Aspects of entangled translucent eavesdropping in quantum cryptography
نویسندگان
چکیده
We present a mathematical physics analysis of entangled translucent eavesdropping in quantum cryptography, based on the recent work of Ekert, Huttner, Palma, and Peres @Phys. Rev. A 50, 1047 ~1994!#. The key generation procedure involves the transmission, interception, and reception of two nonorthogonal photon polarization states. At the receiving end, a positive operator valued measure ~POVM! is employed in the measurement process. The eavesdropping involves an information-maximizing von Neumann–type projective measurement. We propose a design for a receiver that is an all-optical realization of the POVM, using a Wollaston prism, a mirror, two beam splitters, a polarization rotator, and three photodetectors. We present a quantitative analysis of the receiver. We obtain closed-form algebraic expressions for the error rates and mutual information, expressed in terms of the POVM-receiver error rate and the angle between the carrier polarization states. We also prove a significant result, namely, that in the entangled translucent eavesdropping approach, the unsafe error rate based on standard mutual information comparisons is equivalent to the maximum allowable error rate based on perfect mutual information for the eavesdropper. In this case, the above unsafe error rate is in fact not overly conservative. @S1050-2947~97!01212-2#
منابع مشابه
Proposal of an experimental scheme for realising a translucent eavesdropping on a quantum cryptographic channel
Purpose of this paper is to suggest a scheme, which can be realised with today’s technology and could be used for entangling a probe to a photon qubit based on polarisation. Using this probe a translucent or a coherent eavesdropping can be performed.
متن کاملBell inequality for quNits with binary measurements
We present a generalized Bell inequality for two entangled quNits. On one quNit the choice is between two standard von Neumann measurements, whereas for the other quNit there are N2 different binary measurements. These binary measurements are related to the intermediate states known from eavesdropping in quantum cryptography. The maximum violation by √ N is reached for the maximally entangled s...
متن کاملEntangled state quantum cryptography: eavesdropping on the ekert protocol
Using polarization-entangled photons from spontaneous parametric down-conversion, we have implemented Ekert's quantum cryptography protocol. The near-perfect correlations of the photons allow the sharing of a secret key between two parties. The presence of an eavesdropper is continually checked by measuring Bell's inequalities. We investigated several possible eavesdropper strategies, including...
متن کاملQuantum Secure Direct Communication Based on Dense Coding and Detecting Eavesdropping with Four-Particle Genuine Entangled State
A novel quantum secure direct communication protocol based on four-particle genuine entangled state and quantum dense coding is proposed. In this protocol, the four-particle genuine entangled state is used to detect eavesdroppers, and quantum dense coding is used to encode the message. Finally, the security of the proposed protocol is discussed. During the security analysis, the method of entro...
متن کاملOn Secure Quantum Key Distribution Using Continuous Variables of Single Photons
We analyse the distribution of secure keys using quantum cryptography based on the continuous variable degree of freedom of entangled photon pairs. We derive the information capacity of a scheme based on the spatial entanglement of photons from a realistic source, and show that the standard measures of security known for quadrature-based continuous variable quantum cryptography (CVQKD) are inad...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1997