|
| related topics |
| {key, protocol, security} |
| {alice, bob, state} |
| {states, state, optimal} |
| {information, entropy, channel} |
| {phase, path, phys} |
| {algorithm, log, probability} |
| {error, code, errors} |
|
Security of quantum key distribution using d-level systems
Nicolas J. Cerf, Mohamed Bourennane, Anders Karlsson, Nicolas Gisin
abstract: We consider two quantum cryptographic schemes relying on encoding the key
into qudits, i.e. quantum states in a d-dimensional Hilbert space. The first
cryptosystem uses two mutually unbiased bases (thereby extending the BB84
scheme), while the second exploits all the d+1 available such bases (extending
the six-state protocol for qubits). We derive the information gained by a
potential eavesdropper applying a cloning-based individual attack, along with
an upper bound on the error rate that ensures unconditional security against
coherent attacks.
- oai_identifier:
- oai:arXiv.org:quant-ph/0107130
- categories:
- quant-ph
- comments:
- 4 pages RevTex
- doi:
- 10.1103/PhysRevLett.88.127902
- arxiv_id:
- quant-ph/0107130
- journal_ref:
- Phys. Rev. Lett. 88, 127902 (2002).
- created:
- 2001-07-26
Full article ▸
|
|
| related documents |
| 0310168v2 |
| 0410215v2 |
| 0505108v1 |
| 0403036v5 |
| 0503192v4 |
| 0111073v2 |
| 9911043v5 |
| 0211153v5 |
| 0703099v5 |
| 0409099v2 |
| 0205060v3 |
| 0410017v2 |
| 0503002v1 |
| 9810067v3 |
| 0302196v1 |
| 0405111v2 |
| 0304035v1 |
| 0611145v1 |
| 0303184v1 |
| 0603234v1 |
| 0509211v1 |
| 0511163v2 |
| 0610096v2 |
| 0308044v2 |
| 0504150v2 |
|