Security of Quantum Key Distribution with Entangled Qutrits

نویسندگان

  • Thomas Durt
  • Nicolas J. Cerf
  • Nicolas Gisin
  • Marek Żukowski
چکیده

The study of quantum cryptography and quantum non-locality have traditionnally been based on two-level quantum systems (qubits). In this paper we consider a generalisation of Ekert’s cryptographic protocol[20] where qubits are replaced by qutrits. The security of this protocol is related to non-locality, in analogy with Ekert’s protocol. In order to study its robustness against the optimal individual attacks, we derive the information gained by a potential eavesdropper applying a cloning-based attack.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A qutrit Quantum Key Distribution protocol using Bell inequalities with larger violation capabilities

The Ekert quantum key distribution protocol [1] uses pairs of entangled qubits and performs checks based on a Bell inequality to detect eavesdropping. The 3DEB protocol [2] uses instead pairs of entangled qutrits to achieve better noise resistance than the Ekert protocol. It performs checks based on a Bell inequality for qutrits named CHSH-3 and found in [3, 4]. In this paper, we present a new ...

متن کامل

Multi-particle and High-dimension Controlled Order Rearrangement Encryption Protocols

Based on the controlled order rearrange encryption (CORE) for quantum key distribution using EPR pairs[Fu.G.Deng and G.L.Long Phys.Rev.A68 (2003) 042315], we propose the generalized controlled order rearrangement encryption (GCORE) protocols of N qubits and N qutrits, concretely display them in the cases using 3-qubit, 2-qutrit maximally entangled basis states. We further indicate that our prot...

متن کامل

A qutrit Quantum Key Distribution protocol with better noise resistance

The Ekert quantum key distribution protocol [1] uses pairs of entangled qubits and performs checks based on a Bell inequality to detect eavesdropping. The 3DEB protocol [5] uses instead pairs of entangled qutrits to achieve better noise resistance than the Ekert protocol. It performs checks based on a Bell inequality for qutrits named CHSH-3 and found in [10, 13]. In this paper, we present a ne...

متن کامل

Measuring entangled qutrits and their use for quantum bit commitment.

We produce and holographically measure entangled qudits encoded in transverse spatial modes of single photons. With the novel use of a quantum state tomography method that only requires two-state superpositions, we achieve the most complete characterization of entangled qutrits to date. Ideally, entangled qutrits provide better security than qubits in quantum bit commitment: we model the sensit...

متن کامل

A Note on Measurement Device Independent Quantum Private Query with Qutrits

Measurement Device Independent Quantum Private Query (MDI QPQ) with qutrits is presented. We identified that this variant of QPQ protocol resists the optimization of both database security and client’s privacy simultaneously. We compare the database security and client’s privacy in MDI QPQ for qubits with qutrits. For some instances, we observe that qutrit will provide better security for datab...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002