Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Securing QKD Links in the Full Hilbert Space

Securing QKD Links in the Full Hilbert Space Many quantum key distribution QKD analyses examine the link security in a subset of the full Hilbert space that is available to describe the system. In reality, information about the photon state can be embedded in correlations between the polarization space and other dimensions of the full Hilbert space in such a way that Eve can determine the polarization of a photon without affecting it. This paper uses the concept of suitability Hockney et al. “Suitability versus Fidelity for Rating Single Photon Guns” to quantify the available information for Eve to exploit, and demonstrate how it is possible for Alice and Bob to fool themselves into thinking they have a highly secure link. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Quantum Information Processing Springer Journals

Securing QKD Links in the Full Hilbert Space

Loading next page...
 
/lp/springer-journals/securing-qkd-links-in-the-full-hilbert-space-9REW35dbkm

References (31)

Publisher
Springer Journals
Copyright
Copyright © 2005 by Springer Science+Business Media, Inc.
Subject
Physics; Quantum Information Technology, Spintronics; Quantum Computing; Data Structures, Cryptology and Information Theory; Quantum Physics; Mathematical Physics
ISSN
1570-0755
eISSN
1573-1332
DOI
10.1007/s11128-005-3194-5
Publisher site
See Article on Publisher Site

Abstract

Many quantum key distribution QKD analyses examine the link security in a subset of the full Hilbert space that is available to describe the system. In reality, information about the photon state can be embedded in correlations between the polarization space and other dimensions of the full Hilbert space in such a way that Eve can determine the polarization of a photon without affecting it. This paper uses the concept of suitability Hockney et al. “Suitability versus Fidelity for Rating Single Photon Guns” to quantify the available information for Eve to exploit, and demonstrate how it is possible for Alice and Bob to fool themselves into thinking they have a highly secure link.

Journal

Quantum Information ProcessingSpringer Journals

Published: Jan 31, 2005

There are no references for this article.