Security of quantum key distributions with entangled qudits
- 19 March 2004
- journal article
- research article
- Published by American Physical Society (APS) in Physical Review A
- Vol. 69 (3) , 032313
- https://doi.org/10.1103/physreva.69.032313
Abstract
We consider a generalization of Ekert's entanglement-based quantum cryptographic protocol where qubits are replaced by - or -dimensional systems (qudits). In order to study its robustness against optimal incoherent attacks, we derive the information gained by a potential eavesdropper during a cloning-based individual attack. In doing so, we generalize Cerf’s formalism for cloning machines and establish the form of the most general cloning machine that respects all the symmetries of the problem. We obtain an upper bound on the error rate that guarantees the confidentiality of qudit generalizations of the Ekert’s protocol for qubits.
Keywords
All Related Versions
This publication has 30 references indexed in Scilit:
- Security of quantum key distribution with entangled qutritsPhysical Review A, 2003
- Bell Inequalities for Arbitrarily High-Dimensional SystemsPhysical Review Letters, 2002
- Photonic entanglement for fundamental tests and quantum communicationQuantum Information and Computation, 2001
- Violations of local realism with quantum systems described byN-dimensional Hilbert spaces up toPhysical Review A, 2001
- Violations of Local Realism by Two Entangled-Dimensional Systems Are Stronger than for Two QubitsPhysical Review Letters, 2000
- Pauli Cloning of a Quantum BitPhysical Review Letters, 2000
- Asymmetric quantum cloning in any dimensionJournal of Modern Optics, 2000
- Realizable higher-dimensional two-particle entanglements via multiport beam splittersPhysical Review A, 1997
- Quantum copying: Beyond the no-cloning theoremPhysical Review A, 1996
- Quantum cryptography based on Bell’s theoremPhysical Review Letters, 1991