Security of quantum key distribution using d-level systems
2002 (English)In: Physical Review Letters, ISSN 0031-9007, Vol. 88, no 12Article in journal (Refereed) Published
We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e., quantum states in a d-dimensional Hilbert space. The first cryptosystem uses two mutually unbiased bases (thereby extending the BB84 scheme), while the second exploits all d + 1 available such bases (extending the six-state protocol for qubits). We derive the information gained by a potential eavesdropper applying a cloning-based individual attack, along with an upper bound on the error rate that ensures unconditional security against coherent attacks.
Place, publisher, year, edition, pages
2002. Vol. 88, no 12
cryptography, cloning, information, protocol
IdentifiersURN: urn:nbn:se:kth:diva-21401DOI: 10.1103/PhysRevLett.88.127902ISI: 000174542000072OAI: oai:DiVA.org:kth-21401DiVA: diva2:340099
QC 201005252010-08-102010-08-10Bibliographically approved