Security of Quantum Key Distribution Using d-Level Systems

Nicolas J. Cerf, Mohamed Bourennane, Anders Karlsson, and Nicolas Gisin
Phys. Rev. Lett. 88, 127902 – Published 8 March 2002
PDFExport Citation

Abstract

We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e., quantum states in a d-dimensional Hilbert space. The first cryptosystem uses two mutually unbiased bases (thereby extending the BB84 scheme), while the second exploits all d+1 available such bases (extending the six-state protocol for qubits). We derive the information gained by a potential eavesdropper applying a cloning-based individual attack, along with an upper bound on the error rate that ensures unconditional security against coherent attacks.

  • Received 26 July 2001

DOI:https://doi.org/10.1103/PhysRevLett.88.127902

©2002 American Physical Society

Authors & Affiliations

Nicolas J. Cerf1,2, Mohamed Bourennane3, Anders Karlsson3, and Nicolas Gisin4

  • 1Ecole Polytechnique, CP 165, Université Libre de Bruxelles, 1050 Bruxelles, Belgium
  • 2Jet Propulsion Laboratory, California Institute of Technology, Pasadena, California 91109
  • 3Department of Microelectronics and Information Technology, Royal Institute of Technology (KTH), Electrum 229, SE-164 Kista, Sweden
  • 4GAP-Optique, Université de Genève, 20 rue de l'Ecole de Médecine, Genève 4, Switzerland

References (Subscription Required)

Click to Expand
Issue

Vol. 88, Iss. 12 — 25 March 2002

Reuse & Permissions
Access Options
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review Letters

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×