Security bound of two-bases quantum key-distribution protocols using qudits

Physics – Quantum Physics

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

12 pages, 2 figures, to appear in Phys. Rev. A

Scientific paper

10.1103/PhysRevA.72.032320

We investigate the security bounds of quantum cryptographic protocols using $d$-level systems. In particular, we focus on schemes that use two mutually unbiased bases, thus extending the BB84 quantum key distribution scheme to higher dimensions. Under the assumption of general coherent attacks, we derive an analytic expression for the ultimate upper security bound of such quantum cryptography schemes. This bound is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions such an equivalence is generally no longer valid.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Security bound of two-bases quantum key-distribution protocols using qudits does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Security bound of two-bases quantum key-distribution protocols using qudits, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security bound of two-bases quantum key-distribution protocols using qudits will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-706944

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.