Graphical calculus for quantum key distribution (extended abstract)

<p>Controlled complementary measurements are key to quantum key distribution protocols, among many other things. We axiomatize controlled complementary measurements within symmetric monoidal categories, which provides them with a corresponding graphical calculus. We study the BB84 and Ekert91...

Ausführliche Beschreibung

Bibliographische Detailangaben
Hauptverfasser: Coecke, B, Wang, Q, Wang, B, Wang, Y, Zhang, Q
Format: Journal article
Sprache:English
Veröffentlicht: 2011
Schlagworte:
_version_ 1826279049164488704
author Coecke, B
Wang, Q
Wang, B
Wang, Y
Zhang, Q
author_facet Coecke, B
Wang, Q
Wang, B
Wang, Y
Zhang, Q
author_sort Coecke, B
collection OXFORD
description <p>Controlled complementary measurements are key to quantum key distribution protocols, among many other things. We axiomatize controlled complementary measurements within symmetric monoidal categories, which provides them with a corresponding graphical calculus. We study the BB84 and Ekert91 protocols within this calculus, including the case where there is an intercept-resend attack.</p>
first_indexed 2024-03-06T23:53:01Z
format Journal article
id oxford-uuid:73432ce1-b67b-466c-b1f3-c116eb25c49c
institution University of Oxford
language English
last_indexed 2024-03-06T23:53:01Z
publishDate 2011
record_format dspace
spelling oxford-uuid:73432ce1-b67b-466c-b1f3-c116eb25c49c2022-03-26T19:55:15ZGraphical calculus for quantum key distribution (extended abstract)Journal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:73432ce1-b67b-466c-b1f3-c116eb25c49cComputingEnglishOxford University Research Archive - Valet2011Coecke, BWang, QWang, BWang, YZhang, Q<p>Controlled complementary measurements are key to quantum key distribution protocols, among many other things. We axiomatize controlled complementary measurements within symmetric monoidal categories, which provides them with a corresponding graphical calculus. We study the BB84 and Ekert91 protocols within this calculus, including the case where there is an intercept-resend attack.</p>
spellingShingle Computing
Coecke, B
Wang, Q
Wang, B
Wang, Y
Zhang, Q
Graphical calculus for quantum key distribution (extended abstract)
title Graphical calculus for quantum key distribution (extended abstract)
title_full Graphical calculus for quantum key distribution (extended abstract)
title_fullStr Graphical calculus for quantum key distribution (extended abstract)
title_full_unstemmed Graphical calculus for quantum key distribution (extended abstract)
title_short Graphical calculus for quantum key distribution (extended abstract)
title_sort graphical calculus for quantum key distribution extended abstract
topic Computing
work_keys_str_mv AT coeckeb graphicalcalculusforquantumkeydistributionextendedabstract
AT wangq graphicalcalculusforquantumkeydistributionextendedabstract
AT wangb graphicalcalculusforquantumkeydistributionextendedabstract
AT wangy graphicalcalculusforquantumkeydistributionextendedabstract
AT zhangq graphicalcalculusforquantumkeydistributionextendedabstract