Finite-key security analysis for multilevel quantum key distribution
From MaRDI portal
Publication:5855071
Abstract: We present a detailed security analysis of a d-dimensional quantum key distribution protocol based on two and three mutually unbiased bases (MUBs) both in an asymptotic and finite key length scenario. The finite secret key rates are calculated as a function of the length of the sifted key by (i) generalizing the uncertainly relation-based insight from BB84 to any d-level 2-MUB QKD protocol and (ii) by adopting recent advances in the second-order asymptotics for finite block length quantum coding (for both d-level 2- and 3-MUB QKD protocols). Since the finite and asymptotic secret key rates increase with d and the number of MUBs (together with the tolerable threshold) such QKD schemes could in principle offer an important advantage over BB84. We discuss the possibility of an experimental realization of the 3-MUB QKD protocol with the orbital angular momentum degrees of freedom of photons.
Recommendations
- Quantum key distribution using multilevel encoding: security analysis
- Security aspects of quantum cryptography with d-dimensional systems
- Deterministic quantum distribution of a \(d\)-ary key
- Finite-key analysis of a practical decoy-state high-dimensional quantum key distribution
- Equiangular quantum key distribution in more than two dimensions
Cites work
- A Hierarchy of Information Quantities for Finite Block Length Analysis of Quantum Tasks
- A new proof for the existence of mutually unbiased bases
- A single quantum cannot be cloned
- Completely positive linear maps on complex matrices
- Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths
- Conditional expectation in an operator algebra. IV. Entropy and information
- Efficient quantum key distribution scheme and a proof of its unconditional security
- Linear transformations which preserve trace and positive semidefiniteness of operators
- ON MUTUALLY UNBIASED BASES
- Probability inequalities for the sum in sampling without replacement
- Proof of unconditional security of six-state quantum key distribution scheme
- Quantum Wiretap Channel With Non-Uniform Random Number and Its Exponent and Equivocation Rate of Leaked Information
- Quantum cryptography with 3-state systems
- Second-order asymptotics for quantum hypothesis testing
- The Private Classical Capacity and Quantum Capacity of a Quantum Channel
- Universal linear optics
Cited in
(15)- High-dimensional quantum key distribution based on qudits transmission with quantum Fourier transform
- Quantum key distribution using multilevel encoding: security analysis
- Practical security of continuous-variable quantum key distribution involving saturation attack with finite-size analysis
- Security aspects of quantum cryptography with d-dimensional systems
- Finite-key analysis of high-dimensional time-energy entanglement-based quantum key distribution
- Deterministic quantum distribution of a \(d\)-ary key
- Qutrit-based semi-quantum key distribution protocol
- Three-dimensional quantum key distribution in the presence of several eavesdroppers
- Security analysis of KXB10 QKD protocol with higher-dimensional quantum states
- Security bounds in quantum cryptography using \(d\)-level systems
- Mutual weak quantum users key agreement protocol based on semi-honest quantum server
- Finite-key analysis of a practical decoy-state high-dimensional quantum key distribution
- Mutually unbiased bases in 3 and 4 dimensions semi-quantum key distribution protocol
- Efficient information reconciliation in quantum key distribution systems using informed design of non-binary LDPC codes
- scientific article; zbMATH DE number 5989869 (Why is no real title available?)
This page was built for publication: Finite-key security analysis for multilevel quantum key distribution
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5855071)