Security of quantum key distributions with entangled qudits

被引:88
|
作者
Durt, T [1 ]
Kaszlikowski, D
Chen, JL
Kwek, LC
机构
[1] Free Univ Brussels, Toegepaste Natuurkunde Foton, Pleinlaan 2, B-1050 Brussels, Belgium
[2] Natl Univ Singapore, Fac Sci, Dept Phys, Singapore 119260, Singapore
[3] Nanyang Technol Univ, Natl Inst Educ, Singapore 639798, Singapore
来源
PHYSICAL REVIEW A | 2004年 / 69卷 / 03期
基金
美国国家科学基金会;
关键词
D O I
10.1103/PhysRevA.69.032313
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We consider a generalization of Ekert's entanglement-based quantum cryptographic protocol where qubits are replaced by N- or d-dimensional systems (qudits). In order to study its robustness against optimal incoherent attacks, we derive the information gained by a potential eavesdropper during a cloning-based individual attack. In doing so, we generalize Cerf's formalism for cloning machines and establish the form of the most general cloning machine that respects all the symmetries of the problem. We obtain an upper bound on the error rate that guarantees the confidentiality of qudit generalizations of the Ekert's protocol for qubits.
引用
收藏
页码:032313 / 1
页数:11
相关论文
共 50 条
  • [1] Security of quantum key distribution with entangled qutrits
    Durt, T
    Cerf, NJ
    Gisin, N
    Zukowski, M
    PHYSICAL REVIEW A, 2003, 67 (01):
  • [2] Security of quantum key distribution with entangled qutrits
    Toegepaste Natuurkunde en Fotonica, Theoretische Natuurkunde, Vrije Universiteit Brussel, Pleinlaan 2, 1050 Brussels, Belgium
    不详
    不详
    不详
    Physical Review A - Atomic, Molecular, and Optical Physics, 2003, 67 (01): : 1 - 012311
  • [3] Generation of qudits and entangled qudits
    Li, Yongmin
    Zhang, Kuanshou
    Peng, Kunchi
    PHYSICAL REVIEW A, 2008, 77 (01)
  • [4] A quantum key distribution on qudits using quantum operators
    Jirakitpuwapat, Wachirapong
    Kumam, Poom
    Deesuwan, Tanapat
    Dhompongsa, Sompong
    MATHEMATICAL METHODS IN THE APPLIED SCIENCES, 2023, 46 (15) : 15924 - 15939
  • [5] Security bound of two-basis quantum-key-distribution protocols using qudits
    Nikolopoulos, GM
    Alber, G
    PHYSICAL REVIEW A, 2005, 72 (03):
  • [6] Security of quantum key distribution with entangled photons against individual attacks
    Waks, Edo
    Zeevi, Assaf
    Yamamoto, Yoshihisa
    Physical Review A - Atomic, Molecular, and Optical Physics, 2002, 65 (5 A): : 523101 - 523101
  • [7] Security of quantum key distribution with entangled photons against individual attacks
    Waks, E
    Zeevi, A
    Yamamoto, Y
    PHYSICAL REVIEW A, 2002, 65 (05): : 16
  • [9] Security of ping-pong protocol based on pairs of completely entangled qudits
    Piotr Zawadzki
    Quantum Information Processing, 2012, 11 : 1419 - 1430
  • [10] Wigner distributions for qudits
    Chaturvedi, S.
    QUANTUM COMPUTING: BACK ACTION 2006, 2006, 864 : 135 - 142