Quantum cryptography using any two nonorthogonal states.

  title={Quantum cryptography using any two nonorthogonal states.},
  journal={Physical review letters},
  volume={68 21},
  • Bennett
  • Published 25 May 1992
  • Physics
  • Physical review letters
Quantum techniques for key distribution---the classically impossible task of distributing secret information over an insecure channel whose transmissions are subject to inspection by an eavesdropper, between parties who share no secret initially---have been proposed using (a) four nonorthogonally polarized single-photon states or low-intensity light pulses, and (b) polarization-entangled or spacetime-entangled two-photon states. Here we show that in principle any two nonorthogonal quantum… 

Deterministic and efficient quantum cryptography based on Bell's theorem

This work proposes a double-entanglement-based quantum cryptography protocol that is both efficient and deterministic, and allows a robust implementation under the current technology.

Experimental System for Quantum Cryptography Based on Two Nonorthogonal Photon Polarization States

An experimental system based on a novel protocol for quantum cryptography using only two nonorthogonal photon polarization states is implemented and has the simplest experimental setup.

Secure quantum key distribution with a single not-so-weak coherent pulse.

The security of the QKD protocol, which counters the photon number splitting and the impersonation attacks, is analyzed and the possibility of quantum secure direct communication is discussed.

Quantum Cryptography with Photon Pairs

Photons, randomly prepared in one of two non-orthogonal quantum states, are used for a cryptographic key distribution, and the parity-generated bits are more sensitive to attacks by an eavesdropper than bits obtained from single photons.

Secure quantum key distribution using continuous variables of single photons.

The information capacity of a scheme based on the spatial entanglement of photons from a realistic source is derived, and the standard measures of security known for quadrature-based continuous variable quantum cryptography (CV-QKD) are shown to be inadequate.

Comment on 'Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair'

It is found that the second protocol is vulnerable under the correlation-elicitation attack, and an eavesdropper can obtain the encoded bit M although she has no knowledge about the random bit R.

Optimal eavesdropping strategies in quantum cryptography using photonic quantum control

  • S. Bartlett
  • Physics
    SPIE Optical Engineering + Applications
  • 2007
When eavesdropping on a quantum channel, two distinct properties of quantum physics arise. First, if the quantum system is prepared in one of several non-orthogonal states, then no measurement can

Fundamental Two-Party Quantum Secret Sharing Protocol without Quantum Entanglement

Quantum key distribution (QKD) protocol techniques are used in the distribution of keys using the laws of physics. Quantum secret sharing (QSS), quantum secure direct communication, and quantum

Quantum cryptography with coherent states

  • B. HuttnerN. Imoto
  • Computer Science, Physics
    Technical Digest. CLEO/Pacific Rim'95. The Pacific Rim Conference on Lasers and Electro-Optics
  • 1995
This work discusses quantum cryptographic protocols based on the transmission of weak coherent states and presents a system, based on a symbiosis of two existing systems, for which the information available to the eavesdropper is significantly reduced and is therefore safer than the two previous ones.