Quantum key distribution using multilevel encoding:: security analysis

被引:63
|
作者
Bourennane, M [1 ]
Karlsson, A
Björk, G
Gisin, N
Cerf, NJ
机构
[1] Univ Munich, Sekt Phys, D-80797 Munich, Germany
[2] Max Planck Inst Quantum Opt, D-85748 Garching, Germany
[3] Royal Inst Technol, Dept Microelect & Informat Technol, Electrum 229, SE-16440 Kista, Sweden
[4] Univ Geneva, GAP Opt, Geneva 4, Switzerland
[5] Free Univ Brussels, Ecole Polytech, B-1050 Brussels, Belgium
[6] CALTECH, Jet Prop Lab, Pasadena, CA 91109 USA
来源
JOURNAL OF PHYSICS A-MATHEMATICAL AND GENERAL | 2002年 / 35卷 / 47期
关键词
D O I
10.1088/0305-4470/35/47/307
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
We propose an extension of quantum key distribution based on encoding the key into quNits, i.e. quantum states in an N-dimensional Hilbert space. We,estimate both the mutual information between the legitimate parties and the eavesdropper, and the error rate, as a function of the dimension of the Hilbert space. We derive the information gained by an eavesdropper using optimal incoherent attacks and an upper bound on the legitimate party error rate that ensures unconditional security when the eavesdropper uses finite coherent eavesdropping attacks. We also consider realistic systems where we assume that the detector dark count probability is not negligible.
引用
收藏
页码:10065 / 10076
页数:12
相关论文
共 50 条
  • [31] Security Analysis of Phase Encoding Continuous-Variable Quantum Key Distribution Based on K-Nearest Neighbor
    Zhao Changlan
    Wang Tianyi
    LASER & OPTOELECTRONICS PROGRESS, 2023, 60 (19)
  • [32] Security Analysis of Unidimensional Continuous-Variable Quantum Key Distribution Using Uncertainty Relations
    Wang, Pu
    Wang, Xuyang
    Li, Yongmin
    ENTROPY, 2018, 20 (03)
  • [33] Experimental quantum key distribution with finite-key security analysis for noisy channels
    Bacco, Davide
    Canale, Matteo
    Laurenti, Nicola
    Vallone, Giuseppe
    Villoresi, Paolo
    NATURE COMMUNICATIONS, 2013, 4
  • [34] Finite-key security analysis of quantum key distribution with imperfect light sources
    Mizutani, Akihiro
    Curty, Marcos
    Lim, Charles Ci Wen
    Imoto, Nobuyuki
    Tamaki, Kiyoshi
    NEW JOURNAL OF PHYSICS, 2015, 17
  • [35] Experimental quantum key distribution with finite-key security analysis for noisy channels
    Davide Bacco
    Matteo Canale
    Nicola Laurenti
    Giuseppe Vallone
    Paolo Villoresi
    Nature Communications, 4
  • [36] Improving Wireless Sensor Network Security Using Quantum Key Distribution
    Alhasnawy, Laith H.
    AL-Mashanji, Ameer K.
    BAGHDAD SCIENCE JOURNAL, 2023, 20 (05) : 2077 - 2085
  • [37] Security analysis of continuous-variable quantum key distribution scheme
    Zhu Jun
    He Guang-Qiang
    Zeng Gui-Hua
    CHINESE PHYSICS, 2007, 16 (05): : 1364 - 1369
  • [38] Security analysis of an untrusted source for quantum key distribution: passive approach
    Zhao, Yi
    Qi, Bing
    Lo, Hoi-Kwong
    Qian, Li
    NEW JOURNAL OF PHYSICS, 2010, 12
  • [39] SECURITY ANALYSIS OF THE TIME-CODING QUANTUM KEY DISTRIBUTION PROTOCOLS
    Debuisschert, Thierry
    Fossier, Simon
    QUANTUM INFORMATION & COMPUTATION, 2011, 11 (11-12) : 968 - 987
  • [40] Security of quantum key distribution with iterative sifting
    Tamaki, Kiyoshi
    Lo, Hoi-Kwong
    Mizutani, Akihiro
    Kato, Go
    Lim, Charles Ci Wen
    Azuma, Koji
    Curty, Marcos
    QUANTUM SCIENCE AND TECHNOLOGY, 2018, 3 (01):