70
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Security of Quantum Key Distribution Using\(\mathit{d}\)-Level Systems

      Physical review letters
      American Physical Society (APS)

      Read this article at

          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references12

          • Record: found
          • Abstract: found
          • Article: found
          Is Open Access

          Simple Proof of Security of the BB84 Quantum Key Distribution Protocol

          We prove the security of the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution. We first give a key distribution protocol based on entanglement purification, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol. We then show that the security of this protocol implies the security of BB84. The entanglement-purification based protocol uses Calderbank-Shor-Steane (CSS) codes, and properties of these codes are used to remove the use of quantum computation from the Lo-Chau protocol.
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Unconditional security in quantum cryptography

              Bookmark
              • Record: found
              • Abstract: found
              • Article: found
              Is Open Access

              Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long Distances

              Quantum key distribution is widely thought to offer unconditional security in communication between two users. Unfortunately, a widely accepted proof of its security in the presence of source, device and channel noises has been missing. This long-standing problem is solved here by showing that, given fault-tolerant quantum computers, quantum key distribution over an arbitrarily long distance of a realistic noisy channel can be made unconditionally secure. The proof is reduced from a noisy quantum scheme to a noiseless quantum scheme and then from a noiseless quantum scheme to a noiseless classical scheme, which can then be tackled by classical probability theory.
                Bookmark

                Author and article information

                Journal
                10.1103/PhysRevLett.88.127902
                http://link.aps.org/licenses/aps-default-license

                Comments

                Comment on this article