Fe b 20 03 Security of Quantum Key Distribution with entangled qu N its
نویسنده
چکیده
In this paper we consider a generalisation of Ekert’s entanglement-based quantum cryptographic protocol where qubits are replaced by quN its (i.e., N -dimensional systems). In order to study its robustness against optimal incoherent attacks, we derive the information gained by a potential eavesdropper during a cloning-based individual attack. For doing so, we generalize Cerf’s formalism for cloning machines and establish the form of the most general cloning machine that respects all the symmetries of the problem. We show that when Alice and Bob compare the signal obtained in 100 % correlated bases and the remaining signal, they are able to thwart attacks based on state-dependent or nonuniversal cloning machines. This result sheds a new light on previously obtained upper bounds on the error rate that guarantees the confidentiality of qubits and qutrits Ekert’s protocols.
منابع مشابه
Security of Quantum Key Distribution with Entangled Qutrits
The study of quantum cryptography and quantum non-locality have traditionnally been based on two-level quantum systems (qubits). In this paper we consider a generalisation of Ekert’s cryptographic protocol[20] where qubits are replaced by qutrits. The security of this protocol is related to non-locality, in analogy with Ekert’s protocol. In order to study its robustness against the optimal indi...
متن کاملUnconditionally Secure Quantum Key Distribution In Higher Dimensions
In search of a quantum key distribution scheme that could stand up for more drastic eavesdropping attack, I discover a prepare-and-measure scheme using N -dimensional quantum particles as information carriers where N is a prime power. Using the Shor-Preskill-type argument, I prove that this scheme is unconditional secure against all attacks allowed by the laws of quantum physics. Incidentally, ...
متن کاملCoherent state quantum key distribution based on entanglement sudden death
A method for quantum key distribution (QKD) using entangled coherent states is discussed which is designed to provide key distribution rates and transmission distances surpassing those of traditional entangled photon pair QKD by exploiting entanglement sudden death. The method uses entangled electromagnetic signal states of ‘macroscopic’ average photon numbers rather than single photon or entan...
متن کاملar X iv : q ua nt - p h / 04 02 17 0 v 1 2 3 Fe b 20 04 Unconditional Security of Practical Quantum Key Distribution
We present an extension of the first proof for the unconditional security of the BB84 quantum key distribution protocol which was given by Mayers. We remove the constraint that a perfect BB84 quantum source is required and the proof given here covers a range of practical quantum sources. Nothing is assumed about the detector except that the efficiency with which signals are detected is basis in...
متن کاملJ an 2 00 9 Collins diffraction formula and the Wigner function in entangled state representation
X iv :0 90 1. 03 64 v1 [ qu an tph ] 4 J an 2 00 9 Collins diffraction formula and the Wigner function in entangled state representation Hong-Yi Fan and Li-yun Hu Department of Physics, Shanghai Jiao Tong University, Shanghai 200030, China Department of Material Science and Engineering, University of Science and Technology of China, Hefei, Anhui 230026, China Corresponding author. E-mail addres...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004