High-dimensional quantum key distribution based on qudits transmission with quantum Fourier transform
العنوان: | High-dimensional quantum key distribution based on qudits transmission with quantum Fourier transform |
---|---|
المؤلفون: | Xing-Yu Yan, Nanrun Zhou, Li-Hua Gong, Yun-Qian Wang, Xiaojun Wen |
المصدر: | Quantum Information Processing. 18 |
بيانات النشر: | Springer Science and Business Media LLC, 2019. |
سنة النشر: | 2019 |
مصطلحات موضوعية: | Decoy state, Computer science, Key distribution, Statistical and Nonlinear Physics, Cryptographic protocol, Quantum key distribution, Theoretical Computer Science, Electronic, Optical and Magnetic Materials, Quantum state, Modeling and Simulation, Signal Processing, Key (cryptography), Quantum Fourier transform, Electrical and Electronic Engineering, Algorithm, Computer Science::Cryptography and Security, Quantum computer |
الوصف: | Historically, the information efficiency of the secret key in quantum key distribution (QKD) schemes based on binary signal formats was limited to 1 bit/particle. An efficient high-dimensional QKD protocol based on qudits transmission with the quantum Fourier transform is proposed. In the proposal, the inherent encoding framework provides a secure solution to key distribution, where the secret information can be hidden into the relative phases of the generated high-dimensional entangled state by performing the quantum Fourier transform and the quantum controlled-NOT gate. After the reverse operations are carried out, the key information can be decoded with the single-particle measurement chosen from two mutually unbiased bases. The secret key taking the form of the high-dimensional quantum state throughout the proposed QKD protocol enables to break the information efficiency limit. Besides, the security of the proposed QKD protocol is guaranteed by the decoy state method and it is proven to be secure even for the photon number splitting attack and the side-channel attack. The cryptographic performance in terms of security and capacity is better than that of traditional cryptographic protocols. |
تدمد: | 1573-1332 1570-0755 |
DOI: | 10.1007/s11128-019-2368-5 |
URL الوصول: | https://explore.openaire.eu/search/publication?articleId=doi_________::bba1fb7980c442972c4c7b470c0a4b03 https://doi.org/10.1007/s11128-019-2368-5 |
Rights: | CLOSED |
رقم الانضمام: | edsair.doi...........bba1fb7980c442972c4c7b470c0a4b03 |
قاعدة البيانات: | OpenAIRE |
تدمد: | 15731332 15700755 |
---|---|
DOI: | 10.1007/s11128-019-2368-5 |