0107130v1

related topics
{key, protocol, security}
{alice, bob, state}
{states, state, optimal}
{information, entropy, channel}
{phase, path, phys}
{algorithm, log, probability}
{error, code, errors}

Security of quantum key distribution using d-level systems

Nicolas J. Cerf, Mohamed Bourennane, Anders Karlsson, Nicolas Gisin

abstract: We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e. quantum states in a d-dimensional Hilbert space. The first cryptosystem uses two mutually unbiased bases (thereby extending the BB84 scheme), while the second exploits all the d+1 available such bases (extending the six-state protocol for qubits). We derive the information gained by a potential eavesdropper applying a cloning-based individual attack, along with an upper bound on the error rate that ensures unconditional security against coherent attacks.

oai_identifier:
oai:arXiv.org:quant-ph/0107130
categories:
quant-ph
comments:
4 pages RevTex
doi:
10.1103/PhysRevLett.88.127902
arxiv_id:
quant-ph/0107130
journal_ref:
Phys. Rev. Lett. 88, 127902 (2002).
created:
2001-07-26

Full article ▸

related documents
0310168v2
0410215v2
0505108v1
0403036v5
0503192v4
0111073v2
9911043v5
0211153v5
0703099v5
0409099v2
0205060v3
0410017v2
0503002v1
9810067v3
0302196v1
0405111v2
0304035v1
0611145v1
0303184v1
0603234v1
0509211v1
0511163v2
0610096v2
0308044v2
0504150v2