Optimal Eavesdropping in Cryptography with Three-Dimensional Quantum States
Top Cited Papers
- 8 March 2002
- journal article
- research article
- Published by American Physical Society (APS) in Physical Review Letters
- Vol. 88 (12) , 127901
- https://doi.org/10.1103/physrevlett.88.127901
Abstract
We study optimal eavesdropping in quantum cryptography with three-dimensional systems, and show that this scheme is more secure against symmetric attacks than protocols using two-dimensional states. We generalize the according eavesdropping transformation to arbitrary dimensions, and discuss the connection with optimal quantum cloning.Keywords
All Related Versions
This publication has 10 references indexed in Scilit:
- Security of Quantum Key Distribution Using-Level SystemsPhysical Review Letters, 2002
- A remark on the optimal cloning of an N-level quantum systemZeitschrift für Physik B Condensed Matter, 2000
- Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptographyPhysical Review A, 1999
- Optimal Eavesdropping in Quantum Cryptography with Six StatesPhysical Review Letters, 1998
- Optimal cloning of pure statesPhysical Review A, 1998
- Optimal universal and state-dependent quantum cloningPhysical Review A, 1998
- Optimal Quantum Cloning MachinesPhysical Review Letters, 1997
- Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategyPhysical Review A, 1997
- Quantum copying: Beyond the no-cloning theoremPhysical Review A, 1996
- A single quantum cannot be clonedNature, 1982