skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: On quantum key distribution using ququarts

Abstract

A comparative analysis of quantum key distribution protocols using qubits and ququarts as information carriers is presented. Several schemes of incoherent attacks that can be used by an eavesdropper to obtain secret information are considered. The errors induced by the eavesdropper are analyzed for several key distribution protocols.

Authors:
;  [1]
  1. Moscow State University (Russian Federation)
Publication Date:
OSTI Identifier:
21072480
Resource Type:
Journal Article
Resource Relation:
Journal Name: Journal of Experimental and Theoretical Physics; Journal Volume: 104; Journal Issue: 5; Other Information: DOI: 10.1134/S106377610705007X; Copyright (c) 2007 Nauka/Interperiodica; Article Copyright (c) 2007 Pleiades Publishing, Inc; Country of input: International Atomic Energy Agency (IAEA)
Country of Publication:
United States
Language:
English
Subject:
71 CLASSICAL AND QUANTUM MECHANICS, GENERAL PHYSICS; INFORMATION THEORY; QUANTUM MECHANICS; QUBITS

Citation Formats

Kulik, S. P., E-mail: Sergei.Kulik@gmail.com, and Shurupov, A. P. On quantum key distribution using ququarts. United States: N. p., 2007. Web. doi:10.1134/S106377610705007X.
Kulik, S. P., E-mail: Sergei.Kulik@gmail.com, & Shurupov, A. P. On quantum key distribution using ququarts. United States. doi:10.1134/S106377610705007X.
Kulik, S. P., E-mail: Sergei.Kulik@gmail.com, and Shurupov, A. P. Tue . "On quantum key distribution using ququarts". United States. doi:10.1134/S106377610705007X.
@article{osti_21072480,
title = {On quantum key distribution using ququarts},
author = {Kulik, S. P., E-mail: Sergei.Kulik@gmail.com and Shurupov, A. P.},
abstractNote = {A comparative analysis of quantum key distribution protocols using qubits and ququarts as information carriers is presented. Several schemes of incoherent attacks that can be used by an eavesdropper to obtain secret information are considered. The errors induced by the eavesdropper are analyzed for several key distribution protocols.},
doi = {10.1134/S106377610705007X},
journal = {Journal of Experimental and Theoretical Physics},
number = 5,
volume = 104,
place = {United States},
year = {Tue May 15 00:00:00 EDT 2007},
month = {Tue May 15 00:00:00 EDT 2007}
}