搜索结果: 1-2 共查到“军事学 BB84 Protocol”相关记录2条 . 查询时间(0.056 秒)
Revisiting Symmetric Incoherent Optimal Eavesdropping in BB84 Protocol
Bias Advantage BB84 Protocol Key Distribution Optimal Eavesdropping Quantum Communication Quantum Cryptography Sequence
2012/3/22
The famous BB84 protocol relies on the conjugate bases $Z=\{|0\rangle$, $|1\rangle\}$ and $X=\left\{|+\rangle,|-\rangle\right\}$, where $|+\rangle = \frac{|0 \rangle + |1\rangle}{\sqrt{2}}$ and $|-\ra...
Revisiting Symmetric Incoherent Optimal Eavesdropping in BB84 Protocol
Bias Advantage BB8 Protocol Key Distribution Optimal Eavesdropping Quantum Communication Quantum Cryptography Sequence
2012/3/21
The famous BB84 protocol relies on the conjugate bases $Z=\{|0\rangle$, $|1\rangle\}$ and $X=\left\{|+\rangle,|-\rangle\right\}$, where $|+\rangle = \frac{|0 \rangle + |1\rangle}{\sqrt{2}}$ and $|-\ra...