Abstract
The main aim of the quantum cryptography protocols is the maximal secrecy under the conditions of the real experiment. This work presents the result of the new protocol building with the use of the secrecy maximization. While using some well known approaches this method has allowed to achieve the completely new results in quantum cryptography. The process of the protocol elaboration develops from the standard BB84 protocol upgrading to the building of completely new protocol with arbitrary large bases number. The secrecy proofs of the elaborated protocol appear to be natural continuation of the protocol building process. This approach reveals possibility to reach extremely high parameters of the protocol. It suits both the restrictions of contemporary technologies and requirements for high bit rate while being absolutely secret.
Similar content being viewed by others
References
C. H. Bennett and G. Brassard, in Proc. of IEEE Intern. Conf. on Computers, Systems and Signal Processing (Bangalore, India, 1984), vol. 1, pp. 175–179.
N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, Rev. Mod. Phys. 74, 145 (2002).
P. W. Shor and J. Preskill, Phys. Rev. Lett. 85, 441 (2000); quant-ph/0003004.
V. Scarani, S. Iblisdir, and N. Gisin, Rev. Mod. Phys. 77, 1225 (2005).
Y. Kurochkin and V. L. Kurochkin, in Proc. of the IV Intern. Symp. on Modern Problem of Laser Physics (Novosibirsk, Russia, 2004), p. 265.
A. Acin, N. Gisin, and V. Scarani, Phys. Rev. A 69, 012309 (2004); arXiv:quant-ph/0302037.
Y. Kurochkin, Proc. SPIE Quantum Inform. 5833, 213 (2005).
V. Giovannetti, S. Lloyd, and L. Maccone, Science 306, 1330 (2004).
V. Giovannetti, S. Lloyd, and L. Maccone, Phys. Rev. Lett. 96, 010401 (2006).
Author information
Authors and Affiliations
Additional information
The article is published in the original.