{"id":"https://openalex.org/W2399372650","doi":"https://doi.org/10.26421/qic15.15-16-2","title":"A qutrit quantum key distribution protocol using Bell inequalities with larger violation capabilities","display_name":"A qutrit quantum key distribution protocol using Bell inequalities with larger violation capabilities","publication_year":2015,"publication_date":"2015-11-01","ids":{"openalex":"https://openalex.org/W2399372650","doi":"https://doi.org/10.26421/qic15.15-16-2","mag":"2399372650"},"language":"en","primary_location":{"id":"doi:10.26421/qic15.15-16-2","is_oa":false,"landing_page_url":"https://doi.org/10.26421/qic15.15-16-2","pdf_url":null,"source":{"id":"https://openalex.org/S41034432","display_name":"Quantum Information and Computation","issn_l":"1533-7146","issn":["1533-7146"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322612","host_organization_name":"Rinton Press","host_organization_lineage":["https://openalex.org/P4310322612"],"host_organization_lineage_names":["Rinton Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Quantum Information and Computation","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083939066","display_name":"Zo\u00e9 Amblard","orcid":null},"institutions":[{"id":"https://openalex.org/I4210093397","display_name":"XLIM","ror":"https://ror.org/00f7srh09","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I32881790","https://openalex.org/I4210093397","https://openalex.org/I4210095849","https://openalex.org/I65806277"]},{"id":"https://openalex.org/I65806277","display_name":"Universit\u00e9 de Limoges","ror":"https://ror.org/02cp04407","country_code":"FR","type":"education","lineage":["https://openalex.org/I65806277"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Zoe Amblard","raw_affiliation_strings":["XLIM Laboratory, University of Limoges#TAB#"],"affiliations":[{"raw_affiliation_string":"XLIM Laboratory, University of Limoges#TAB#","institution_ids":["https://openalex.org/I4210093397","https://openalex.org/I65806277"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004451982","display_name":"Franc\u0328ois Arnault","orcid":null},"institutions":[{"id":"https://openalex.org/I4210093397","display_name":"XLIM","ror":"https://ror.org/00f7srh09","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I32881790","https://openalex.org/I4210093397","https://openalex.org/I4210095849","https://openalex.org/I65806277"]},{"id":"https://openalex.org/I65806277","display_name":"Universit\u00e9 de Limoges","ror":"https://ror.org/02cp04407","country_code":"FR","type":"education","lineage":["https://openalex.org/I65806277"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Francois Arnault","raw_affiliation_strings":["XLIM Laboratory, University of Limoges#TAB#"],"affiliations":[{"raw_affiliation_string":"XLIM Laboratory, University of Limoges#TAB#","institution_ids":["https://openalex.org/I4210093397","https://openalex.org/I65806277"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5083939066"],"corresponding_institution_ids":["https://openalex.org/I4210093397","https://openalex.org/I65806277"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15395138,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"15","issue":"15&16","first_page":"1295","last_page":"1306"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10622","display_name":"Quantum Mechanics and Applications","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3107","display_name":"Atomic and Molecular Physics, and Optics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.7385050058364868},{"id":"https://openalex.org/keywords/quantum-key-distribution","display_name":"Quantum key distribution","score":0.7106541395187378},{"id":"https://openalex.org/keywords/bells-theorem","display_name":"Bell's theorem","score":0.6766822934150696},{"id":"https://openalex.org/keywords/qutrit","display_name":"Qutrit","score":0.6135217547416687},{"id":"https://openalex.org/keywords/bell-state","display_name":"Bell state","score":0.6106663942337036},{"id":"https://openalex.org/keywords/chsh-inequality","display_name":"CHSH inequality","score":0.5178363919258118},{"id":"https://openalex.org/keywords/qubit","display_name":"Qubit","score":0.5108937621116638},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.49215930700302124},{"id":"https://openalex.org/keywords/bell-test-experiments","display_name":"Bell test experiments","score":0.48903688788414},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4672156870365143},{"id":"https://openalex.org/keywords/observable","display_name":"Observable","score":0.4331844449043274},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.42880979180336},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.40373995900154114},{"id":"https://openalex.org/keywords/quantum-entanglement","display_name":"Quantum entanglement","score":0.3823934495449066},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3731371760368347},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.3221524655818939},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.30472075939178467},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.28310444951057434},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.2366330623626709},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20600441098213196}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.7385050058364868},{"id":"https://openalex.org/C95466800","wikidata":"https://www.wikidata.org/wiki/Q1027298","display_name":"Quantum key distribution","level":3,"score":0.7106541395187378},{"id":"https://openalex.org/C128108043","wikidata":"https://www.wikidata.org/wiki/Q388525","display_name":"Bell's theorem","level":4,"score":0.6766822934150696},{"id":"https://openalex.org/C56085360","wikidata":"https://www.wikidata.org/wiki/Q2300171","display_name":"Qutrit","level":4,"score":0.6135217547416687},{"id":"https://openalex.org/C118704821","wikidata":"https://www.wikidata.org/wiki/Q2898260","display_name":"Bell state","level":4,"score":0.6106663942337036},{"id":"https://openalex.org/C134265032","wikidata":"https://www.wikidata.org/wiki/Q5011347","display_name":"CHSH inequality","level":5,"score":0.5178363919258118},{"id":"https://openalex.org/C203087015","wikidata":"https://www.wikidata.org/wiki/Q378201","display_name":"Qubit","level":3,"score":0.5108937621116638},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.49215930700302124},{"id":"https://openalex.org/C11511207","wikidata":"https://www.wikidata.org/wiki/Q1054240","display_name":"Bell test experiments","level":5,"score":0.48903688788414},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4672156870365143},{"id":"https://openalex.org/C32848918","wikidata":"https://www.wikidata.org/wiki/Q845789","display_name":"Observable","level":2,"score":0.4331844449043274},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.42880979180336},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.40373995900154114},{"id":"https://openalex.org/C121040770","wikidata":"https://www.wikidata.org/wiki/Q215675","display_name":"Quantum entanglement","level":3,"score":0.3823934495449066},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3731371760368347},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.3221524655818939},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.30472075939178467},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.28310444951057434},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.2366330623626709},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20600441098213196},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.26421/qic15.15-16-2","is_oa":false,"landing_page_url":"https://doi.org/10.26421/qic15.15-16-2","pdf_url":null,"source":{"id":"https://openalex.org/S41034432","display_name":"Quantum Information and Computation","issn_l":"1533-7146","issn":["1533-7146"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322612","host_organization_name":"Rinton Press","host_organization_lineage":["https://openalex.org/P4310322612"],"host_organization_lineage_names":["Rinton Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Quantum Information and Computation","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W205681532","https://openalex.org/W1578365727","https://openalex.org/W1993575104","https://openalex.org/W2010782321","https://openalex.org/W2030098988","https://openalex.org/W2051051926","https://openalex.org/W2073418843","https://openalex.org/W2098605719","https://openalex.org/W2114538431","https://openalex.org/W2130297977","https://openalex.org/W2133834278","https://openalex.org/W2157496454","https://openalex.org/W2160819312","https://openalex.org/W3099447306","https://openalex.org/W3177462701"],"related_works":["https://openalex.org/W1534074637","https://openalex.org/W2344277531","https://openalex.org/W3102576463","https://openalex.org/W1983779473","https://openalex.org/W2108636330","https://openalex.org/W2593474125","https://openalex.org/W2951338881","https://openalex.org/W2047897334","https://openalex.org/W4231313112","https://openalex.org/W3091608756"],"abstract_inverted_index":{"The":[0,23,92],"Ekert":[1,40],"quantum":[2],"key":[3],"distribution":[4],"protocol":[5,25,173],"[1]":[6],"uses":[7,27,69],"pairs":[8,29,70],"of":[9,30,71,77,121,148,153,171],"entangled":[10,31,72],"qubits":[11],"and":[12,54,99,140],"performs":[13,43],"checks":[14,44],"based":[15,45],"on":[16,46],"a":[17,47,64,78,161,169],"Bell":[18,48,79],"inequality":[19,49,80,94,109],"to":[20,33,137,144],"detect":[21],"eavesdropping.":[22],"3DEB":[24],"[2]":[26],"instead":[28],"qutrits":[32,51],"achieve":[34],"better":[35,83],"noise":[36,84],"resistance":[37,85],"than":[38,86],"the":[39,87,107,130,134,146,151,158],"protocol.":[41],"It":[42],"for":[50],"named":[52],"CHSH-3":[53,116],"found":[55],"in":[56,90,102,115],"[3,":[57],"4].":[58],"In":[59,150],"this":[60,155],"paper,":[61],"we":[62],"present":[63],"new":[65],"protocol,":[66],"which":[67,81,123,174],"also":[68,118,167],"qutrits,":[73],"but":[74,117],"gaining":[75],"advantage":[76],"achieves":[82],"one":[88],"used":[89,114],"3DEB.":[91],"latter":[93],"is":[95,175],"called":[96],"here":[97],"hCHSH-3":[98,108],"was":[100],"discovered":[101],"[5].":[103],"For":[104],"each":[105],"party,":[106],"involves":[110],"four":[111],"observables":[112,122,135],"already":[113],"two":[119],"products":[120,139],"do":[124],"not":[125],"commute.":[126],"We":[127,166],"explain":[128],"how":[129],"parties":[131],"can":[132],"measure":[133],"corresponding":[136],"these":[138],"thus":[141],"are":[142],"able":[143],"check":[145],"violation":[147,156],"hCHSH-3.":[149],"presence":[152],"noise,":[154],"guarantees":[157],"security":[159],"against":[160,177],"local":[162],"Trojan":[163],"horse":[164],"attack.":[165],"designed":[168],"version":[170],"our":[172],"secure":[176],"individual":[178],"attacks.":[179]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
