Communication channels secured from eavesdropping via transmission of photonic Bell states

被引:94
作者
Shimizu, K [1 ]
Imoto, N [1 ]
机构
[1] Nippon Telegraph & Tel Corp, Basic Res Labs, Kanagawa 2430198, Japan
来源
PHYSICAL REVIEW A | 1999年 / 60卷 / 01期
关键词
D O I
10.1103/PhysRevA.60.157
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
This paper proposes a quantum communication scheme for sending a definite binary sequence while confirming the security of the transmission. The scheme is very suitable for sending a ciphertext in a secret-key cryptosystem so that we can detect any eavesdropper who attempts to decipher the key. Thus we can continue to use a secret key unless we detect eavesdropping and the security of a key that is used repeatedly can be enhanced to the level of one-time-pad cryptography. In our scheme, a pair of entangled photon twins is employed as a bit carrier which is encoded in a two-term superposition of four Bell states. Different bases are employed for encoding the binary sequence of a ciphertext and a random test bit. The photon twins are measured with a Bell state analyzer and any bit can be decoded from the resultant Bell state when the receiver is later notified of the coding basis through a classical channel. By opening the positions and the values of test bits, ciphertext can be read and eavesdropping is simultaneously detected.
引用
收藏
页码:157 / 166
页数:10
相关论文
共 28 条
[1]  
ARDEHALI M, QUANTPH9803007
[2]   EXPERIMENTAL REALIZATION OF EINSTEIN-PODOLSKY-ROSEN-BOHM GEDANKENEXPERIMENT - A NEW VIOLATION OF BELL INEQUALITIES [J].
ASPECT, A ;
GRANGIER, P ;
ROGER, G .
PHYSICAL REVIEW LETTERS, 1982, 49 (02) :91-94
[3]   EXPERIMENTAL TESTS OF REALISTIC LOCAL THEORIES VIA BELLS THEOREM [J].
ASPECT, A ;
GRANGIER, P ;
ROGER, G .
PHYSICAL REVIEW LETTERS, 1981, 47 (07) :460-463
[4]   EXPERIMENTAL TEST OF BELL INEQUALITIES USING TIME-VARYING ANALYZERS [J].
ASPECT, A ;
DALIBARD, J ;
ROGER, G .
PHYSICAL REVIEW LETTERS, 1982, 49 (25) :1804-1807
[5]  
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[6]  
Bennett C. H., 1984, PROC IEEE INT C COMP, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[7]   COMMUNICATION VIA ONE-PARTICLE AND 2-PARTICLE OPERATORS ON EINSTEIN-PODOLSKY-ROSEN STATES [J].
BENNETT, CH ;
WIESNER, SJ .
PHYSICAL REVIEW LETTERS, 1992, 69 (20) :2881-2884
[8]   Quantum information theory [J].
Bennett, CH ;
Shor, PW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (06) :2724-2742
[9]   QUANTUM CRYPTOGRAPHY [J].
BENNETT, CH ;
BRASSARD, G ;
EKERT, AK .
SCIENTIFIC AMERICAN, 1992, 267 (04) :50-57
[10]   Bounds on information and the security of quantum cryptography [J].
Biham, E ;
Mor, T .
PHYSICAL REVIEW LETTERS, 1997, 79 (20) :4034-4037