Abstract
Quantum Key Distribution (QKD) is used for generating key between two legitimate user Alice and Bob. In the past decade, QKD using qubit has been investigated for different cryptographic strategies. Analysis of qutrit photon states in QKD is theoretically investigated and different eavesdropping strategies have been discussed in this paper. Modified two stage Positive Operator Value Measurement (POVM) is used to determine the qutrit states. An expression for error rate in data transmission has been formulated both in case of entangled and opaque eavesdropping. A protocol for encryption of data in qutrit states in one-time-pad scheme is initiated to improve on information reconciliation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ekert, A.K., Huttner, B., Palma, G.M., Peres, A.: Phys. Rev. A 50, 1047 (1994)
Bennett, C.H., Bassard, G.: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, p. 175. IEEE, New York (1984)
Brandt, H.E., Myers, J.M., Lomonaco, S.J.: Phys. Rev. A 56, 4456 (1997)
Ekert, A.K., Rarity, J.G., Tapster, P.R., Palma, G.M.: Phys. Rev. Lett. 69, 1293 (1992)
Wooters, W.K., Zurek, W.H.: Nature (London) 299, 802 (1982)
Fuchs, C.A., Peres, A.: Phys. Rev. A 53, 2038 (1996)
Fuchs, C.A., Gisin, N., Griffiths, R.B., Niu, C.S., Peres, A.: Phys. Rev. A 56, 1163 (1997)
Peres, A.: Quantum Theory: Concepts and Methods (Kluwer, Dordrecht, 1993), Chap. 9
Myres, J.M., Brandt, H.E.: Meas. Sci. Technol. 8, 1222 (1997)
Hong, C.K., Ou, Z.Y., Mandel, L.: Phys. Rev. Lett. 59, 2044 (1987)
Bouwmeester, D., Pan, J.-W., Daniell, M., Weinfurter, H., Zeilinger, A.: Phys. Rev. Lett. 82, 1345 (1999)
Eibl, M., Keissel, N., Bourennane, M., Kurtsiefer, C., Weinfurter, H.: Rev. Lett. 92, 77901 (2004)
Knill, E., Laflamme, R., Milburn, G.J.: Nature (London) 409, 46 (2001)
Schaeff, C., Polster, R., Lapkiewicz, R., Fickler, R., Ramelow, S., Zeilinger, A.: Opt. Exp. 20, 16145 (2012)
Reck, M., Zeilinger, A., Bernstein, H.J., Bertani, P.: Phys. Rev. Lett. 73, 58 (1994)
Zukowski, M., Zeilinger, A., Horne, M.A.: Phys. Rev. A 55, 2564 (1997)
Li, H.W., Przeslak, S., Niskanen, A.O., Matthews, J.C.F., Politi, A., Shadbolt, P., Laing, A., Lobino, M., Thompson, M.G., O’Brien, J.L.: New J. Phys. 13, 115009 (2011)
Laing, A., Peruzzo, A., Politi, A., Verde, M.R., Halder, M., Ralph, T.C., Thompson, M.G., O’Brien, J.L.: Appl. Phys. Lett. 97, 211109 (2010)
Peruzzo, A., Laing, A., Politi, A., Rudolph, T., O’Brien, J.L.: Nat. Commun. 2, 224 (2011)
Matthews, J.C.F., Politi, A., Stefanov, A., O’Brien, J.L.: Nat. Photon. 3, 346 (2009)
Bechmann-Pasquinucci, H., Peres, A.: Phys. Rev. Lett. 85, 3313 (2000)
Gelo Noel Tabia, M.: Phys. Rev. A 86, 062107 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Banerjee, S., Maiti, B., Saha, B. (2017). Analysis of Eavesdropping in QKD with Qutrit Photon States. In: Chaki, R., Saeed, K., Cortesi, A., Chaki, N. (eds) Advanced Computing and Systems for Security. Advances in Intelligent Systems and Computing, vol 567. Springer, Singapore. https://doi.org/10.1007/978-981-10-3409-1_11
Download citation
DOI: https://doi.org/10.1007/978-981-10-3409-1_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3408-4
Online ISBN: 978-981-10-3409-1
eBook Packages: EngineeringEngineering (R0)