A qutrit Quantum Key Distribution protocol using Bell inequalities with larger violation capabilities

نویسندگان

  • Zoé Amblard
  • François Arnault
چکیده

The Ekert quantum key distribution protocol [1] uses pairs of entangled qubits and performs checks based on a Bell inequality to detect eavesdropping. The 3DEB protocol [2] uses instead pairs of entangled qutrits to achieve better noise resistance than the Ekert protocol. It performs checks based on a Bell inequality for qutrits named CHSH-3 and found in [3, 4]. In this paper, we present a new protocol, which also uses pairs of entangled qutrits, but gaining advantage of a Bell inequality which achieves better noise resistance than the one used in 3DEB. The latter inequality is called here hCHSH-3 and was discovered in [5]. For each party, the hCHSH-3 inequality involves four observables already used in CHSH-3 but also two products of observables which do not commute. We explain how the parties can measure the observables corresponding to these products and thus are able to check the violation of hCHSH-3. In the presence of noise, this violation guarantees the security against a local Trojan horse attack. We also designed a version of our protocol which is secure against individual attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A qutrit Quantum Key Distribution protocol with better noise resistance

The Ekert quantum key distribution protocol [1] uses pairs of entangled qubits and performs checks based on a Bell inequality to detect eavesdropping. The 3DEB protocol [5] uses instead pairs of entangled qutrits to achieve better noise resistance than the Ekert protocol. It performs checks based on a Bell inequality for qutrits named CHSH-3 and found in [10, 13]. In this paper, we present a ne...

متن کامل

Optimal measurements for nonlocal correlations

A problem in quantum information theory is to find the experimental setup that maximizes the nonlocality of correlations with respect to some suitable measure such as the violation of Bell inequalities. The latter has however some drawbacks. First and foremost it is unfeasible to determine the whole set of Bell inequalities already for a few measurements and thus unfeasible to find the experime...

متن کامل

Quantum Cryptography in Noiseless and Noisy Environment

In this paper, three quantum key distribution protocols will be presented. The first protocol considered is the Ekert protocol for qubit systems based on the famous Einstein-Podolsky-Rosen experiment, and using the Bell inequality as a test of channel security. The Ekert protocol will then be extended to a qutrit system for our second protocol. Finally, a protocol based on mutually complementar...

متن کامل

A heralded two-qutrit entangled state

We propose a scheme for building a heralded two-qutrit entangled state from polarized photons. An optical circuit is presented to build the maximally entangled two-qutrit state from two heralded Bell pairs and ideal threshold detectors. Several schemes are discussed for constructing the two Bell pairs. We also show how one can produce an unbalanced two-qutrit state that could be of general purp...

متن کامل

An Entanglement Study of Superposition of Qutrit Spin-Coherent States

Considering generalized concurrence as the criterion of entanglement, we study entanglement properties of superposition of two qutrit coherent states, as a function of their amplitudes. These states may attain maximum entanglement or no entanglement at all, depending on the choice of the parameters involved. The states revealing maximum entanglement also display the maximum violations of the Be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Quantum Information & Computation

دوره 15  شماره 

صفحات  -

تاریخ انتشار 2015