Quantum key distribution using vacuum-one-photon qubits: maximum number of transferable bits per particle
نویسندگان
چکیده
Department of Physics, Korea Advanced Institute of Science and Technology, Daejeon 305-701, Korea School of Computational Sciences, Korea Institute for Advanced Study, 207-43 Cheongryangri-dong, Dongdaemun-gu, Seoul 130-012, Korea Department of Physics and Astronomy, Hunter College of The City University of New York, 695 Park Avenue, New York, NY 10065 Department of Energy Resources Development, Jungwon University, 5 dongburi, Goesan-eup, Goesan-gun, Chungbuk 367-805, Korea
منابع مشابه
Quantum Cryptography via Parametric Downconversion
The use of quantum bits (qubits) in cryptography holds the promise of secure cryptographic quantum key distribution schemes. It is based usually on single-photon polarization states. Unfortunately, the implemented “qubits” in the usual weak pulse experiments are not true two-level systems, and quantum key distribution based on these imperfect qubits is totally insecure in the presence of high (...
متن کاملT-QUAKE Quantum Mechanical Microchip
Delivering quantum-encoded secret keys is known as Quantum Key Distribution, or QKD; in essence it involves transmitting a series of randomly generated, quantum-encoded bits of information between a sender and a receiver, Alice and Bob, over a distance. This string of bits, called qubits, becomes the secret key Alice and Bob use to interpret encoded messages sent over less-secure channels. In t...
متن کاملProvably Secure Quantum Key Distribution By Applying Quantum Gate
The need for Quantum Key Distribution (QKD) is strengthening due to its inalienable principles of quantum mechanics. QKD commences when sender transforms bits into qubits or quantum states by applying photon polarization and sends to the receiver. The qubits are altered when measured in incorrect polarization and cannot be reproduced according to quantum mechanics principles. BB84 protocol is t...
متن کاملQuantum Encoder and Decoder for Secret Key Distribution with Check Bits
The focus of this study is to develop a novel method of encoding the qubits and use as secret key in public key cryptography. In BB 84 protocol, 50% of the random number (generated at source) is used as secret key and the remaining bits are used as “check bits”. The check bits are used to detect the presence of eve as well as the nature of quantum channels. In this protocol, random qubits are e...
متن کاملua nt - p h / 02 08 16 6 v 6 4 J an 2 00 4 Producing the event - ready two photon polarization entangled state with normal photon detectors
We propose a scheme to produce the maximally two photon polarization entangled state (EPR state) with single photon sources and the passive linear optics devices. In particular, our scheme only requires the normal photon detectors which distinguish the vacuum and non-vacuum Fock number states. A sophisticated photon detector distinguishing one-photon state and two-photon state is unnecessary in...
متن کامل