Security of Quantum Key Distribution Using-Level Systems
Top Cited Papers
- 8 March 2002
- journal article
- research article
- Published by American Physical Society (APS) in Physical Review Letters
- Vol. 88 (12) , 127902
- https://doi.org/10.1103/physrevlett.88.127902
Abstract
We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e., quantum states in a -dimensional Hilbert space. The first cryptosystem uses two mutually unbiased bases (thereby extending the BB84 scheme), while the second exploits all available such bases (extending the six-state protocol for qubits). We derive the information gained by a potential eavesdropper applying a cloning-based individual attack, along with an upper bound on the error rate that ensures unconditional security against coherent attacks.
Keywords
All Related Versions
This publication has 15 references indexed in Scilit:
- Quantum key distribution using multilevel encodingPhysical Review A, 2001
- Quantum Cryptography with 3-State SystemsPhysical Review Letters, 2000
- Simple Proof of Security of the BB84 Quantum Key Distribution ProtocolPhysical Review Letters, 2000
- Quantum cryptography using larger alphabetsPhysical Review A, 2000
- Pauli Cloning of a Quantum BitPhysical Review Letters, 2000
- Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptographyPhysical Review A, 1999
- Unconditional Security of Quantum Key Distribution over Arbitrarily Long DistancesScience, 1999
- Optimal Eavesdropping in Quantum Cryptography with Six StatesPhysical Review Letters, 1998
- Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategyPhysical Review A, 1997
- Optimal state-determination by mutually unbiased measurementsAnnals of Physics, 1989