Graphical calculus for quantum key distribution (extended abstract)
<p>Controlled complementary measurements are key to quantum key distribution protocols, among many other things. We axiomatize controlled complementary measurements within symmetric monoidal categories, which provides them with a corresponding graphical calculus. We study the BB84 and Ekert91...
Hauptverfasser: | , , , , |
---|---|
Format: | Journal article |
Sprache: | English |
Veröffentlicht: |
2011
|
Schlagworte: |
_version_ | 1826279049164488704 |
---|---|
author | Coecke, B Wang, Q Wang, B Wang, Y Zhang, Q |
author_facet | Coecke, B Wang, Q Wang, B Wang, Y Zhang, Q |
author_sort | Coecke, B |
collection | OXFORD |
description | <p>Controlled complementary measurements are key to quantum key distribution protocols, among many other things. We axiomatize controlled complementary measurements within symmetric monoidal categories, which provides them with a corresponding graphical calculus. We study the BB84 and Ekert91 protocols within this calculus, including the case where there is an intercept-resend attack.</p> |
first_indexed | 2024-03-06T23:53:01Z |
format | Journal article |
id | oxford-uuid:73432ce1-b67b-466c-b1f3-c116eb25c49c |
institution | University of Oxford |
language | English |
last_indexed | 2024-03-06T23:53:01Z |
publishDate | 2011 |
record_format | dspace |
spelling | oxford-uuid:73432ce1-b67b-466c-b1f3-c116eb25c49c2022-03-26T19:55:15ZGraphical calculus for quantum key distribution (extended abstract)Journal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:73432ce1-b67b-466c-b1f3-c116eb25c49cComputingEnglishOxford University Research Archive - Valet2011Coecke, BWang, QWang, BWang, YZhang, Q<p>Controlled complementary measurements are key to quantum key distribution protocols, among many other things. We axiomatize controlled complementary measurements within symmetric monoidal categories, which provides them with a corresponding graphical calculus. We study the BB84 and Ekert91 protocols within this calculus, including the case where there is an intercept-resend attack.</p> |
spellingShingle | Computing Coecke, B Wang, Q Wang, B Wang, Y Zhang, Q Graphical calculus for quantum key distribution (extended abstract) |
title | Graphical calculus for quantum key distribution (extended abstract) |
title_full | Graphical calculus for quantum key distribution (extended abstract) |
title_fullStr | Graphical calculus for quantum key distribution (extended abstract) |
title_full_unstemmed | Graphical calculus for quantum key distribution (extended abstract) |
title_short | Graphical calculus for quantum key distribution (extended abstract) |
title_sort | graphical calculus for quantum key distribution extended abstract |
topic | Computing |
work_keys_str_mv | AT coeckeb graphicalcalculusforquantumkeydistributionextendedabstract AT wangq graphicalcalculusforquantumkeydistributionextendedabstract AT wangb graphicalcalculusforquantumkeydistributionextendedabstract AT wangy graphicalcalculusforquantumkeydistributionextendedabstract AT zhangq graphicalcalculusforquantumkeydistributionextendedabstract |