메뉴 건너뛰기




Volumn 3, Issue 6, 2003, Pages 563-580

Security bounds in quantum cryptography using d-level systems

Author keywords

Key Distillation; Quantum Cryptography; Quantum Distillation

Indexed keywords

CLONE CELLS; DISTILLATION; DISTILLERIES; QUANTUM CRYPTOGRAPHY;

EID: 0345414500     PISSN: 15337146     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Review
Times cited : (59)

References (45)
  • 1
    • 0036013605 scopus 로고    scopus 로고
    • N. Gisin, G. Ribordy, W. Tittel, H. Zbinden, Rev. Mod. Phys 74, 145 (2002); The Physics of Quantum Information, ed. by D. Bouwmeester, A. Ekert and A. Zeilinger, Springer-Verlag (2000).
    • (2002) Rev. Mod. Phys , vol.74 , pp. 145
    • Gisin, N.1    Ribordy, G.2    Tittel, W.3    Zbinden, H.4
  • 3
    • 0344078722 scopus 로고    scopus 로고
    • quant-ph/9802025
    • This argument has to be understood in a rather qualitative way. Proofs of unconditional security are much more involved, see for instance D. Mayers, quant-ph/9802025; H.-K. Lo and H. F. Chau, Science 283, 2050 (1999); P. W. Shor and J. Preskill, Phys. Rev. Lett. 85, 441 (2000).
    • Mayers, D.1
  • 4
    • 0033605546 scopus 로고    scopus 로고
    • This argument has to be understood in a rather qualitative way. Proofs of unconditional security are much more involved, see for instance D. Mayers, quant-ph/9802025; H.-K. Lo and H. F. Chau, Science 283, 2050 (1999); P. W. Shor and J. Preskill, Phys. Rev. Lett. 85, 441 (2000).
    • (1999) Science , vol.283 , pp. 2050
    • Lo, H.-K.1    Chau, H.F.2
  • 5
    • 0347090658 scopus 로고    scopus 로고
    • This argument has to be understood in a rather qualitative way. Proofs of unconditional security are much more involved, see for instance D. Mayers, quant-ph/9802025; H.-K. Lo and H. F. Chau, Science 283, 2050 (1999); P. W. Shor and J. Preskill, Phys. Rev. Lett. 85, 441 (2000).
    • (2000) Phys. Rev. Lett. , vol.85 , pp. 441
    • Shor, P.W.1    Preskill, J.2
  • 14
    • 0004586188 scopus 로고
    • The existence of d + 1 bases has been (constructively) demonstrated only when d is a power of a prime number: W.K. Wootters and B.D. Fields, Ann. Phys. (N.Y.) 191, 363 (1989).
    • (1989) Ann. Phys. (N.Y.) , vol.191 , pp. 363
    • Wootters, W.K.1    Fields, B.D.2
  • 16
    • 0343152990 scopus 로고
    • The use of two-qubit entangled states for a secure key distribution was originally proposed in A. Ekert, Phys. Rev. Lett. 67, 661 (1991). There, Eve's intervencion is detected by checking the violation of a Bell inequality.
    • (1991) Phys. Rev. Lett. , vol.67 , pp. 661
    • Ekert, A.1
  • 18
    • 0345372015 scopus 로고    scopus 로고
    • note
    • Note that it is assumed the (unproven) existence of the d + 1 maximally conjugated bases for all dimension.
  • 19
    • 11544350211 scopus 로고    scopus 로고
    • D. Bruss, Phys. Rev. Lett. 81, 3018 (1998); H. Bechmann-Pasquinucci and N. Gisin, Phys. Rev. A 59, 4238 (1999).
    • (1998) Phys. Rev. Lett. , vol.81 , pp. 3018
    • Bruss, D.1
  • 22
    • 0001283653 scopus 로고    scopus 로고
    • N. J. Cerf, Phys. Rev. Lett. 84, 4497 (2000); J. Mod. Opt. 47, 187 (2000); Acta Phys. Slov. 48, 115 (1998).
    • (2000) Phys. Rev. Lett. , vol.84 , pp. 4497
    • Cerf, N.J.1
  • 23
    • 0034652056 scopus 로고    scopus 로고
    • N. J. Cerf, Phys. Rev. Lett. 84, 4497 (2000); J. Mod. Opt. 47, 187 (2000); Acta Phys. Slov. 48, 115 (1998).
    • (2000) J. Mod. Opt. , vol.47 , pp. 187
  • 24
    • 0032349385 scopus 로고    scopus 로고
    • N. J. Cerf, Phys. Rev. Lett. 84, 4497 (2000); J. Mod. Opt. 47, 187 (2000); Acta Phys. Slov. 48, 115 (1998).
    • (1998) Acta Phys. Slov. , vol.48 , pp. 115
  • 25
    • 0034310204 scopus 로고    scopus 로고
    • and references therein
    • A. Chefles, Contemp. Phys. 41, 401 (2000) and references therein.
    • (2000) Contemp. Phys. , vol.41 , pp. 401
    • Chefles, A.1
  • 26
    • 85111346515 scopus 로고    scopus 로고
    • note
    • ABE into the probability distribution P(A, B, E), Eve's measurements should be specified. As said in section 2, we consider the measurements of Ref. [7], designed for maximizing Eve's information.
  • 27
  • 30
    • 85111346310 scopus 로고    scopus 로고
    • note
    • n such that the intrinsic information converges to 0 when n goes to infinity.
  • 34
    • 0344940737 scopus 로고    scopus 로고
    • quant-ph/0305190
    • C. Sliwa, quant-ph/0305190.
    • Sliwa, C.1
  • 41
    • 0344940698 scopus 로고    scopus 로고
    • PhD Thesis, April 97, Technion, Haifa, Israel, also available as quant-ph/9906073
    • See, for instance, T. Mor, PhD Thesis, April 97, Technion, Haifa, Israel, also available as quant-ph/9906073.
    • Mor, T.1
  • 42
    • 0344509863 scopus 로고    scopus 로고
    • note
    • This type of attacks is not entirely individual, in spite of the fact that the interaction is done symbol by symbol, because the final measurement may include a global entangling operation among all the qudits kept by Eve.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.