scientific article; zbMATH DE number 3497764
From MaRDI portal
Publication:4079482
zbMath0317.94003MaRDI QIDQ4079482
Publication date: 1973
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (71)
Sufficient subalgebras and the relative entropy of states of a von Neumann algebra ⋮ Quantum hashing for finite abelian groups ⋮ On quantum \((\delta,\varepsilon)\)-resistant hashing ⋮ Quantum Speedup for Graph Sparsification, Cut Approximation, and Laplacian Solving ⋮ Estimates for discontinuity jumps of information characteristics of quantum systems and channels ⋮ Quantum Hashing and Fingerprinting for Quantum Cryptography and Computations ⋮ Quantum information and the PCP theorem ⋮ Unconditionally secure quantum signatures ⋮ Shannon’s information theory 70 years on: applications in classical and quantum physics ⋮ Binary quantum hashing ⋮ Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system ⋮ Note on transmitted complexity for quantum dynamical systems ⋮ Aspects of generic entanglement ⋮ Interferometric visibility and coherence ⋮ Secret sharing based on quantum Fourier transform ⋮ Information capacity of a quantum observable ⋮ Optimal dense coding and quantum phase transition in Ising-XXZ diamond chain ⋮ Quantum entanglement and the communication complexity of the inner product function ⋮ On the extension of a family of projections to a positive operator-valued measure ⋮ Cryptographic properties of the quantum hashing based on expander graphs ⋮ Simple analysis of security of the BB84 quantum key distribution protocol ⋮ Causation, information, and physics ⋮ Upper bounds for the Holevo information quantity and their use ⋮ On the energy-constrained diamond norm and its application in quantum information theory ⋮ Mathematical issues in the inference of causal interactions among multichannel neural signals ⋮ Relative entropy between quantum ensembles ⋮ Recoverability of quantum channels via hypothesis testing ⋮ Genuine secret-sharing states ⋮ A novel three-party quantum secret sharing scheme based on Bell state sequential measurements with application in quantum image sharing ⋮ Security analysis of measurement-device-independent quantum secure direct communication ⋮ Continuous-variable \((3, 3)\)-threshold quantum secret sharing based on one-sided device-independent security ⋮ On the structure of optimal sets for a quantum channel ⋮ Identification of network topology changes based on \(r\)-power adjacency matrix entropy ⋮ Quantum information theory in infinite dimensions with application to optical channels ⋮ Classical and Quantum Computations with Restricted Memory ⋮ The role of bounded memory in the foundations of quantum mechanics ⋮ Quantifying the information distribution of quantum information masking ⋮ Quantum mutual entropy defined by liftings ⋮ How quantum is a quantum ensemble? ⋮ Is Hilbert space discrete? ⋮ Distinguishing quantum states with Holevo bound and its application to spatially separated Bell states ⋮ The apex of the family tree of protocols: optimal rates and resource inequalities ⋮ Quantum algorithm for SAT problem andquantum mutual entropy ⋮ Quantum discord of ensemble of quantum states ⋮ On the distinguishability of random quantum states ⋮ Usefulness of decoherence in quantum-walk-based hash function ⋮ On Complexity for Open System Dynamics ⋮ Efficient branching programs for quantum hash functions generated by small-biased sets ⋮ Quantum finite automata: advances on Bertoni's ideas ⋮ Microstate distinguishability, quantum complexity, and the eigenstate thermalization hypothesis ⋮ Information between quantum systems via POVMs ⋮ Quantum Kolmogorov complexity ⋮ Entropic Heisenberg limits and uncertainty relations from the Holevo information bound ⋮ Capacity estimates via comparison with TRO channels ⋮ From Wigner-Yanase-Dyson conjecture to Carlen-Frank-Lieb conjecture ⋮ New bounds on classical and quantum one-way communication complexity ⋮ Noisy Interactive Quantum Communication ⋮ Conditional entropy and information in quantum systems ⋮ Barycentric decomposition of quantum measurements in finite dimensions ⋮ Holevo information and ensemble theory of gravity ⋮ Optimal bounds for parity-oblivious random access codes ⋮ On lower semicontinuity of the entropic disturbance and its applications in quantum information theory ⋮ Quantum privacy and quantum wiretap channels ⋮ Two-way finite automata with quantum and classical states. ⋮ Quantum communication and complexity. ⋮ On the impossibility of interaction-free quantum sensing for small I/O bandwidth ⋮ Reversibility conditions for quantum channels and their applications ⋮ Instantiation of quantum point obfuscation ⋮ A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice? ⋮ Controlled secure direct quantum communication inspired scheme for quantum identity authentication ⋮ An analysis of completely-positive trace-preserving maps on \({\mathcal M}_{2}\)
This page was built for publication: