Kulik, S. P.; Shurupov, A. P., E-mail: Sergei.Kulik@gmail.com2007
AbstractAbstract
[en] A comparative analysis of quantum key distribution protocols using qubits and ququarts as information carriers is presented. Several schemes of incoherent attacks that can be used by an eavesdropper to obtain secret information are considered. The errors induced by the eavesdropper are analyzed for several key distribution protocols
Primary Subject
Source
Copyright (c) 2007 Nauka/Interperiodica; Article Copyright (c) 2007 Pleiades Publishing, Inc.; Country of input: International Atomic Energy Agency (IAEA)
Record Type
Journal Article
Journal
Journal of Experimental and Theoretical Physics; ISSN 1063-7761; ; CODEN JTPHES; v. 104(5); p. 736-742
Country of publication
Reference NumberReference Number
INIS VolumeINIS Volume
INIS IssueINIS Issue
External URLExternal URL
AbstractAbstract
[en] We present a complete methodology for testing the performances of quantum tomography protocols. The theory is validated by several numerical examples and by the comparison with experimental results achieved with various protocols for whole families of polarization states of qubits and ququarts including pure, mixed, entangled, and separable.
Primary Subject
Source
(c) 2011 American Institute of Physics; Country of input: International Atomic Energy Agency (IAEA)
Record Type
Journal Article
Journal
Country of publication
Reference NumberReference Number
INIS VolumeINIS Volume
INIS IssueINIS Issue
External URLExternal URL