2013
DOI: 10.1007/s10946-013-9326-y
|View full text |Cite
|
Sign up to set email alerts
|

Transmissions of quantum entangled states in anisotropic depolarizing channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…On the other hand, the effect of several cloning attack within a two-dimensional protocol was also investigated in [31], where the quantum key distribution of the well-known BB84 protocol with several eavesdropping cloning attacks was studied and the mutual information between honest parties and information for each eavesdropper was derived to show that the cloning attack's quantum error is lower than the intercept-resend attack's error. This means that the cloning attack is the optimum one for an arbitrary number of eavesdroppers.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, the effect of several cloning attack within a two-dimensional protocol was also investigated in [31], where the quantum key distribution of the well-known BB84 protocol with several eavesdropping cloning attacks was studied and the mutual information between honest parties and information for each eavesdropper was derived to show that the cloning attack's quantum error is lower than the intercept-resend attack's error. This means that the cloning attack is the optimum one for an arbitrary number of eavesdroppers.…”
Section: Discussionmentioning
confidence: 99%
“…This means that the cloning attack is the optimum one for an arbitrary number of eavesdroppers. Based on [30,31], we believe that it will be interesting to study the effect of several cloning attacks of cryptographic scheme based on encoding in d-dimensional Hilbert space where the sender uses M mutually unbiased bases to encrypt the data sent. This issue is under study and we hope to report on it in a forthcoming work.…”
Section: Discussionmentioning
confidence: 99%
“…It produces a decoherence phenomenon destroying the initial entanglement of the pair of photons AS. To model the atmosphere action, we use a generalized depolarizing quantum channel N defined by [24][25][26][27]:…”
Section: Propagation Modelmentioning
confidence: 99%
“…The cloning of sequences of qubits encoded in the same basis has been studied with the six-state BB84 protocols [6]. In a previous work, we have studied the quantum key distribution with several intercept and resend attacks [7] and several cloning attacks [8] but without taking into consideration the depolarization channel. In the case of one eavesdropper, the effect of the depolarizing channel with some conditions can stop the BB84 protocol [9].…”
Section: Introductionmentioning
confidence: 99%