Security of Quantum Key Distribution Using [Formula presented]-Level Systems

Nicolas J. Cerf, Mohamed Bourennane, Anders Karlsson, Nicolas Gisin

Research output: Contribution to journalArticlepeer-review

404 Scopus citations

Abstract

We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e., quantum states in a [Formula presented]-dimensional Hilbert space. The first cryptosystem uses two mutually unbiased bases (thereby extending the BB84 scheme), while the second exploits all [Formula presented] available such bases (extending the six-state protocol for qubits). We derive the information gained by a potential eavesdropper applying a cloning-based individual attack, along with an upper bound on the error rate that ensures unconditional security against coherent attacks.

Original languageEnglish
Pages (from-to)4
Number of pages1
JournalPhysical Review Letters
Volume88
Issue number12
DOIs
StatePublished - 2002
Externally publishedYes

Fingerprint

Dive into the research topics of 'Security of Quantum Key Distribution Using [Formula presented]-Level Systems'. Together they form a unique fingerprint.

Cite this