Quantum cryptography with polarizing interferometers

نویسنده

  • Marek Czachor
چکیده

In the Ekert cryptographic scheme (E91) [1] pairs of EPR particles were used to generate identical sequences of bits in remote places, while Bell’s theorem certified that the particles were not measured in transit by an eavesdropper. The modification of the Ekert scheme proposed by Bennett, Brassard and Mermin (BBM92) [2] did not use the Bell theorem and was based essentially on the fact that two particles correlated by a singlet state behave similarly to a single particle. A user of the cryptographic channel, traditionally called Alice or Bob, instead of sending a polarized particle through the channel, may make a measurement of polarization of his or her particle and somehow “create” an appropriately polarized object at the other side of the channel. In this way the BBM92 protocol becomes a kind of the original Bennett-Brassard 1984 (BB84) protocol [3] but with “polarization at a distance” [4]. Quantum cryptography based on entangled states is an ingenious practical application of the set of ideas and techniques that were originally developed in order to understand the problem of completeness and limitations of quantum mechanics. Another such application, equally amazing and simultaneously very simple, is the idea of interaction-free measuerements proposed by Elitzur and Vaidman (EV) [5]. Below I will discuss the latter in some detail since the objective of this Letter is to show that combining the ideas of BBM92 and EV one arrives at a particularly suggestive version of a quantum cryptographic scheme. The scheme can be formally shown to be secure by a direct application of the proof given in BBM92. What is interesting, however, its security is so explicit that an explanation of the problem to nonexperts becomes particularly simple. As opposed to the standard schemes one can illustrate the point without referring to technical aspects such as complementarity, non-cloning theorem, or Bell’s theorem with all its loopholes. Let us begin with the EV experiment. It is based on the Mach-Zehnder interferometer consisting of two identical semi-transparent symmetric mirrors (Fig. 1). The action of such mirrors can be described by 2× 2 unitary maps

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Five Lectures on Optical Quantum Computing

1 Light and quantum information 2 Photons as qubits, phase shifters, beam splitters, polarization rotations, polarizing beam splitters, interferometers. 2 Two-qubit gates and the KLM scheme 6 Two-photon entanglement, the KLM approach, Clifford operations, two-photon interference, Hong-Ou-Mandel effect, fusion gates. 3 Cluster states 13 From circuits to clusters, single-qubit gates, two-qubit ga...

متن کامل

Demonstration of an optical quantum controlled-NOT gate without path interference.

We report the first experimental demonstration of an optical quantum controlled-NOT gate without any path interference, where the two interacting path interferometers of the original proposals have been replaced by three partially polarizing beam splitters with suitable polarization dependent transmittance and reflectance. The performance of the device is evaluated using a recently proposed met...

متن کامل

Quantum key distribution based on phase encoding and polarization measurement.

A one-way quantum key distribution scheme based on intrinsically stable Faraday-mirror-type Michelson interferometers with four-port polarizing beam splitters has been demonstrated that can compensate for birefringence effects automatically. The encoding is performed with phase modulators, but decoding is accomplished through measurement of the polarization state of Bob's photons. An extinction...

متن کامل

Quantum Cryptography with Femtosecond Parametric down Conversion

We experimentally demonstrate a quantum cryptography system using two-photon entangled (EPR) states generated via the nonlinear process of spontaneous parametric down conversion pumped by a femtosecond laser. There are two major approaches in quantum cryptography which historically appeared almost simultaneously. One uses the quantum features of single photon states produced by signi cant atten...

متن کامل

" Plug and Play " Systems for Quantum Cryptography

We present a time-multiplexed interferometer based on Faraday mirrors, and apply it to quantum key distribution. The interfering pulses follow exactly the same spatial path, ensuring very high stability and self balancing. Use of Faraday mirrors compensates automatically any birefringence effects and polarization dependent losses in the transmitting fiber. First experimental results show a frin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999