Abstract
Cryptographic schemes based on the exchange of single photons, each carrying one bit of information, have been widely discussed in the literature. In some of the schemes, Alice and Bob share entangled photon pairs [1]. In others, Bob performs measurements on photons that Alice sends him [2,3]. They always need to communicate via a classical channel as well. In the standard procedures, Bob obtains, depending on the outcome of each measurement, a new bit of the secure key for about 50% of the transmitted photons [4].
© 2001 EPS
PDF ArticleMore Like This
Jeffrey H. Shapiro and Franco N. C. Wong
QMA4 Quantum Electronics and Laser Science Conference (CLEO:FS) 2006
Kaoru Shimizu and Nobuyuki Imoto
WG1_5 Conference on Lasers and Electro-Optics/Pacific Rim (CLEO/PR) 2001
Ali Akbar
JTu5B.13 Frontiers in Optics (FiO) 2022