A Theoretical Scheme for Multi-user Quantum Key Distribution with N Einstein-Podolsky-Rosen Pairs on a Passive Optical Network

We propose a theoretical scheme for any-to-any multi-user quantum key distribution on a passive optical network with ordered N Einstein-Podolsky-Rosen pairs. This scheme is safe and more efficient than those with single photons. Its efficiency approaches 100% in the limit that the number of pairs used in the eavesdropping check becomes negligible. It also has high capacity and is convenient for users.

[1]  A Cabello Quantum key distribution in the Holevo limit. , 2000, Physical review letters.

[2]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[3]  Shiqun Li,et al.  Factorizability of the Two-Component Bose-Einstein Condensate Ground State , 1999 .

[4]  P. Xue,et al.  Conditional efficient multiuser quantum cryptography network , 2002 .

[5]  Masato Koashi,et al.  Quantum Cryptography Based on Split Transmission of One-Bit Information in Two Steps , 1997 .

[6]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[7]  Paul D. Townsend,et al.  Quantum cryptography on multiuser optical fibre networks , 1997, Nature.

[8]  D. Bruß Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.

[9]  Gisin,et al.  Quantum cryptography with coherent states. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[10]  G. Long,et al.  Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.

[11]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[12]  Adan Cabello Quantum key distribution without alternative measurements , 2000 .

[13]  Goldenberg,et al.  Quantum cryptography based on orthogonal states. , 1995, Physical review letters.

[14]  Yong-Nian Huang,et al.  Two-Step Coronal Transport of Solar Flare Particles from Magnetic Multipolarity Sources in a Flare Region , 2001 .

[15]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[16]  S. Barnett,et al.  Multi-user Quantum Cryptography on Optical Networks , 1995 .

[17]  Zhang Ping,et al.  Generation of Maximally Entangled Bell State in a Coupled Quantum Dot , 2001 .