Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Security bound of two-basis quantum-key-distribution protocols using qudits

Journal Article · · Physical Review. A
;  [1]
  1. Institut fuer Angewandte Physik, Technische Universitaet Darmstadt, 64289 Darmstadt (Germany)
We investigate the security bounds of quantum-cryptographic protocols using d-level systems. In particular, we focus on schemes that use two mutually unbiased bases, thus extending the Bennett-Brassard 1984 quantum-key-distribution scheme to higher dimensions. Under the assumption of general coherent attacks, we derive an analytic expression for the ultimate upper security bound of such quantum-cryptography schemes. This bound is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions such an equivalence is generally no longer valid.
OSTI ID:
20718506
Journal Information:
Physical Review. A, Journal Name: Physical Review. A Journal Issue: 3 Vol. 72; ISSN 1050-2947; ISSN PLRAAN
Country of Publication:
United States
Language:
English

Similar Records

Error tolerance of two-basis quantum-key-distribution protocols using qudits and two-way classical communication
Journal Article · Tue Mar 14 23:00:00 EST 2006 · Physical Review. A · OSTI ID:20786874

Information-theoretic security proof for quantum-key-distribution protocols
Journal Article · Fri Jul 15 00:00:00 EDT 2005 · Physical Review. A · OSTI ID:20718340

Robustness of a quantum key distribution with two and three mutually unbiased bases
Journal Article · Thu Sep 15 00:00:00 EDT 2005 · Physical Review. A · OSTI ID:20718526