Quantum-secured imaging

We have built an imaging system that uses a photon's position or time-of-flight information to image an object, while using the photon's polarization for security. This ability allows us to obtain an image which is secure against an attack in which the object being imaged intercepts and resends the imaging photons with modified information. Popularly known as “jamming,” this type of attack is commonly directed at active imaging systems such as radar. In order to jam our imaging system, the object must disturb the delicate quantum state of the imaging photons, thus introducing statistical errors that reveal its activity.

[1]  H. Weinfurter,et al.  A high brightness source of polarization entangled photons , 2011, 2011 Conference on Lasers and Electro-Optics Europe and 12th European Quantum Electronics Conference (CLEO EUROPE/EQEC).

[2]  A R Dixon,et al.  Continuous operation of high bit rate quantum key distribution , 2010, 1005.4573.

[3]  S. J. Roome,et al.  Digital radio frequency memory , 1990 .

[4]  Daniel J. Lum,et al.  An invisible quantum tripwire , 2010, 1002.3362.

[5]  Robert W. Boyd,et al.  Exploring energy-time entanglement Using geometric phase , 2008, 2009 Conference on Lasers and Electro-Optics and 2009 Conference on Quantum electronics and Laser Science Conference.

[6]  Robert W. Boyd,et al.  Superluminal and Slow Light Propagation in a Room-Temperature Solid , 2003, Science.

[7]  Artur Ekert,et al.  Information Gain in Quantum Eavesdropping , 1994 .

[8]  Ryan S. Bennink,et al.  Sensing intruders using entanglement: a photonic quantum fence , 2009, Defense + Commercial Sensing.

[9]  Yi Zhao,et al.  Experimental quantum key distribution with decoy states. , 2006, Physical review letters.

[10]  R. Collins,et al.  Long-range time-of-flight scanning sensor based on high-speed time-correlated single-photon counting. , 2009, Applied optics.

[11]  Shih,et al.  New high-intensity source of polarization-entangled photon pairs. , 1995, Physical review letters.

[12]  J. Howell,et al.  Photon-counting compressive sensing laser radar for 3D imaging. , 2011, Applied optics.

[13]  H. Weinfurter,et al.  Experimental quantum teleportation , 1997, Nature.

[14]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[15]  S. Lloyd,et al.  Quantum-Enhanced Measurements: Beating the Standard Quantum Limit , 2004, Science.

[16]  M. Kolobov The spatial behavior of nonclassical light , 1999 .

[17]  Abrams,et al.  Quantum interferometric optical lithography: exploiting entanglement to beat the diffraction limit , 1999, Physical review letters.

[18]  Nicolò Spagnolo,et al.  Phase estimation via quantum interferometry for noisy detectors. , 2011, Physical review letters.

[19]  Anders Karlsson,et al.  Quantum key distribution using multilevel encoding: security analysis , 2001 .

[20]  Nicolas Treps,et al.  A Quantum Laser Pointer , 2003, Science.

[21]  David R. Smith,et al.  Controlling Electromagnetic Fields , 2006, Science.