quantum cloning transformations for quantum cryptography



Computational geometric analysis of physically allowed quantum cloning transformations for quantum cryptography

FREE-DOWNLOADL Gyongyosi… – Proceedings of the 4th WSEAS international …, 2010 –
The safety of quantum cryptography relies on the no-cloning theorem. In secret quantum
communications, an eavesdropper cannot clone the sent qubits perfectly, however the best eavesdropping
attacks for quantum cryptography are based on imperfect cloning machines. The