Security bounds in quantum cryptography using d-level systems
نویسندگان
چکیده
منابع مشابه
Security of quantum key distribution using d-level systems.
We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e., quantum states in a d-dimensional Hilbert space. The first cryptosystem uses two mutually unbiased bases (thereby extending the BB84 scheme), while the second exploits all d+1 available such bases (extending the six-state protocol for qubits). We derive the information gained by a potential eavesdropper...
متن کاملNetwork Security Using Quantum Cryptography
Network security and cryptography is a subject about how to protect information in digital form and to provide security services. The purpose of a digital signature is to provide a means for an entity to bind its identity to a piece of information. The common attacks on digital signature were reviewed. The first method was the RSA signature scheme, which remains today one of the most practical ...
متن کاملQuantum Cryptography and Security of Information Systems
We show concept of BB84 quantum key distribution (QKD) protocol and analyze its use as an information system. The difference between classical and quantum cryptography is presented in a way of understanding the main advantage of quantum information processing over classical information processing. At the end of the article, we present today and future use of quantum cryptography and possible im...
متن کاملBounds on Information and the Security of Quantum Cryptography
We present new physical bounds on quantum information, and use them to prove the security of quantum cryptography against a large class of collective attacks. Such attacks are directed against the final key, and security against them suggests that quantum cryptography is ultimately secure.
متن کاملSecurity Bounds for Quantum Cryptography with Finite Resources
A practical quantum key distribution (QKD) protocol necessarily runs in finite time and, hence, only a finite amount of communication is exchanged. This is in contrast to most of the standard results on the security of QKD, which only hold in the limit where the number of transmitted signals approaches infinity. Here, we analyze the security of QKD under the realistic assumption that the amount...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Quantum Information and Computation
سال: 2003
ISSN: 1533-7146,1533-7146
DOI: 10.26421/qic3.6-1