A qutrit Quantum Key Distribution protocol using Bell inequalities with larger violation capabilities
نویسندگان
چکیده
The Ekert quantum key distribution protocol [1] uses pairs of entangled qubits and performs checks based on a Bell inequality to detect eavesdropping. The 3DEB protocol [2] uses instead pairs of entangled qutrits to achieve better noise resistance than the Ekert protocol. It performs checks based on a Bell inequality for qutrits named CHSH-3 and found in [3, 4]. In this paper, we present a new protocol, which also uses pairs of entangled qutrits, but gaining advantage of a Bell inequality which achieves better noise resistance than the one used in 3DEB. The latter inequality is called here hCHSH-3 and was discovered in [5]. For each party, the hCHSH-3 inequality involves four observables already used in CHSH-3 but also two products of observables which do not commute. We explain how the parties can measure the observables corresponding to these products and thus are able to check the violation of hCHSH-3. In the presence of noise, this violation guarantees the security against a local Trojan horse attack. We also designed a version of our protocol which is secure against individual attacks.
منابع مشابه
A qutrit Quantum Key Distribution protocol with better noise resistance
The Ekert quantum key distribution protocol [1] uses pairs of entangled qubits and performs checks based on a Bell inequality to detect eavesdropping. The 3DEB protocol [5] uses instead pairs of entangled qutrits to achieve better noise resistance than the Ekert protocol. It performs checks based on a Bell inequality for qutrits named CHSH-3 and found in [10, 13]. In this paper, we present a ne...
متن کاملOptimal measurements for nonlocal correlations
A problem in quantum information theory is to find the experimental setup that maximizes the nonlocality of correlations with respect to some suitable measure such as the violation of Bell inequalities. The latter has however some drawbacks. First and foremost it is unfeasible to determine the whole set of Bell inequalities already for a few measurements and thus unfeasible to find the experime...
متن کاملQuantum Cryptography in Noiseless and Noisy Environment
In this paper, three quantum key distribution protocols will be presented. The first protocol considered is the Ekert protocol for qubit systems based on the famous Einstein-Podolsky-Rosen experiment, and using the Bell inequality as a test of channel security. The Ekert protocol will then be extended to a qutrit system for our second protocol. Finally, a protocol based on mutually complementar...
متن کاملA heralded two-qutrit entangled state
We propose a scheme for building a heralded two-qutrit entangled state from polarized photons. An optical circuit is presented to build the maximally entangled two-qutrit state from two heralded Bell pairs and ideal threshold detectors. Several schemes are discussed for constructing the two Bell pairs. We also show how one can produce an unbalanced two-qutrit state that could be of general purp...
متن کاملAn Entanglement Study of Superposition of Qutrit Spin-Coherent States
Considering generalized concurrence as the criterion of entanglement, we study entanglement properties of superposition of two qutrit coherent states, as a function of their amplitudes. These states may attain maximum entanglement or no entanglement at all, depending on the choice of the parameters involved. The states revealing maximum entanglement also display the maximum violations of the Be...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Quantum Information & Computation
دوره 15 شماره
صفحات -
تاریخ انتشار 2015