Cryptography Reference
In-Depth Information
0.8
{2,3} access
structure
0.6
0.4
0.2
{1} adversary structure
0
0.4
0.6
0.8
1
g + g -
Figure 8.10
access structure as a function of the
product of the optical quadrature amplitude gains g + g . Dashed line: calculated the-
oretical curve with squeezing of
Experimental fidelity for the
{
2,3
}
4
.
5 dB, added noise of
+
3
.
5 dB, electronic noise
of
13 dB with respect to the quantum noise limit, and feedforward detector effi-
ciency of 0.93. Solid line and dotted lines: experimental fidelity for the adversary
structure and error bar. Gray area highlights the classical boundary for the access
structure.
T
protocol in Figure 8.11 illustrates that in
such a protocol the access structure performs far better than any adversary
structure.
and
V
points from that of the
{
2,3
}
8.6 Applications of Quantum State Sharing
Quantum state sharing has many possible applications in quantum informa-
tion science. We conclude this chapter with a discussion of some of those
applications.
8.6.1 Quantum Information Networks
One of the primary experimental goals of quantum information science is to
realize quantum networks analogous to the Internet. These quantum informa-
tion networks are expected to consist of atomic nodes where quantum states
are stored and processed, connected by optical channels. To date, research
into quantum information networks has, for the most part, been restricted
Search WWH ::




Custom Search