Write, autoreview, editor, reviewer
3,129
edits
m (Shraddha moved page Phase Variant Cloning to Phase Co-variant Cloning) |
|||
Line 80: | Line 80: | ||
==Further Information== | ==Further Information== | ||
The phase-covariant QCM has a remarkable application in quantum cryptography since it is used for some of the eavesdropping strategies on the [[BB84 Quantum Key Distribution|BB84 QKD]]. This is due to the fact that states which are being used as BB84 states, are equatorial states and these are the only states that the eavesdropper is interested in. Both protocols mentioned in [[Phase Variant Cloning#Pseudo Code|Pseudo Code]] can be used for this analysis. | The phase-covariant QCM has a remarkable application in quantum cryptography since it is used for some of the eavesdropping strategies on the [[BB84 Quantum Key Distribution|BB84 QKD]]. This is due to the fact that states which are being used as BB84 states, are equatorial states and these are the only states that the eavesdropper is interested in. Both protocols mentioned in [[Phase Variant Cloning#Pseudo Code|Pseudo Code]] can be used for this analysis. | ||
<div style='text-align: right;'>''*contributed by Mina Doosti''</div> | |||
<div style='text-align: right;'>''*edited by Shraddha Singh''</div> |