Unconditionally secure key distribution in higher dimensions by depolarization

被引:58
作者
Chau, HF [1 ]
机构
[1] Univ Hong Kong, Dept Phys, Hong Kong, Hong Kong, Peoples R China
[2] Univ Hong Kong, Ctr Theoret & Comp Phys, Hong Kong, Hong Kong, Peoples R China
关键词
depolarization; entanglement purification; local quantum operation; Pauli error; phase error correction; quantum key distribution; Shor-Preskill proof; two-way classical communication; unconditional security;
D O I
10.1109/TIT.2005.844076
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a prepare-and-measure scheme using N-dimensional quantum particles as information carriers where N is a prime power. One of the key ingredients used to resist eavesdropping in this scheme is to depolarize all Pauli errors introduced to the quantum information carriers. Using the Shor-Preskill-type argument, we prove that this scheme is unconditionally secure against all attacks allowed by the laws of quantum physics. For N = 2(n) > 2, each information carrier can be replaced by n entangled qubits. In this case, there is a family of eavesdropping attacks on which no unentangled-qubit-based prepare-and-measure (PM) quantum key distribution scheme known to date can generate a provably secure key. In contrast, under the same family of attacks, our entangled-qubit-based scheme remains secure whenever 2(n) >= 4. This demonstrates the advantage of using entangled particles as information carriers and of using depolarization of Pauli errors to combat eavesdropping attacks more drastic than those that can be handled by unentangled-qubit-based prepare-and-measure schemes.
引用
收藏
页码:1451 / 1468
页数:18
相关论文
共 37 条
[1]   Efficient bipartite quantum state purification in arbitrary dimensional Hilbert spaces [J].
Alber, G ;
Delgado, A ;
Gisin, N ;
Jex, I .
JOURNAL OF PHYSICS A-MATHEMATICAL AND GENERAL, 2001, 34 (42) :8821-8833
[2]  
ALBERT AA, 1959, ILLINOIS J MATH, V3, P421
[3]   Nonbinary quantum stabilizer codes [J].
Ashikhmin, A ;
Knill, E .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (07) :3065-3072
[4]   A new proof for the existence of mutually unbiased bases [J].
Bandyopadhyay, S ;
Boykin, PO ;
Roychowdhury, V ;
Vatan, F .
ALGORITHMICA, 2002, 34 (04) :512-528
[5]   Quantum cryptography using larger alphabets [J].
Bechmann-Pasquinucci, H ;
Tittel, W .
PHYSICAL REVIEW A, 2000, 61 (06) :6
[6]   Quantum cryptography with 3-state systems [J].
Bechmann-Pasquinucci, H ;
Peres, A .
PHYSICAL REVIEW LETTERS, 2000, 85 (15) :3313-3316
[7]  
Bennett C.H., 1984, P IEEE INT C COMP SY, P175, DOI DOI 10.1016/J.TCS.2014.05.025
[8]  
Bennett CH, 1996, PHYS REV A, V54, P3824, DOI 10.1103/PhysRevA.54.3824
[9]   REDUCTION OF QUANTUM ENTROPY BY REVERSIBLE EXTRACTION OF CLASSICAL INFORMATION [J].
BENNETT, CH ;
BRASSARD, G ;
JOZSA, R ;
MAYERS, D ;
PERES, A ;
SCHUMACHER, B ;
WOOTTERS, WK .
JOURNAL OF MODERN OPTICS, 1994, 41 (12) :2307-2314
[10]  
Biham E., 2000, Proceedings of the Thirty Second Annual ACM Symposium on Theory of Computing, P715, DOI 10.1145/335305.335406