Quantum Informational Divergence in Quantum Channel Security Analysis

نویسندگان

  • Laszlo Gyongyosi
  • Sándor Imre
چکیده

1 Quantum Informational Divergence in Quantum Channel Security Analysis Laszlo Gyongyosi and Sandor Imre (Corresponding author: L. Gyongyosi) Department of Telecommunications, Budapest University of Technology Magyar tudosok krt. 2., Budapest, H-1117, Hungary (Email: [email protected]) (Received May 20, 2009; revised and accepted Mar. 24, 2010) Abstract Computational Geometry is the art of designing efficient algorithms for answering geometric questions. Computational Geometry involves efficient and elegant solutions for difficult algorithmic problems and plays a central role in many different areas of computer science. Quantum cloning-based attacks have deep relevance to quantum cryptography. In this paper we use the results of classical Computational Geometry to analyze the security of a quantum channel using current classical computer architectures. To analyze a quantum channel for a large number of input quantum states with classical computer architectures, very fast and effective algorithms are required.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Computational Geometric Analysis of Physically Allowed Quantum Cloning Transformations for Quantum Cryptography

The safety of quantum cryptography relies on the no-cloning theorem. In secret quantum communications, an eavesdropper cannot clone the sent qubits perfectly, however the best eavesdropping attacks for quantum cryptography are based on imperfect cloning machines. The eavesdropper’s physically allowed quantum evolutions on the sent qubit can be described in terms of the quantum state’s geometry....

متن کامل

Efficient Computational Information Geometric Analysis of Physically Allowed Quantum Cloning Attacks for Quantum Key Distribution Protocols

In secret quantum communications the best eavesdropping attacks on quantum cryptography are based on imperfect cloning machines. The incoherent attack, based on quantum cloning, is the most common eavesdropping strategy. Using a probe, the eavesdropper imperfectly clones the sender’s quantum state which keeps one copy and sends the other. The physically allowed transformations of Eve’s quantum ...

متن کامل

0 Fe b 20 07 Additivity of Entangled Channel Capacity for Quantum Input States

An elementary introduction into algebraic approach to unified quantum information theory and operational approach to quantum entan-glement as generalized encoding is given. After introducing compound quantum state and two types of informational divergences, namely, Araki-Umegaki (a-type) and of Belavkin-Staszewski (b-type) quantum relative entropic information, this paper treats two types of qu...

متن کامل

Decoherence effects on quantum Fisher information of multi-qubit W states

Quantum fisher information of a parameter characterizing the sensitivity of a state with respect to parameter changes. In this paper, we study the quantum fisher information of the W state for four, five, six and seven particles in decoherence channels, such as amplitude damping, phase damping and depolarizing channel. Using Krauss operators for decoherence channels components, we investigate t...

متن کامل

Information gain in quantum continual measurements

Inspired by works on information transmission through quantum channels, we propose the use of a couple of mutual entropies to quantify the efficiency of continual measurement schemes in extracting information on the measured quantum system. Properties of these measures of information are studied and bounds on them are derived. 1 Quantum measurements and entropies We speak of quantum continual m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 13  شماره 

صفحات  -

تاریخ انتشار 2011