Change search
ReferencesLink to record
Permanent link

Direct link
Security of quantum key distribution using d-level systems
KTH, Superseded Departments, Microelectronics and Information Technology, IMIT.
2002 (English)In: Physical Review Letters, ISSN 0031-9007, Vol. 88, no 12Article in journal (Refereed) Published
Abstract [en]

We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e., quantum states in a d-dimensional Hilbert space. The first cryptosystem uses two mutually unbiased bases (thereby extending the BB84 scheme), while the second exploits all d + 1 available such bases (extending the six-state protocol for qubits). We derive the information gained by a potential eavesdropper applying a cloning-based individual attack, along with an upper bound on the error rate that ensures unconditional security against coherent attacks.

Place, publisher, year, edition, pages
2002. Vol. 88, no 12
Keyword [en]
cryptography, cloning, information, protocol
URN: urn:nbn:se:kth:diva-21401DOI: 10.1103/PhysRevLett.88.127902ISI: 000174542000072OAI: diva2:340099
QC 20100525Available from: 2010-08-10 Created: 2010-08-10Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full text

Search in DiVA

By author/editor
Karlsson, Anders
By organisation
Microelectronics and Information Technology, IMIT
In the same journal
Physical Review Letters

Search outside of DiVA

GoogleGoogle Scholar
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Altmetric score

Total: 21 hits
ReferencesLink to record
Permanent link

Direct link