Title :
Unconditionally secure key distribution in higher dimensions by depolarization
Author_Institution :
Dept. of Phys., Univ. of Hong Kong
fDate :
4/1/2005 12:00:00 AM
Abstract :
This paper presents a prepare-and-measure scheme using N-dimensional quantum particles as information carriers where N is a prime power. One of the key ingredients used to resist eavesdropping in this scheme is to depolarize all Pauli errors introduced to the quantum information carriers. Using the Shor-Preskill-type argument, we prove that this scheme is unconditionally secure against all attacks allowed by the laws of quantum physics. For N=2n>2, each information carrier can be replaced by n entangled qubits. In this case, there is a family of eavesdropping attacks on which no unentangled-qubit-based prepare-and-measure (PM) quantum key distribution scheme known to date can generate a provably secure key. In contrast, under the same family of attacks, our entangled-qubit-based scheme remains secure whenever 2nges4. This demonstrates the advantage of using entangled particles as information carriers and of using depolarization of Pauli errors to combat eavesdropping attacks more drastic than those that can be handled by unentangled-qubit-based prepare-and-measure schemes
Keywords :
error correction; matrix algebra; quantum cryptography; quantum entanglement; telecommunication security; N-dimensional quantum particle; Pauli error; Shor-Preskill-type argument; depolarization; eavesdropping attack; entangled qubits; entanglement purification; phase error correction; prepare-measure scheme; quantum information carrier; quantum key distribution; quantum physics law; unconditional secure key distribution; Art; Councils; Error analysis; Error correction; Information security; Physics; Privacy; Purification; Quantum entanglement; Resists; Depolarization; Pauli error; Shor–Preskill proof; entanglement purification; local quantum operation; phase error correction; quantum key distribution; two-way classical communication; unconditional security;
Journal_Title :
Information Theory, IEEE Transactions on
DOI :
10.1109/TIT.2005.844076