Security bound of two-basis quantum-key-distribution protocols using qudits
Journal Article
·
· Physical Review. A
- Institut fuer Angewandte Physik, Technische Universitaet Darmstadt, 64289 Darmstadt (Germany)
We investigate the security bounds of quantum-cryptographic protocols using d-level systems. In particular, we focus on schemes that use two mutually unbiased bases, thus extending the Bennett-Brassard 1984 quantum-key-distribution scheme to higher dimensions. Under the assumption of general coherent attacks, we derive an analytic expression for the ultimate upper security bound of such quantum-cryptography schemes. This bound is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions such an equivalence is generally no longer valid.
- OSTI ID:
- 20718506
- Journal Information:
- Physical Review. A, Journal Name: Physical Review. A Journal Issue: 3 Vol. 72; ISSN 1050-2947; ISSN PLRAAN
- Country of Publication:
- United States
- Language:
- English
Similar Records
Error tolerance of two-basis quantum-key-distribution protocols using qudits and two-way classical communication
Information-theoretic security proof for quantum-key-distribution protocols
Robustness of a quantum key distribution with two and three mutually unbiased bases
Journal Article
·
Tue Mar 14 23:00:00 EST 2006
· Physical Review. A
·
OSTI ID:20786874
Information-theoretic security proof for quantum-key-distribution protocols
Journal Article
·
Fri Jul 15 00:00:00 EDT 2005
· Physical Review. A
·
OSTI ID:20718340
Robustness of a quantum key distribution with two and three mutually unbiased bases
Journal Article
·
Thu Sep 15 00:00:00 EDT 2005
· Physical Review. A
·
OSTI ID:20718526