Entangled State Quantum Cryptography: Eavesdropping on the Ekert Protocol
Top Cited Papers
- 15 May 2000
- journal article
- research article
- Published by American Physical Society (APS) in Physical Review Letters
- Vol. 84 (20), 4733-4736
- https://doi.org/10.1103/physrevlett.84.4733
Abstract
Using polarization-entangled photons from spontaneous parametric down-conversion, we have implemented Ekert's quantum cryptography protocol. The near-perfect correlations of the photons allow the sharing of a secret key between two parties. The presence of an eavesdropper is continually checked by measuring Bell's inequalities. We investigated several possible eavesdropper strategies, including pseudo–quantum-nondemolition measurements. In all cases, the eavesdropper's presence was readily apparent. We discuss a procedure to increase her detectability.Keywords
All Related Versions
This publication has 33 references indexed in Scilit:
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum ComputerSIAM Review, 1999
- “Plug and play” systems for quantum cryptographyApplied Physics Letters, 1997
- Generalized privacy amplificationIEEE Transactions on Information Theory, 1995
- Secure key distribution system based on quantum cryptographyElectronics Letters, 1994
- Secret key agreement by public discussion from common informationIEEE Transactions on Information Theory, 1993
- Enhanced single photon fringe visibility in a 10 km-long prototype quantum cryptography channelElectronics Letters, 1993
- Quantum cryptography using any two nonorthogonal statesPhysical Review Letters, 1992
- Quantum cryptography without Bell’s theoremPhysical Review Letters, 1992
- Experimental quantum cryptographyJournal of Cryptology, 1992
- Quantum cryptography based on Bell’s theoremPhysical Review Letters, 1991