High-dimensional quantum key distribution based on qudits transmission with quantum Fourier transform

التفاصيل البيبلوغرافية
العنوان: High-dimensional quantum key distribution based on qudits transmission with quantum Fourier transform
المؤلفون: Xing-Yu Yan, Nanrun Zhou, Li-Hua Gong, Yun-Qian Wang, Xiaojun Wen
المصدر: Quantum Information Processing. 18
بيانات النشر: Springer Science and Business Media LLC, 2019.
سنة النشر: 2019
مصطلحات موضوعية: Decoy state, Computer science, Key distribution, Statistical and Nonlinear Physics, Cryptographic protocol, Quantum key distribution, Theoretical Computer Science, Electronic, Optical and Magnetic Materials, Quantum state, Modeling and Simulation, Signal Processing, Key (cryptography), Quantum Fourier transform, Electrical and Electronic Engineering, Algorithm, Computer Science::Cryptography and Security, Quantum computer
الوصف: Historically, the information efficiency of the secret key in quantum key distribution (QKD) schemes based on binary signal formats was limited to 1 bit/particle. An efficient high-dimensional QKD protocol based on qudits transmission with the quantum Fourier transform is proposed. In the proposal, the inherent encoding framework provides a secure solution to key distribution, where the secret information can be hidden into the relative phases of the generated high-dimensional entangled state by performing the quantum Fourier transform and the quantum controlled-NOT gate. After the reverse operations are carried out, the key information can be decoded with the single-particle measurement chosen from two mutually unbiased bases. The secret key taking the form of the high-dimensional quantum state throughout the proposed QKD protocol enables to break the information efficiency limit. Besides, the security of the proposed QKD protocol is guaranteed by the decoy state method and it is proven to be secure even for the photon number splitting attack and the side-channel attack. The cryptographic performance in terms of security and capacity is better than that of traditional cryptographic protocols.
تدمد: 1573-1332
1570-0755
DOI: 10.1007/s11128-019-2368-5
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::bba1fb7980c442972c4c7b470c0a4b03
https://doi.org/10.1007/s11128-019-2368-5
Rights: CLOSED
رقم الانضمام: edsair.doi...........bba1fb7980c442972c4c7b470c0a4b03
قاعدة البيانات: OpenAIRE
الوصف
تدمد:15731332
15700755
DOI:10.1007/s11128-019-2368-5