Thursday, 25 February 2010

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON COMMUNICATIONS
Transactions ID Number: 89-430
Full Name: Laszlo Gyongyosi
Position: Ph.D. Candidate
Age: ON
Sex: Male
Address: Budapest, XI. Magyar tudosok korutja 2. Room: I.B.113.
Country: HUNGARY
Tel:
Tel prefix:
Fax:
E-mail address: laszlo.gyongyosi@gmail.com
Other E-mails: gyongyosi@hit.bme.hu
Title of the Paper: Efficient Computational Information Geometric Analysis of Physically Allowed Quantum Cloning Attacks for Quantum Key Distribution Protocols
Authors as they appear in the Paper: Laszlo Gyongyosi, Sandor Imre
Email addresses of all the authors: gyongyosi.laszlo@gmail.com
Number of paper pages: 20
Abstract: In secret quantum communications the best eavesdropping attacks on quantum cryptography are based on imperfect cloning machines. The incoherent attack, based on quantum cloning, is the most common eavesdropping strategy. Using a probe, the eavesdropper imperfectly clones the sender’s quantum state which keeps one copy and sends the other. The physically allowed transformations of Eve’s quantum cloner on Bob’s qubit can be described in terms of Completely Positive (CP), trace preserving maps. The map of the quantum cloner compresses the Bloch-ball, as an affine map. This affine map has to be a complete positive, trace preserving map, which shrinks the Bloch ball. The effects of a quantum cloner can be given in tetrahedron representation. In this paper we show a new, quantum information theoretical representation of eavesdropping detection, focused on the Four-state (BB84) and Six-state quantum cryptography protocols. We use a fundamentally new computational g!
eometrical method to analyze the informational theoretical impacts of cloning activity on the quantum channel. The proposed algorithm uses Delaunay tessellation and convex hull calculation on the Bloch sphere, with respect to quantum relative entropy as distance measure. The improved core-set approach can be used to analyze efficiently the informational theoretical impacts of physically allowed quantum cloning attacks.
Keywords: Quantum Cryptography, Quantum Cloning, Quantum Informational Distance
EXTENSION of the file: .pdf
Special (Invited) Session: Computational Geometric Analysis of Physically Allowed Quantum Cloning Transformations for Quantum Cryptography, pp.121-126
Organizer of the Session: 629-216, BEST PAPER AWARD for the 4th WSEAS International Conference on COMPUTER ENGINEERING and APPLICATIONS (CEA'10), Harvard University, Cambridge
How Did you learn about congress:
IP ADDRESS: 89.134.19.157