Phase Co-variant Cloning: Difference between revisions

Line 80: Line 80:
==Further Information==
==Further Information==
The phase-covariant QCM has a remarkable application in quantum cryptography since it is used for some of the eavesdropping strategies on the [[BB84 Quantum Key Distribution|BB84 QKD]]. This is due to the fact that states which are being used as BB84 states, are equatorial states and these are the only states that the eavesdropper is interested in. Both protocols mentioned in [[Phase Variant Cloning#Pseudo Code|Pseudo Code]] can be used for this analysis.
The phase-covariant QCM has a remarkable application in quantum cryptography since it is used for some of the eavesdropping strategies on the [[BB84 Quantum Key Distribution|BB84 QKD]]. This is due to the fact that states which are being used as BB84 states, are equatorial states and these are the only states that the eavesdropper is interested in. Both protocols mentioned in [[Phase Variant Cloning#Pseudo Code|Pseudo Code]] can be used for this analysis.
<div style='text-align: right;'>''*contributed by Mina Doosti''</div>
<div style='text-align: right;'>''*edited by Shraddha Singh''</div>
Write, autoreview, editor, reviewer
3,129

edits