Physics – Quantum Physics
Scientific paper
2005-07-22
Phys. Rev. A 72, 032320 (2005)
Physics
Quantum Physics
12 pages, 2 figures, to appear in Phys. Rev. A
Scientific paper
10.1103/PhysRevA.72.032320
We investigate the security bounds of quantum cryptographic protocols using $d$-level systems. In particular, we focus on schemes that use two mutually unbiased bases, thus extending the BB84 quantum key distribution scheme to higher dimensions. Under the assumption of general coherent attacks, we derive an analytic expression for the ultimate upper security bound of such quantum cryptography schemes. This bound is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions such an equivalence is generally no longer valid.
Alber Gernot
Nikolopoulos Georgios M.
No associations
LandOfFree
Security bound of two-bases quantum key-distribution protocols using qudits does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Security bound of two-bases quantum key-distribution protocols using qudits, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security bound of two-bases quantum key-distribution protocols using qudits will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-706944