8 D Other protocols . . . . . . . . . . . . . 8 1 2-state protocol . . . . . . . . . . . 8 2 6-state protocol . . . . . . . . . . . 9 3 EPR protocol . . . . . . . . . . . . 9 4 Other variations . . . . . . . . . . . 10 E Quantum teleportation as “Quantum one-time-pad” . . . . . . . . . . . . . . 10 F Optical amplification, quantum nondemolition measurements and optimal quantum cloning . . . . . . . . . . . . . 10
منابع مشابه
ua nt - p h / 01 01 09 8 v 2 18 S ep 2 00 1 Quantum cryptography
II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical (public-key) cryptosystems . . . . . . . . . . . . . . . 3 2 Symmetrical (secret-key) cryptosystems . . . . . . . . . . . . . . . . . 4 3 The one-time-pad as “classical teleportation” . . . . . . . . . . . . . . 5 C The example of the BB84 protocol . . . 5 1 Principl...
متن کامل/ 01 09 01 0 v 1 3 S ep 2 00 1 Clifford algebras , noncommutative tori and universal quantum computers
Recently author suggested [23] an application of Clifford algebras for construction of a " compiler " for universal binary quantum computer together with later development [24] of the similar idea for a non-binary base. The non-binary case is related with application of some extension of idea of Clifford algebras. It is noncommutative torus defined by polynomial algebraic relations of order l. ...
متن کاملnt - p h / 01 01 09 8 v 2 1 8 Se p 20 01 Quantum cryptography
II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical (public-key) cryptosystems . . . . . . . . . . . . . . . 3 2 Symmetrical (secret-key) cryptosystems . . . . . . . . . . . . . . . . . 4 3 The one-time-pad as “classical teleportation” . . . . . . . . . . . . . . 5 C The example of the BB84 protocol . . . 5 1 Principl...
متن کاملar X iv : h ep - p h / 00 09 23 7 v 3 2 9 Ja n 20 01 “ Bottom - up ” thermalization in heavy ion collisions
We describe how thermalization occurs in heavy ion collisions in the framework of perturbative QCD. When the saturation scale Q s is large compared to Λ QCD , thermalization takes place during a time of order α −13/5 Q −1 s and the maximal temperature achieved is α 2/5 Q s .
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004