4
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: not found

      Security of quantum key distribution using d-level systems.

      Read this article at

      ScienceOpenPublisherPubMed
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e., quantum states in a d-dimensional Hilbert space. The first cryptosystem uses two mutually unbiased bases (thereby extending the BB84 scheme), while the second exploits all d+1 available such bases (extending the six-state protocol for qubits). We derive the information gained by a potential eavesdropper applying a cloning-based individual attack, along with an upper bound on the error rate that ensures unconditional security against coherent attacks.

          Related collections

          Author and article information

          Journal
          Phys Rev Lett
          Physical review letters
          American Physical Society (APS)
          0031-9007
          0031-9007
          Mar 25 2002
          : 88
          : 12
          Affiliations
          [1 ] Ecole Polytechnique, CP 165, Université Libre de Bruxelles, 1050 Bruxelles, Belgium.
          Article
          10.1103/PhysRevLett.88.127902
          11909502
          4d3686aa-9a4f-4518-a742-ec71886985f1
          History

          Comments

          Comment on this article