2002
DOI: 10.1103/physrevlett.88.127902
|View full text |Cite
|
Sign up to set email alerts
|

Security of Quantum Key Distribution Usingd-Level Systems

Abstract: We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e., quantum states in a d-dimensional Hilbert space. The first cryptosystem uses two mutually unbiased bases (thereby extending the BB84 scheme), while the second exploits all d 1 1 available such bases (extending the six-state protocol for qubits). We derive the information gained by a potential eavesdropper applying a cloning-based individual attack, along with an upper bound on the error rate that ensures unconditional … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

14
1,063
1
10

Year Published

2005
2005
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 1,250 publications
(1,088 citation statements)
references
References 17 publications
14
1,063
1
10
Order By: Relevance
“…(7). Using the normalization of the ancilla states and taking into account the expression (4), we can prove that …”
Section: Appendix A: the Optimal Mutual Information Alice/evementioning
confidence: 99%
See 3 more Smart Citations
“…(7). Using the normalization of the ancilla states and taking into account the expression (4), we can prove that …”
Section: Appendix A: the Optimal Mutual Information Alice/evementioning
confidence: 99%
“…The cases with two and four bases are studied analytically in [7], while in [10,11] the case with three mutually unbiased bases is studied numerically. The results obtained both with the most general unitary eavesdropping strategy and with the optimal quantum cloning machine are exactly the same.…”
Section: B Three Mutually Unbiased Basesmentioning
confidence: 99%
See 2 more Smart Citations
“…Then two mutually unbiased pairs of a maximally entangled basis and an unextendible maximally entangled system are constructed; lastly, explicit constructions are obtained for mutually unbiased MEB and UMES in C 2 ⊗C 4 and C 2 ⊗ C 8 , respectively. [5,6], mean king problem [7], quantum teleportation and superdense coding [8][9][10], and in quantifying wave-particle duality in multipath interferometers [4]. Two orthogonal bases…”
mentioning
confidence: 99%