Superdense coding: Difference between revisions

Content deleted Content added
"Carol" changed into "Eve" Name Eve is commonly used for eavesdropping schemes in quantum computing.
Line 15:
</math>
 
isare distributed to Alice and Bob. The first subsystem, denoted by subscript ''A'', belongs to Alice and the second, ''B'', system to Bob. By only manipulating her particle locally, Alice can transform the composite system into any one of the Bell states (this is not so surprising, since entanglement can not be broken using local operations):
 
* Obviously, if Alice does nothing, the system remains in the state <math>|\Psi^+\rangle</math>.