State Dependent N-M Cloning: Difference between revisions

No edit summary
Line 46: Line 46:
==Further Information==
==Further Information==
One of the most important applications of quantum cloning is to analyze the security of [[Quantum Key Distribution]] (QKD) protocols. Usually, an eavesdropper is supposed in QKD protocols os assumed to be able to perform any attacks, including copying of states used by parties involved in the protocol. Special states which are being used in different QKD protocols will lead to different state-dependent cloners for analyzing cloning attacks.
One of the most important applications of quantum cloning is to analyze the security of [[Quantum Key Distribution]] (QKD) protocols. Usually, an eavesdropper is supposed in QKD protocols os assumed to be able to perform any attacks, including copying of states used by parties involved in the protocol. Special states which are being used in different QKD protocols will lead to different state-dependent cloners for analyzing cloning attacks.
<div style='text-align: right;'>''*contributed by Mina Doosti''</div>
<div style='text-align: right;'>''*edited by Shraddha Singh''</div>
Write, autoreview, editor, reviewer
3,125

edits