The Physics of Quantum Information: Quantum Cryptography, by D. Bouwmeester, A. Zeilinger (auth.), Dr. Dirk Bouwmeester,

By D. Bouwmeester, A. Zeilinger (auth.), Dr. Dirk Bouwmeester, Prof. Artur Ekert, Prof. Anton Zeilinger (eds.)

Leading specialists from The Physics of Quantum info community, a eu fee initiative, collect the newest effects from the rising region of quantum know-how. Written in a constant type, the e-book introduces quantum cryptography, quantum teleportation, and quantum computation, contemplating either idea and the most recent experiments. hence scientists operating within the box and complicated scholars will locate it to be a wealthy resource of data in this interesting new area.

Show description

Read Online or Download The Physics of Quantum Information: Quantum Cryptography, Quantum Teleportation, Quantum Computation PDF

Best physics books

Physico-Chemistry of Solid-Gas Interfaces

Basic basic proof and theoretical instruments for the translation and version improvement of solid-gas interactions are first offered during this paintings. Chemical, actual and electrochemical facets are offered from a phenomenological, thermodynamic and kinetic standpoint. The theoretical facets of electric homes at the floor of a superb also are lined to supply higher accessibility for people with a physico-chemical heritage.

Problems for Physics Students: With Hints and Answers

This booklet is a suite of a few four hundred physics difficulties, with tricks on their strategies, and solutions. The physics lined encompasses all parts experiences via final-year (advanced point) scholars in faculties and excessive faculties. the writer has targeting featuring attention-grabbing (and to some degree strange) difficulties that are solved utilizing the actual rules usually taught in complex college classes.

Extra info for The Physics of Quantum Information: Quantum Cryptography, Quantum Teleportation, Quantum Computation

Sample text

In some cases, a cunning Eve may interfere in the Alice-Bob communication channel by cutting it in two and impersonating Alice to Bob and vice-versa. Under this condition, she can, for example, generate two pairs of publicprivate keys and give one public key to Alice and one to Bob informing Alice that she has been given Bob's public key and informing Bob that he now has Alice's public key. Eve keeps the corresponding private keys and from now on any subsequent communication between Alice and Bob would be under her complete control.

The scheme proposed by C. Bennett [45], used only two phases for Alice. We refer the reader to the original article for a detailed explanation. The main advantage of this type of systems is that, in principle, it does not require polarisation control. In practice, however, due to some polarisation dependence in the components, it seems preferable to control the polarisation. Moreover, these schemes still need careful path length adjustment and control between the two sides of the interferometer.

There exists, however, a threshold and if too much information has leaked to an eavesdropper no further privacy amplification is possible and the transmission should be discarded. The need for more precise security criteria was originally emphasised by Huttner and Ekert [40]; since then quantum eavesdropping has evolved into a field of its own. If the quantum transmission over noisy channels is based on distributing entangled particles, then the quantum privacy amplification specifies the criteria of security, taking into account the most general attack an eavesdropper can mount.

Download PDF sample

Rated 4.61 of 5 – based on 36 votes