# Quantum cryptography using any two nonorthogonal states.

@article{Bennett1992QuantumCU, title={Quantum cryptography using any two nonorthogonal states.}, author={Bennett}, journal={Physical review letters}, year={1992}, volume={68 21}, pages={ 3121-3124 } }

Quantum techniques for key distribution---the classically impossible task of distributing secret information over an insecure channel whose transmissions are subject to inspection by an eavesdropper, between parties who share no secret initially---have been proposed using (a) four nonorthogonally polarized single-photon states or low-intensity light pulses, and (b) polarization-entangled or spacetime-entangled two-photon states. Here we show that in principle any two nonorthogonal quantumâ€¦Â

## 2,360 Citations

### Deterministic and efficient quantum cryptography based on Bell's theorem

- Computer Science
- 2006

This work proposes a double-entanglement-based quantum cryptography protocol that is both efficient and deterministic, and allows a robust implementation under the current technology.

### Experimental System for Quantum Cryptography Based on Two Nonorthogonal Photon Polarization States

- Physics, Computer Science
- 1998

An experimental system based on a novel protocol for quantum cryptography using only two nonorthogonal photon polarization states is implemented and has the simplest experimental setup.

### Secure quantum key distribution with a single not-so-weak coherent pulse.

- Physics, Computer ScienceOptics letters
- 2007

The security of the QKD protocol, which counters the photon number splitting and the impersonation attacks, is analyzed and the possibility of quantum secure direct communication is discussed.

### Quantum Cryptography with Photon Pairs

- Computer Science, Physics
- 1994

Photons, randomly prepared in one of two non-orthogonal quantum states, are used for a cryptographic key distribution, and the parity-generated bits are more sensitive to attacks by an eavesdropper than bits obtained from single photons.

### Secure quantum key distribution using continuous variables of single photons.

- Computer Science, PhysicsPhysical review letters
- 2008

The information capacity of a scheme based on the spatial entanglement of photons from a realistic source is derived, and the standard measures of security known for quadrature-based continuous variable quantum cryptography (CV-QKD) are shown to be inadequate.

### Comment on 'Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair'

- Physics, Computer Science
- 2010

It is found that the second protocol is vulnerable under the correlation-elicitation attack, and an eavesdropper can obtain the encoded bit M although she has no knowledge about the random bit R.

### Optimal eavesdropping strategies in quantum cryptography using photonic quantum control

- PhysicsSPIE Optical Engineering + Applications
- 2007

When eavesdropping on a quantum channel, two distinct properties of quantum physics arise. First, if the quantum system is prepared in one of several non-orthogonal states, then no measurement canâ€¦

### Fundamental Two-Party Quantum Secret Sharing Protocol without Quantum Entanglement

- Physics
- 2015

Quantum key distribution (QKD) protocol techniques are used in the distribution of keys using the laws of physics. Quantum secret sharing (QSS), quantum secure direct communication, and quantumâ€¦

### Quantum cryptography with coherent states

- Computer Science, PhysicsTechnical Digest. CLEO/Pacific Rim'95. The Pacific Rim Conference on Lasers and Electro-Optics
- 1995

This work discusses quantum cryptographic protocols based on the transmission of weak coherent states and presents a system, based on a symbiosis of two existing systems, for which the information available to the eavesdropper is significantly reduced and is therefore safer than the two previous ones.