41
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Security of quantum key distribution using d-level systems

      Preprint

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e. quantum states in a d-dimensional Hilbert space. The first cryptosystem uses two mutually unbiased bases (thereby extending the BB84 scheme), while the second exploits all the d+1 available such bases (extending the six-state protocol for qubits). We derive the information gained by a potential eavesdropper applying a cloning-based individual attack, along with an upper bound on the error rate that ensures unconditional security against coherent attacks.

          Related collections

          Most cited references 12

          • Record: found
          • Abstract: found
          • Article: found
          Is Open Access

          Simple Proof of Security of the BB84 Quantum Key Distribution Protocol

          We prove the security of the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution. We first give a key distribution protocol based on entanglement purification, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol. We then show that the security of this protocol implies the security of BB84. The entanglement-purification based protocol uses Calderbank-Shor-Steane (CSS) codes, and properties of these codes are used to remove the use of quantum computation from the Lo-Chau protocol.
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Unconditional security in quantum cryptography

              Bookmark
              • Record: found
              • Abstract: found
              • Article: found
              Is Open Access

              Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long Distances

               Hoi-Kwong Lo,  H. Chau (1998)
              Quantum key distribution is widely thought to offer unconditional security in communication between two users. Unfortunately, a widely accepted proof of its security in the presence of source, device and channel noises has been missing. This long-standing problem is solved here by showing that, given fault-tolerant quantum computers, quantum key distribution over an arbitrarily long distance of a realistic noisy channel can be made unconditionally secure. The proof is reduced from a noisy quantum scheme to a noiseless quantum scheme and then from a noiseless quantum scheme to a noiseless classical scheme, which can then be tackled by classical probability theory.
                Bookmark

                Author and article information

                Journal
                2001-07-26
                Article
                10.1103/PhysRevLett.88.127902
                quant-ph/0107130
                Custom metadata
                Phys. Rev. Lett. 88, 127902 (2002).
                4 pages RevTex
                quant-ph

                Quantum physics & Field theory

                Comments

                Comment on this article