Security of quantum key distribution with entangled qutrits
- 21 January 2003
- journal article
- research article
- Published by American Physical Society (APS) in Physical Review A
- Vol. 67 (1) , 012311
- https://doi.org/10.1103/physreva.67.012311
Abstract
The study of quantum cryptography and quantum entanglement have traditionally been based on two-level quantum systems (qubits). In this paper, we consider a generalization of Ekert’s entanglement-based quantum cryptographic protocol where qubits are replaced by three-level systems (qutrits). In order to investigate the security against the optimal individual attack, we derive the information gained by a potential eavesdropper applying a cloning-based attack. We exhibit the explicit form of this cloner, which is distinct from the previously known cloners, and conclude that the protocol is more robust than those based on entangled qubits as well as unentangled qutrits.Keywords
All Related Versions
This publication has 28 references indexed in Scilit:
- Quantum key distribution using multilevel encoding: security analysisJournal of Physics A: General Physics, 2002
- Quantum cryptographyReviews of Modern Physics, 2002
- Security of Quantum Key Distribution Using-Level SystemsPhysical Review Letters, 2002
- Clauser-Horne inequality for three-state systemsPhysical Review A, 2002
- Bell Inequalities for Arbitrarily High-Dimensional SystemsPhysical Review Letters, 2002
- Quantum key distribution using multilevel encodingPhysical Review A, 2001
- Violations of Local Realism by Two Entangled-Dimensional Systems Are Stronger than for Two QubitsPhysical Review Letters, 2000
- Quantum Cryptography with 3-State SystemsPhysical Review Letters, 2000
- Quantum cryptography based on Bell’s theoremPhysical Review Letters, 1991
- Proposed Experiment to Test Local Hidden-Variable TheoriesPhysical Review Letters, 1969