Based on quantum physical phenomena, quantum information theory has a potential which goes beyond the classical conditions. Equipped with the resource of complementary information as an intrinsic property it offers many new perspectives. The field of quantum key distribution, which enables the ability to implement unconditional security, profits directly from this resource. To measure the state of quantum systems itself for different purposes in quantum information theory, which may be related to the construction of a quantum computer, as well as to realize quantum key distribution schemes, a certain set of bases is necessary. A type of set which is minimal is given by a complete set of mutually unbiased bases. The construction of these set...
Coding, transmission and recovery of quantum states with high security and efficiency, and with as l...
States with private correlations but little or no distillable entanglement were recently reported. H...
UnrestrictedIn this thesis, we mainly investigate four different topics: efficiently implementable c...
Based on quantum physical phenomena, quantum information theory has a potential which goes beyond th...
The problem of security of quantum key protocols is examined. In addition to the distribution of cla...
"The basic methods of constructing the sets of mutually unbiased bases in the Hilbert space of an ar...
20 pages, 1 figure to appear in Foundations of Physics, Nov. 2006 two more references addedInternati...
Quantum cryptography makes use of the quantum-mechanical behavior of nature for the design and analy...
Quantum information theory is a modern branch of theoretical physics. One of its main goals is to in...
We present security proofs for a protocol for Quantum Key Distribution (QKD) based on encoding in fi...
International audienceThe aim of the present paper is twofold. First, to give the main ideas behind ...
6 pages in relation to ICSSUR'05 conference held in Besançon, May 2-6 (2005).Coding, transmission an...
For the complete estimation of arbitrary unknown quantum states by measurements, the use of mutually...
Mutually unbiased bases that can be cyclically generated by a single unitary operator are of special...
The aim of the present paper is twofold. First, to give the main ideas behind quantum computing and ...
Coding, transmission and recovery of quantum states with high security and efficiency, and with as l...
States with private correlations but little or no distillable entanglement were recently reported. H...
UnrestrictedIn this thesis, we mainly investigate four different topics: efficiently implementable c...
Based on quantum physical phenomena, quantum information theory has a potential which goes beyond th...
The problem of security of quantum key protocols is examined. In addition to the distribution of cla...
"The basic methods of constructing the sets of mutually unbiased bases in the Hilbert space of an ar...
20 pages, 1 figure to appear in Foundations of Physics, Nov. 2006 two more references addedInternati...
Quantum cryptography makes use of the quantum-mechanical behavior of nature for the design and analy...
Quantum information theory is a modern branch of theoretical physics. One of its main goals is to in...
We present security proofs for a protocol for Quantum Key Distribution (QKD) based on encoding in fi...
International audienceThe aim of the present paper is twofold. First, to give the main ideas behind ...
6 pages in relation to ICSSUR'05 conference held in Besançon, May 2-6 (2005).Coding, transmission an...
For the complete estimation of arbitrary unknown quantum states by measurements, the use of mutually...
Mutually unbiased bases that can be cyclically generated by a single unitary operator are of special...
The aim of the present paper is twofold. First, to give the main ideas behind quantum computing and ...
Coding, transmission and recovery of quantum states with high security and efficiency, and with as l...
States with private correlations but little or no distillable entanglement were recently reported. H...
UnrestrictedIn this thesis, we mainly investigate four different topics: efficiently implementable c...