Security of quantum key distribution using d-level systems.
نویسندگان
چکیده
We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e., quantum states in a d-dimensional Hilbert space. The first cryptosystem uses two mutually unbiased bases (thereby extending the BB84 scheme), while the second exploits all d+1 available such bases (extending the six-state protocol for qubits). We derive the information gained by a potential eavesdropper applying a cloning-based individual attack, along with an upper bound on the error rate that ensures unconditional security against coherent attacks.
منابع مشابه
Towards the Modeling and Simulation of Quantum Key Distribution Systems
Quantum Key Distribution (QKD) is a nextgeneration security technology that exploits the properties of quantum mechanics to enable two parties to generate an unconditionally secure shared secret key. QKD is novel because its security is based upon the fundamental laws of quantum mechanics and not on computational complexity. QKD systems are composed of multiple interconnected electrical, optica...
متن کاملSecurity of Electronic Payment Systems: A Comprehensive Survey
This comprehensive survey deliberated over the security of electronic payment systems. In our research, we focused on either dominant systems or new attempts and innovations to improve the level of security of the electronic payment systems. This survey consists of the Card-present (CP) transactions and a review of its dominant system i.e. EMV including several researches at Cambridge universit...
متن کاملQuantum secret sharing based on a reusable
Reply to Comments on " Quantum Key Distribution for d-level systems for generalized Bell states " [Phys. Rev. A, 052331, (2002)] and " Quantum secret sharing based on a reusable Greenberger-Horne-Zeilinger states as secure carriers " [Phys. Abstract We show that the criticisms of two recent comments [1, 2] on the insecurity of quantum key distributions proposed in [3] and [4] and the secret sha...
متن کاملSecurity bound of two-basis quantum-key-distribution protocols using qudits
We investigate the security bounds of quantum-cryptographic protocols using d-level systems. In particular, we focus on schemes that use two mutually unbiased bases, thus extending the Bennett-Brassard 1984 quantum-key-distribution scheme to higher dimensions. Under the assumption of general coherent attacks, we derive an analytic expression for the ultimate upper security bound of such quantum...
متن کاملPractical Quantum Key Distribution based on the BB84 protocol
Quantum Cryptography features a unique way of sharing a random sequence of bits between users with a certifiably security not attainable with either public or secret-key classical cryptographic systems. This is achieved by means of Quantum Key Distribution (QKD) techniques, which rely on exploiting the laws of quantum mechanics [1]. Indeed, only systems based on QKD techniques can offer uncondi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Physical review letters
دوره 88 12 شماره
صفحات -
تاریخ انتشار 2002