2012
DOI: 10.1103/physreva.85.052310
|View full text |Cite
|
Sign up to set email alerts
|

Symmetries in quantum key distribution and the connection between optimal attacks and optimal cloning

Abstract: We investigate the connection between the optimal collective eavesdropping attack and the optimal cloning attack where the eavesdropper employs an optimal cloner to attack the quantum key distribution (QKD) protocol. The analysis is done in the context of the security proof in Refs. [1,2] for discrete variable protocols in d-dimensional Hilbert spaces. We consider a scenario in which the protocols and cloners are equipped with symmetries. These symmetries are used to define a quantum cloning scenario. We find … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

4
110
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 82 publications
(116 citation statements)
references
References 32 publications
(71 reference statements)
4
110
0
Order By: Relevance
“…This allows us to map our protocol to the key rates, thus arriving at the standard MUB protocol. By increasing the dimension d, we obtain an increase in the secret key rate which has been theoretically observed in recent pa-pers [18,19], resulting in higher key generation rates for dimension d = 4. Similarly the Shannon mutual information increases, demonstrating an improvement in the information capacity.…”
Section: Introductionmentioning
confidence: 78%
See 2 more Smart Citations
“…This allows us to map our protocol to the key rates, thus arriving at the standard MUB protocol. By increasing the dimension d, we obtain an increase in the secret key rate which has been theoretically observed in recent pa-pers [18,19], resulting in higher key generation rates for dimension d = 4. Similarly the Shannon mutual information increases, demonstrating an improvement in the information capacity.…”
Section: Introductionmentioning
confidence: 78%
“…The limit on the tolerable error rate that is safe for secret key generation can be improved by implementing a full set of (d + 1) MUBs [19,24]. Using a full set of MUBs results in an increase in the tolerable error rate in which we can still extract a reasonable secret key without compromising the security of the protocol.…”
Section: Average Error Rate and Secret Key Ratementioning
confidence: 99%
See 1 more Smart Citation
“…Then this entanglement version of 3d-MDI-QKD becomes same with 3-dimensional case of d-dimensional entanglement based protocol proposed in [29]. Security analysis of the ddimensional entanglement based protocol has been studied in the previous works, against individual attack [29] (Eve monitors states separately) and against collective attack [30,31] (Eve monitors several states jointly). According to the results, the secret key rate of 3d-MDI-QKD per sifted key against collective attack is evaluated as…”
Section: Figmentioning
confidence: 99%
“…High dimensional quantum states are applied in QKD protocol as well. There were researches for proving security of QKD using d-dimensional quantum system which is generalized version of original QKD protocol [27][28][29][30][31][32]. These results show that QKD using high dimensional quantum states has higher upper bound on the error rate that ensures unconditional security of the channel.…”
Section: Introductionmentioning
confidence: 99%