Quantum cryptography with entangled photons

被引:785
作者
Jennewein, T
Simon, C
Weihs, G
Weinfurter, H
Zeilinger, A
机构
[1] Univ Vienna, Inst Expt Phys, A-1090 Vienna, Austria
[2] Univ Munich, Sekt Phys, D-80799 Munich, Germany
关键词
D O I
10.1103/PhysRevLett.84.4729
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
By realizing a quantum cryptography system based on polarization entangled photon pairs we establish highly secure keys, because a single photon source is approximated and the inherent randomness of quantum measurements is exploited. We implement a novel key distribution scheme using Wigner's inequality to test the security of the quantum channel, and, alternatively, realize a variant of the BB84 protocol. Our system has two completely independent users separated by 360 m, and generates raw keys at rates of 400-800 bits/s with bit error rates around 3%.
引用
收藏
页码:4729 / 4732
页数:4
相关论文
共 29 条
[1]  
Bell J. S., 1964, Physics Physique Fizika, V1, P195, DOI [DOI 10.1103/PHYSICSPHYSIQUEFIZIKA.1.195, 10.1103/Physics-PhysiqueFizika.1.195]
[2]  
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[3]  
Bennett C. H., 1992, SCI AM, P26
[4]  
Bennett C. H., 1984, PROC IEEE INT C COMP, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[5]   Generalized privacy amplification [J].
Bennett, CH ;
Brassard, G ;
Crepeau, C ;
Maurer, UM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) :1915-1923
[6]   QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[7]   Practical free-space quantum key distribution over 1 km [J].
Buttler, WT ;
Hughes, RJ ;
Kwiat, PG ;
Lamoreaux, SK ;
Luther, GG ;
Morgan, GL ;
Nordholt, JE ;
Peterson, CG ;
Simmons, CM .
PHYSICAL REVIEW LETTERS, 1998, 81 (15) :3283-3286
[8]   PROPOSED EXPERIMENT TO TEST LOCAL HIDDEN-VARIABLE THEORIES [J].
CLAUSER, JF ;
HORNE, MA ;
SHIMONY, A ;
HOLT, RA .
PHYSICAL REVIEW LETTERS, 1969, 23 (15) :880-&
[9]   Avalanche photodiodes and quenching circuits for single-photon detection [J].
Cova, S ;
Ghioni, M ;
Lacaita, A ;
Samori, C ;
Zappa, F .
APPLIED OPTICS, 1996, 35 (12) :1956-1976
[10]   QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J].
EKERT, AK .
PHYSICAL REVIEW LETTERS, 1991, 67 (06) :661-663