Abstract
The laws of quantum physics allow the design of cryptographic protocols for which the security is based on physical principles. The main cryptographic quantum protocols are key distribution schemes, in which two parties generate a shared random secret string. The privacy of the key can be checked using Bell inequalities. However, the Bell inequalities initial purpose was a fundamental one, as they showed how quantum rules are incompatible with our intuition of reality.
This paper begins with an introduction about quantum information theory, Bell inequalities, quantum cryptography. Then it presents the use of qudits for Bell inequalities and cryptography.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Acín, A., Durt, T., Gisin, N., Latorre, J.L.: Quantum non-locality in two three level systems. Physical Review A 65, 52325 (2002)
Amblard, Z., Arnault, F.: A qutrit quantum key distribution protocol with better noise resistance (Submitted)
Arnault, F.: A complete set of multidimensional Bell inequalities. Journal of Physics A, Mathematical and Theoretical 45, 255304 (2012)
Bell, J.S.: On the Einstein Podolsky Rosen paradox. Physics 1, 195–200 (1964)
Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, pp. 175–179 (1984)
Chen, J.-L., Kaszlikowski, D., Kwek, L.C., Oh, C.H.: Wringing out new Bell inequalities for three-dimensional systems (qutrits). Modern Physics Letters A 17, 2231 (2002)
Chen, J.L., Kaszlikowski, D., Kwek, L.C., Oh, C.H., Ẑukowski, M.: Entangled three-state systems violate local realism more strongly than qubits: An analytical proof. Physical Review A 64, 052109 (2001)
Clauser, J.F., Horne, M.A., Shimony, A., Holt, R.A.: Proposed experiment to test local hidden variables theories. Physical Review Letters 23, 880 (1969)
Collins, D., Gisin, N., Linden, N., Massar, S., Popescu, S.: Bell inequalities for arbitrarily high-dimensional systems. Physical Review Letters 88, 040404 (2002)
Durt, T., Cerf, N.J., Gisin, N., Ẑukowski, M.: Security of quantum key distribution with entangled qutrits. Physical Review A 67, 012311 (2003)
Durt, T., Kaszlikowski, K., Ẑukowski, M.: Violations of local realism with quantum systems described by N-dimensional Hilbert spaces up to N = 16. Physical Review A 64, 024101 (2001)
Einstein, A., Podolsky, B., Rosen, N.: Can quantum-mechanical description of physical reality be considered complete? Physical Review 47, 777 (1935)
Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Physical Review Letters 67, 661 (1991)
Feynman, R.: Simulating physics with computers. International Journal of Theoretical Physics 21, 467–488 (1982)
Fine, A.: Hidden variables, joint probabilities, and the Bell inequalities. Physical Review Letters 48, 291 (1982)
Fu, L.-B.: General correlation functions of the Clauser-Horne-Shimony-Holt inequality for arbitrarily high-dimensional systems. Physical Review Letters 92, 130404 (2004)
Fu, L.-B., Chen, J.-L., Zhao, X.-G.: Maximal violation of the Clauser-Horne-Shimony-Holt inequality for two qutrits. Physical Review A 68, 022323 (2003)
Ji, S.-W., Lee, J., Lim, J., Nagata, K., Lee, H.-W.: Multisetting Bell inequality for qudits. Physical Review A 78, 052103 (2008)
Kaszlikowski, D., Gnaciński, P., Ẑukowski, M., Miklaszewski, W., Zeilinger, A.: Violations of local realism by two entangled N-dimensional systems are stronger than for two qubits. Physical Review Letters 85, 4418 (2000)
Kaszlikowski, D., Kwek, L.C., Chen, J.L., Ẑukowski, M., Oh, C.H.: Clauser-Horne inequality for three-state systems. Physical Review A 65, 032118 (2002)
Kaszlikowski, D., Oi, D.K.L., Christandl, M., Chang, K., Ekert, A., Kwek, L.C., Oh, C.H.: Quantum cryptography based on qutrit Bell inequalities. Physical Review A 67, 012310 (2003)
Masanes, L., Pironio, S., Acín, A.: Secure device-independent quantum key distribution with causally independent measurement devices. Nature Communications 2, 238, 1244 (2011)
Pironio, S., Acín, A., Massar, S., Boyer de la Giroday, A., Matsukevich, D.N., Maunz, P., Ohmschenk, S., Hayes, D., Luo, L., Manning, T.A., Monroe, C.: Random numbers certified by Bell’s theorem. Nature 464, 1021 (2010)
Werner, R.F., Wolf, M.M.: All-multipartite Bell-correlation inequalities for two dichotomic observables per site. Physical Review A 64, 032112 (2001)
M. Ẑukowski, Brukner, Č.: Bell’s theorem for general N-qubit states. Physical Review Letters 88, 210401 (2002)
Ẑukowski, M., Zeilinger, A., Horne, M.A.: Realizable higher-dimensional two-particle entanglements via multiport beam splitters. Physical Review A 55, 2564 (1997)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Arnault, F. (2015). Multidimensional Bell Inequalities and Quantum Cryptography. In: El Hajji, S., Nitaj, A., Carlet, C., Souidi, E. (eds) Codes, Cryptology, and Information Security. C2SI 2015. Lecture Notes in Computer Science(), vol 9084. Springer, Cham. https://doi.org/10.1007/978-3-319-18681-8_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-18681-8_1
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18680-1
Online ISBN: 978-3-319-18681-8
eBook Packages: Computer ScienceComputer Science (R0)