Security bound of two-basis quantum-key-distribution protocols using qudits

Georgios M. Nikolopoulos and Gernot Alber
Phys. Rev. A 72, 032320 – Published 16 September 2005

Abstract

We investigate the security bounds of quantum-cryptographic protocols using d-level systems. In particular, we focus on schemes that use two mutually unbiased bases, thus extending the Bennett-Brassard 1984 quantum-key-distribution scheme to higher dimensions. Under the assumption of general coherent attacks, we derive an analytic expression for the ultimate upper security bound of such quantum-cryptography schemes. This bound is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions such an equivalence is generally no longer valid.

  • Figure
  • Figure
  • Received 21 January 2005

DOI:https://doi.org/10.1103/PhysRevA.72.032320

©2005 American Physical Society

Authors & Affiliations

Georgios M. Nikolopoulos and Gernot Alber

  • Institut für Angewandte Physik, Technische Universität Darmstadt, 64289 Darmstadt, Germany

Article Text (Subscription Required)

Click to Expand

References (Subscription Required)

Click to Expand
Issue

Vol. 72, Iss. 3 — September 2005

Reuse & Permissions
Access Options
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review A

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×