pith. sign in

arxiv: quant-ph/0411092 · v1 · pith:EAJVAQDPnew · submitted 2004-11-12 · 🪐 quant-ph

Secrecy content of two-qubit states

classification 🪐 quant-ph
keywords protocolstatestwo-qubitanalyzeattackchauclassicalcoherent
0
0 comments X
read the original abstract

We analyze the set of two-qubit states from which a secret key can be extracted by single-copy measurements plus classical processing of the outcomes. We introduce a key distillation protocol and give the corresponding necessary and sufficient condition for positive key extraction. Our results imply that the critical error rate derived by Chau, Phys. Rev. A {\bf 66}, 060302 (2002), for a secure key distribution using the six-state scheme is tight. Remarkably, an optimal eavesdropping attack against this protocol does not require any coherent quantum operation.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 1 Pith paper

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Security of deterministic key distribution with higher-dimensional systems

    quant-ph 2025-05 unverdicted novelty 5.0

    Higher-dimensional two-way QKD protocols using mutually unbiased bases and Heisenberg-Weyl operators yield secret keys for stronger individual attacks and improved robustness to collective eavesdropping via entropic u...