|
related topics |
{key, protocol, security} |
{alice, bob, state} |
{states, state, optimal} |
{information, entropy, channel} |
{phase, path, phys} |
{algorithm, log, probability} |
{error, code, errors} |
|
Security of quantum key distribution using d-level systems
Nicolas J. Cerf, Mohamed Bourennane, Anders Karlsson, Nicolas Gisin
abstract: We consider two quantum cryptographic schemes relying on encoding the key
into qudits, i.e. quantum states in a d-dimensional Hilbert space. The first
cryptosystem uses two mutually unbiased bases (thereby extending the BB84
scheme), while the second exploits all the d+1 available such bases (extending
the six-state protocol for qubits). We derive the information gained by a
potential eavesdropper applying a cloning-based individual attack, along with
an upper bound on the error rate that ensures unconditional security against
coherent attacks.
- oai_identifier:
- oai:arXiv.org:quant-ph/0107130
- categories:
- quant-ph
- comments:
- 4 pages RevTex
- doi:
- 10.1103/PhysRevLett.88.127902
- arxiv_id:
- quant-ph/0107130
- journal_ref:
- Phys. Rev. Lett. 88, 127902 (2002).
- created:
- 2001-07-26
Full article ▸
|
|
related documents |
0310168v2 |
0410215v2 |
0505108v1 |
0403036v5 |
0503192v4 |
0111073v2 |
9911043v5 |
0211153v5 |
0703099v5 |
0409099v2 |
0205060v3 |
0410017v2 |
0503002v1 |
9810067v3 |
0302196v1 |
0405111v2 |
0304035v1 |
0611145v1 |
0303184v1 |
0603234v1 |
0509211v1 |
0511163v2 |
0610096v2 |
0308044v2 |
0504150v2 |
|