Intermediate states in quantum cryptography and Bell inequalities

Intermediate states are known from intercept/resend eavesdropping in the Bennett-Brassard 1984 (BB84) quantum cryptographic protocol. But they also play fundamental roles in the optimal eavesdropping strategy on the BB84 protocol and in the CHSH (Clauser-Horne-Shimony-Holt) inequality. We generalize the intermediate states to an arbitrary dimension and consider intercept/resend eavesdropping, optimal eavesdropping on the generalized BB84 protocol and present a generalized Clauser-Horne-Shimony-Holt inequality for two entangled qudits based on these states.

[1]  Eberhard,et al.  Background level and counter efficiencies required for a loophole-free Einstein-Podolsky-Rosen experiment. , 1993, Physical review. A, Atomic, molecular, and optical physics.

[2]  H. Bechmann-Pasquinucci,et al.  Quantum Cryptography using larger alphabets , 1999, quant-ph/9910095.

[3]  H Bechmann-Pasquinucci,et al.  Quantum cryptography with 3-state systems. , 2000, Physical review letters.

[4]  V. Vedral,et al.  Entanglement measures and purification procedures , 1997, quant-ph/9707035.

[5]  Nicolas Cerf,et al.  Asymmetric quantum cloning machines , 1998 .

[6]  Nicolas Gisin,et al.  Bell inequality for quNits with binary measurements , 2003, Quantum Inf. Comput..

[7]  Santos,et al.  Critical analysis of the empirical tests of local hidden-variable theories. , 1992, Physical review. A, Atomic, molecular, and optical physics.

[8]  N. Gisin,et al.  OPTIMAL EAVESDROPPING IN QUANTUM CRYPTOGRAPHY. I. INFORMATION BOUND AND OPTIMAL STRATEGY , 1997 .

[9]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[10]  M. Horne,et al.  Experimental Consequences of Objective Local Theories , 1974 .

[11]  S. Massar Nonlocality, closing the detection loophole, and communication complexity , 2001, quant-ph/0109008.

[12]  A. Shimony,et al.  Proposed Experiment to Test Local Hidden Variable Theories. , 1969 .

[13]  Cerf,et al.  Pauli cloning of a quantum Bit , 2000, Physical review letters.

[14]  P. Pearle Hidden-Variable Example Based upon Data Rejection , 1970 .

[15]  Anders Karlsson,et al.  Security of quantum key distribution using d-level systems. , 2001, Physical review letters.

[16]  D. Bruß,et al.  Optimal eavesdropping in cryptography with three-dimensional quantum states. , 2001, Physical review letters.

[17]  Nicolas J. Cerf,et al.  Asymmetric quantum cloning in any dimension , 1998, quant-ph/9805024.

[18]  Zeilinger,et al.  Violations of local realism by two entangled N-dimensional systems are stronger than for two qubits , 2000, Physical review letters.