General quantum key distribution in higher dimension

We study a general quantum key distribution protocol in higher dimension. In this protocol, quantum states in arbitrary g+1 (1≤g≤d) out of all d+1 mutually unbiased bases in a d-dimensional system can be used for the key encoding. This provides a natural generalization of the quantum key distributio...

Full description

Bibliographic Details
Main Authors: Shi, Han-Duo (Author), Wang, Yi-Nan (Author), Jing, Li (Author), Lei, Jin (Author), Mu, Liang-Zhu (Author), Fan, Heng (Author), Xiong, Zhaoxi (Contributor)
Other Authors: Massachusetts Institute of Technology. Department of Physics (Contributor)
Format: Article
Language:English
Published: American Physical Society, 2012-04-27T17:04:24Z.
Subjects:
Online Access:Get fulltext
LEADER 02107 am a22002893u 4500
001 70452
042 |a dc 
100 1 0 |a Shi, Han-Duo  |e author 
100 1 0 |a Massachusetts Institute of Technology. Department of Physics  |e contributor 
100 1 0 |a Xiong, Zhaoxi  |e contributor 
100 1 0 |a Xiong, Zhaoxi  |e contributor 
700 1 0 |a Wang, Yi-Nan  |e author 
700 1 0 |a Jing, Li  |e author 
700 1 0 |a Lei, Jin  |e author 
700 1 0 |a Mu, Liang-Zhu  |e author 
700 1 0 |a Fan, Heng  |e author 
700 1 0 |a Xiong, Zhaoxi  |e author 
245 0 0 |a General quantum key distribution in higher dimension 
260 |b American Physical Society,   |c 2012-04-27T17:04:24Z. 
856 |z Get fulltext  |u http://hdl.handle.net/1721.1/70452 
520 |a We study a general quantum key distribution protocol in higher dimension. In this protocol, quantum states in arbitrary g+1 (1≤g≤d) out of all d+1 mutually unbiased bases in a d-dimensional system can be used for the key encoding. This provides a natural generalization of the quantum key distribution in higher dimension and recovers the previously known results for g=1 and d. In our investigation, we study Eve's attack by two slightly different approaches. One is considering the optimal cloner of Eve, and the other, defined as the optimal attack, is maximizing Eve's information. We derive results for both approaches and show the deviation of the optimal cloner from the optimal attack. With our systematic investigation of the quantum key distribution protocols in higher dimension, one may balance the security gain and the implementation cost by changing the number of bases in the key encoding. As a side product, we also prove the equivalency between the optimal phase covariant quantum cloning machine and the optimal cloner for the g=d−1 quantum key distribution. 
520 |a National Natural Science Foundation (China) (10974247) 
520 |a National Basic Research Program of China (973 Program) (2010CB922904) 
520 |a National Fund for Fostering Talents of Basic Science (J1030310) 
546 |a en_US 
655 7 |a Article 
773 |t Physical Review A