The Coordinate Ratios as a Tool to Analyze the Intrusion Based on Bužek-hillery Quantum Copying Machine
نویسندگان
چکیده
The intrusion based on Bužek-Hillery universal quantum copying machine (UQCM) is investigated. A major problem to the eavesdropper Eve is how to choose the intrusion parameters required by the copying machine in order to take out the maximum of information on the transmitted qubits while making her intrusion as discrete as possible. The present paper attempts to investigate the equatorial and isotropic cloning by means of coordinate ratios. The degree of intrusion is evaluated by means of the ratios of the receiver (Bob) coordinates and the eavesdropper (Eve) coordinates to the sender (Alice) coordinates in the Bloch sphere. The fidelity has been usually used as a criterion to analyze the intrusion. More especially, this fidelity can achieve the value 0.85 for equatorial qubits by using Bužek-Hillery 1→2 machine. Our goal is to study the behavior of these ratios as a function of the intrusion parameters. As has been found, the coordinate ratios of both the receiver and the eavesdropper achieve an optimal value higher than 2/3, in contrast to the isotropic cloning. This can favor the eavesdropping when using equatorial qubits. For isotropic cloning, the maximal intrusion is reached when the coordinate ratios are equal. The optimal values of the intrusion parameters are then evaluated.
منابع مشابه
A quantum-copying machine for equatorial qubits
Bužek and Hillery proposed a universal quantum-copying machine (UQCM) (i.e., transformation) to analyze the possibility of cloning arbitrary states. The UQCM copies quantum-mechanical states with the quality of its output does not depend on the input. We propose a slightly different transformation to analyze a restricted set of input states. We impose the conditions (I) the density matrices of ...
متن کاملQuantum copying: Beyond the no-cloning theorem.
We analyze a possibility of copying (≡ cloning) of arbitrary states of quantum-mechanical spin1/2 system. We show that there exists a “universal quantum-copying machine” (i.e. transformation) which approximately copies quantum-mechanical states such that the quality of its output does not depend on the input. We also examine a machine which combines a unitary transformation and a selective meas...
متن کاملA Hybrid Machine Learning Method for Intrusion Detection
Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...
متن کاملUniversal Optimal Cloning of Qubits and Quantum Registers
We review our recent work on the universal (i.e. input state independent) optimal quantum copying (cloning) of qubits. We present unitary transformations which describe the optimal cloning of a qubit, and we present the corresponding quantum logic network. We also present a network for an optimal quantum copying “machine” (transformation) which produces N +1 identical copies from the original q...
متن کاملP65: Speech Recognition Based on Bbrain Signals by the Quantum Support Vector Machine for Inflammatory Patient ALS
People communicate with each other by exchanging verbal and visual expressions. However, paralyzed patients with various neurological diseases such as amyotrophic lateral sclerosis and cerebral ischemia have difficulties in daily communications because they cannot control their body voluntarily. In this context, brain-computer interface (BCI) has been studied as a tool of communication for thes...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012