Quantum cryptography based on qutrit Bell inequalities
A crytographic protocol using qutrits which is resistant to a form of symmetric, incoherent attacks is presented. The qutrit Bell inequality provides a sufficient condition for secure communication. The protocol tolerates 33.7% noise, whereas it is 29.2% for E91 or BB84 protocol.
Main Authors: | , , , , , , |
---|---|
Format: | Journal article |
Language: | English |
Published: |
2003
|
_version_ | 1826302358809739264 |
---|---|
author | Kaszlikowski, D Oi, D Christandl, M Chang, K Ekert, A Kwek, L Oh, C |
author_facet | Kaszlikowski, D Oi, D Christandl, M Chang, K Ekert, A Kwek, L Oh, C |
author_sort | Kaszlikowski, D |
collection | OXFORD |
description | A crytographic protocol using qutrits which is resistant to a form of symmetric, incoherent attacks is presented. The qutrit Bell inequality provides a sufficient condition for secure communication. The protocol tolerates 33.7% noise, whereas it is 29.2% for E91 or BB84 protocol. |
first_indexed | 2024-03-07T05:46:21Z |
format | Journal article |
id | oxford-uuid:e75be067-8e9f-4848-956a-94d43a0d98fb |
institution | University of Oxford |
language | English |
last_indexed | 2024-03-07T05:46:21Z |
publishDate | 2003 |
record_format | dspace |
spelling | oxford-uuid:e75be067-8e9f-4848-956a-94d43a0d98fb2022-03-27T10:37:59ZQuantum cryptography based on qutrit Bell inequalitiesJournal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:e75be067-8e9f-4848-956a-94d43a0d98fbEnglishSymplectic Elements at Oxford2003Kaszlikowski, DOi, DChristandl, MChang, KEkert, AKwek, LOh, CA crytographic protocol using qutrits which is resistant to a form of symmetric, incoherent attacks is presented. The qutrit Bell inequality provides a sufficient condition for secure communication. The protocol tolerates 33.7% noise, whereas it is 29.2% for E91 or BB84 protocol. |
spellingShingle | Kaszlikowski, D Oi, D Christandl, M Chang, K Ekert, A Kwek, L Oh, C Quantum cryptography based on qutrit Bell inequalities |
title | Quantum cryptography based on qutrit Bell inequalities |
title_full | Quantum cryptography based on qutrit Bell inequalities |
title_fullStr | Quantum cryptography based on qutrit Bell inequalities |
title_full_unstemmed | Quantum cryptography based on qutrit Bell inequalities |
title_short | Quantum cryptography based on qutrit Bell inequalities |
title_sort | quantum cryptography based on qutrit bell inequalities |
work_keys_str_mv | AT kaszlikowskid quantumcryptographybasedonqutritbellinequalities AT oid quantumcryptographybasedonqutritbellinequalities AT christandlm quantumcryptographybasedonqutritbellinequalities AT changk quantumcryptographybasedonqutritbellinequalities AT ekerta quantumcryptographybasedonqutritbellinequalities AT kwekl quantumcryptographybasedonqutritbellinequalities AT ohc quantumcryptographybasedonqutritbellinequalities |