Security of quantum key distributions with entangled qudits

被引:88
|
作者
Durt, T [1 ]
Kaszlikowski, D
Chen, JL
Kwek, LC
机构
[1] Free Univ Brussels, Toegepaste Natuurkunde Foton, Pleinlaan 2, B-1050 Brussels, Belgium
[2] Natl Univ Singapore, Fac Sci, Dept Phys, Singapore 119260, Singapore
[3] Nanyang Technol Univ, Natl Inst Educ, Singapore 639798, Singapore
来源
PHYSICAL REVIEW A | 2004年 / 69卷 / 03期
基金
美国国家科学基金会;
关键词
D O I
10.1103/PhysRevA.69.032313
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We consider a generalization of Ekert's entanglement-based quantum cryptographic protocol where qubits are replaced by N- or d-dimensional systems (qudits). In order to study its robustness against optimal incoherent attacks, we derive the information gained by a potential eavesdropper during a cloning-based individual attack. In doing so, we generalize Cerf's formalism for cloning machines and establish the form of the most general cloning machine that respects all the symmetries of the problem. We obtain an upper bound on the error rate that guarantees the confidentiality of qudit generalizations of the Ekert's protocol for qubits.
引用
收藏
页码:032313 / 1
页数:11
相关论文
共 50 条
  • [31] Quantum key distribution and quantum authentication based on entangled state
    Shi, BS
    Li, J
    Liu, JM
    Fan, XF
    Guo, GC
    PHYSICS LETTERS A, 2001, 281 (2-3) : 83 - 87
  • [32] High-dimensional quantum key distribution based on qudits transmission with quantum Fourier transform
    Xing-Yu Yan
    Nan-Run Zhou
    Li-Hua Gong
    Yun-Qian Wang
    Xiao-Jun Wen
    Quantum Information Processing, 2019, 18
  • [33] Non Abelian structures and the geometric phase of entangled qudits
    Oxman, L. E.
    Khoury, A. Z.
    ANNALS OF PHYSICS, 2014, 351 : 138 - 151
  • [34] High-dimensional quantum key agreement protocol with pairs of single qudits
    He, Jianhao
    Li, Lvzhou
    Huang, Yifan
    Situ, Haozhen
    Qiu, Daowen
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2018, 16 (03)
  • [35] The generation of Entangled Qudits and their Application in Probabilistic Superdense Coding
    Lin Qing
    CHINESE PHYSICS LETTERS, 2009, 26 (04)
  • [36] Security of Quantum Key Distribution
    Beaudry, Normand
    Ferenczi, Agnes
    Narasimhachar, Varun
    Moroder, Tobias
    Ma, Xiongfeng
    Piani, Marco
    Luekenhaus, Norbert
    2010 CONFERENCE ON OPTICAL FIBER COMMUNICATION OFC COLLOCATED NATIONAL FIBER OPTIC ENGINEERS CONFERENCE OFC-NFOEC, 2010,
  • [37] Security of quantum key distribution
    Renner, Renato
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2008, 6 (01) : 1 - 127
  • [38] Security of Quantum Key Distribution
    Yuen, Horace P.
    IEEE ACCESS, 2016, 4 : 724 - 749
  • [39] Security of a control key in quantum key distribution
    Rehman, Junaid Ur
    Qaisar, Saad
    Jeong, Youngmin
    Shin, Hyundong
    MODERN PHYSICS LETTERS B, 2017, 31 (11):
  • [40] Tomographic reconstruction of time-bin-entangled qudits
    Nowierski, Samantha J.
    Oza, Neal N.
    Kumar, Prem
    Kanter, Gregory S.
    PHYSICAL REVIEW A, 2016, 94 (04)