Security bounds in Quantum Cryptography using d-level systems

Physics – Quantum Physics

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

18 pages, 1 figure. Published version

Scientific paper

We analyze the security of quantum cryptography schemes for $d$-level systems using 2 or $d+1$ maximally conjugated bases, under individual eavesdropping attacks based on cloning machines and measurement after the basis reconciliation. We consider classical advantage distillation protocols, that allow to extract a key even in situations where the mutual information between the honest parties is smaller than the eavesdropper's information. In this scenario, advantage distillation protocols are shown to be as powerful as quantum distillation: key distillation is possible using classical techniques if and only if the corresponding state in the entanglement based protocol is distillable.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Security bounds in Quantum Cryptography using d-level systems does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Security bounds in Quantum Cryptography using d-level systems, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security bounds in Quantum Cryptography using d-level systems will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-493938

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.