Quantum key distribution using multilevel encoding:: security analysis

被引:63
|
作者
Bourennane, M [1 ]
Karlsson, A
Björk, G
Gisin, N
Cerf, NJ
机构
[1] Univ Munich, Sekt Phys, D-80797 Munich, Germany
[2] Max Planck Inst Quantum Opt, D-85748 Garching, Germany
[3] Royal Inst Technol, Dept Microelect & Informat Technol, Electrum 229, SE-16440 Kista, Sweden
[4] Univ Geneva, GAP Opt, Geneva 4, Switzerland
[5] Free Univ Brussels, Ecole Polytech, B-1050 Brussels, Belgium
[6] CALTECH, Jet Prop Lab, Pasadena, CA 91109 USA
来源
JOURNAL OF PHYSICS A-MATHEMATICAL AND GENERAL | 2002年 / 35卷 / 47期
关键词
D O I
10.1088/0305-4470/35/47/307
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
We propose an extension of quantum key distribution based on encoding the key into quNits, i.e. quantum states in an N-dimensional Hilbert space. We,estimate both the mutual information between the legitimate parties and the eavesdropper, and the error rate, as a function of the dimension of the Hilbert space. We derive the information gained by an eavesdropper using optimal incoherent attacks and an upper bound on the legitimate party error rate that ensures unconditional security when the eavesdropper uses finite coherent eavesdropping attacks. We also consider realistic systems where we assume that the detector dark count probability is not negligible.
引用
收藏
页码:10065 / 10076
页数:12
相关论文
共 50 条
  • [21] On the Security of Quantum Key Distribution Networks
    Lella, Eufemia
    Schmid, Giovanni
    CRYPTOGRAPHY, 2023, 7 (04)
  • [22] Security Proof of Quantum Key Distribution
    Tamaki, Kiyoshi
    Tsurumaru, Toyohiro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (05) : 880 - 888
  • [23] Implementation Security in Quantum Key Distribution
    Zapatero, Victor
    Navarrete, lvaro
    Curty, Marcos
    ADVANCED QUANTUM TECHNOLOGIES, 2025, 8 (02)
  • [24] Security Processor with Quantum Key Distribution
    Loruenser, Thomas
    Querasser, Edwin
    Matyus, Thomas
    Peev, Momtchil
    Wolkerstorfer, Johannes
    Hutter, Michael
    Szekely, Alexander
    Wimberger, Ilse
    Pfaffel-Janser, Christian
    Neppach, Andreas
    2008 INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, 2008, : 37 - +
  • [25] On the security and confidentiality of quantum key distribution
    Al-Ghamdi, Al-Batool
    Al-Sulami, Ameenah
    Aljahdali, Asia Othman
    SECURITY AND PRIVACY, 2020, 3 (05)
  • [26] A proof of the security of quantum key distribution
    Biham, Eli
    Boyer, Michel
    Boykin, P. Oscar
    Mor, Tal
    Roychowdhury, Vwani
    JOURNAL OF CRYPTOLOGY, 2006, 19 (04) : 381 - 439
  • [27] The security of practical quantum key distribution
    Scarani, Valerio
    Bechmann-Pasquinucci, Helle
    Cerf, Nicolas J.
    Dusek, Miloslav
    Luetkenhaus, Norbert
    Peev, Momtchil
    REVIEWS OF MODERN PHYSICS, 2009, 81 (03) : 1301 - 1350
  • [28] A Proof of the Security of Quantum Key Distribution
    Eli Biham
    Michel Boyer
    P. Oscar Boykin
    Tal Mor
    Vwani Roychowdhury
    Journal of Cryptology, 2006, 19 : 381 - 439
  • [29] Theory of the security of quantum key distribution
    Tamaki, Kiyoshi
    Kato, Go
    NTT Technical Review, 2011, 9 (09):
  • [30] Scalable key distribution system for multilevel security conference
    Inst of Software, Chinese Acad of Sciences, Beijing, China
    Jisuanji Xuebao/Chinese Journal of Computers, 2000, 23 (08): : 793 - 798