Quantum key distribution via quantum encryption
Citations
833 citations
347 citations
228 citations
192 citations
191 citations
Cites background or result from "Quantum key distribution via quantu..."
...consecutive qudits, when the same Bell and Cat states are re-used. To compare our results with those of [4], it is enough to set all the original labels ui,vi,v′i = 0. It is then easy to see from fig. (5) that our results completely match the tables presented in that article. 8 5 Discussion We have provided closed formulas for entanglement swapping of d-level cat states and Bell states. We have then u...
[...]
...after all our additions are defined mod d. Note that Rd = I, compared to NOT2 = I. For any unitary operator U, the controlled operator Uc is naturally generalized as follows: Uc(|ii ⊗|ji) = |ii ⊗Ui|ji (5) Here the first and the second qudits are respectively the controller and the target qudits. In particular the controlled shift gates which play the role of CNOT gate, act as follows: Rc|i,ji = |i,j +i...
[...]