Noise-Immune Quantum Key Distribution

We review quantum key distribution schemes that are noise-immune (require no alignment). For both polarization and time-bin qubits, we present three noise-immune schemes: round-trip, one-way, and symmetric. In the roundtrip schemes, the signal travels back and forth between the legitimate users (Alice and Bob); in the one-way schemes, the signal travels only from Alice to Bob; in the symmetric schemes, a central source sends signals to Alice and Bob. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We show that all the schemes can be implemented with existing technology. 211 Z. D. Walton, A. V. Sergienko, B. E. A. Saleh, and M. C. Teich, "Noise-Immune Quantum Key Distr bution," in Quantum Communications and Cryptography, edited by A. V. Sergienko (CRC Press, Boca Raton, 2006), ch. 10, pp. 211-224. 212 Quantum Communications and Cryptography

[1]  F De Martini,et al.  Multiparticle quantum superposition and stimulated entanglement by parity selective amplification of entangled states. , 2001, Physical review letters.

[2]  Generation of pulsed polarization-entangled two-photon state via temporal and spectral engineering , 2002, quant-ph/0207047.

[3]  Gisin,et al.  Quantum cryptography using entangled photons in energy-time bell states , 1999, Physical review letters.

[4]  Yoshihisa Yamamoto,et al.  Differential phase shift quantum key distribution. , 2002 .

[5]  M. Martinelli A universal compensator for polarization changes induced by birefringence on a retracing beam , 1989 .

[6]  N. Gisin,et al.  Pulsed Energy-Time Entangled Twin-Photon Source for Quantum Communication , 1999 .

[7]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[8]  Andrew G. Glen,et al.  APPL , 2001 .

[9]  M. Teich,et al.  Decoherence-free subspaces in quantum key distribution. , 2003, Physical review letters.

[10]  Ekert,et al.  "Event-ready-detectors" Bell experiment via entanglement swapping. , 1993, Physical review letters.

[11]  H. Bechmann-Pasquinucci,et al.  Quantum Cryptography using larger alphabets , 1999, quant-ph/9910095.

[12]  M. Rubin,et al.  THEORY OF TWO-PHOTON ENTANGLEMENT FOR SPONTANEOUS PARAMETRIC DOWN-CONVERSION DRIVEN BY A NARROW PUMP PULSE , 1997 .

[13]  Alexander V. Sergienko,et al.  One-Way Entangled-Photon Autocompensating Quantum Cryptography , 2003 .

[14]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[15]  M. Koashi,et al.  Experimental extraction of an entangled photon pair from two identically decohered pairs , 2003, Nature.

[16]  Mann,et al.  Measurement of the Bell operator and quantum teleportation. , 1995, Physical review. A, Atomic, molecular, and optical physics.