Quantum Teleportation: Difference between revisions

Line 20: Line 20:
* <math>I:</math> The identity operator
* <math>I:</math> The identity operator
*<math>X,Y,Z:</math> The [[Pauli Operators]]
*<math>X,Y,Z:</math> The [[Pauli Operators]]
==Properties==
* This protocol uses a public classical channel to transfer two bits of classical information.
* The teleportation protocol uses entanglement (or entangled EPR states) as a resource.
* The teleportation protocol is secure against cloning attacks, as a result of [[no-cloning theorem]] in quantum mechanics i.e. any of the involved states in the protocol cannot perfectly be copied. Also, any other interference will affect the shared state between the two parties and the attack will be discovered.
* The teleportation protocol is secure against entanglement attacks because of the [[monogomy of entanglement]] in quantum mechanics. It means that if an adversary tries to entangle her state with the shared EPR pair, the amount of the entanglement of the shared state between two parties will change and the attacker will be discovered.
* The size of the classical information sent by the Sender to the Receiver is infinitely smaller than the information required to give a classical description of the teleported quantum state.
Write, autoreview, editor, reviewer
3,129

edits