2020
DOI: 10.48550/arxiv.2012.14275
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Security proof for qudit-system-based quantum cryptography against entanglement-measurement attack

Zhaoxu Ji,
Peiru Fan,
Huanguo Zhang

Abstract: By using decoy photon technology, quantum cryptography can resist many famous attacks, such as intercept-resend attack, entanglement-resend attack and entanglement-measurement attack. In d-level systems, two groups of non orthogonal bases composed of a group of d-level single particles and the single particles after quantum Fourier transform are widely used as decoy photons. However, the security proof of quantum cryptography protocols against entanglementmeasurement attack using decoy photon technology based … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…In our protocol, we use the decoy photon technology to perform the eavesdropping check, which has been proved that it can resist the well-known attacks, including the intercept-resend attack, measurementresend attack, entanglement-measurement attack and denial-of-service attack [28][29][30].…”
Section: Outsider Attackmentioning
confidence: 99%
“…In our protocol, we use the decoy photon technology to perform the eavesdropping check, which has been proved that it can resist the well-known attacks, including the intercept-resend attack, measurementresend attack, entanglement-measurement attack and denial-of-service attack [28][29][30].…”
Section: Outsider Attackmentioning
confidence: 99%