Controlled order rearrangement encryption for quantum key distribution

A technique is devised to perform orthogonal state quantum key distribution. In this scheme, entangled parts of a quantum information carrier are sent from Alice to Bob through two quantum channels. However, before the transmission, the order of the quantum information carrier in one channel is reordered so that Eve cannot steal useful information. At the receiver's end, the order of the quantum information carrier is restored. The order rearrangement operation in both parties is controlled by a prior shared control key which is used repeatedly in a quantum key distribution session.

[1]  K. Matsumoto,et al.  Shor-Preskill-type security proof for quantum key distribution without public announcement of bases , 2002, quant-ph/0201053.

[2]  P. Xue,et al.  Conditional efficient multiuser quantum cryptography network , 2002 .

[3]  A. C. Funk,et al.  Quantum key distribution using nonclassical photon-number correlations in macroscopic light pulses , 2001, quant-ph/0109071.

[4]  G. Long,et al.  Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.

[5]  Michael Pepper,et al.  Electrically Driven Single-Photon Source , 2001, Science.

[6]  Jun Yu Li,et al.  Quantum key distribution scheme with orthogonal product states , 2001, quant-ph/0102060.

[7]  N. Gisin,et al.  Long-distance entanglement-based quantum key distribution , 2000, quant-ph/0008039.

[8]  A. Cabello Quantum key distribution in the Holevo limit. , 2000, Physical review letters.

[9]  Shenmin Zhang,et al.  LASERS, OPTICS, AND OPTOELECTRONICS 3673 Detection of single photons using a field-effect transistor gated by a layer of quantum dots , 2000 .

[10]  Richard J. Hughes,et al.  Daylight quantum key distribution over 1.6 km , 2000, Physical review letters.

[11]  N. Gisin,et al.  Pulsed Energy-Time Entangled Twin-Photon Source for Quantum Communication , 1998, quant-ph/9809034.

[12]  N. Gisin,et al.  Long-distance Bell-type tests using energy-time entangled photons , 1998, quant-ph/9809025.

[13]  Masato Koashi,et al.  Quantum Cryptography Based on Split Transmission of One-Bit Information in Two Steps , 1997 .

[14]  W. Hwang,et al.  Quantum cryptography without public announcement of bases , 1997, quant-ph/9702009.

[15]  N. Gisin,et al.  “Plug and play” systems for quantum cryptography , 1996, quant-ph/9611042.

[16]  P. Townsend,et al.  Quantum key distribution over distances as long as 30 km. , 1995, Optics letters.

[17]  S. Barnett,et al.  Multi-user Quantum Cryptography on Optical Networks , 1995 .

[18]  Simon J. D. Phoenix,et al.  Quantum cryptography: How to beat the code breakers using quantum mechanics , 1995 .

[19]  Vaidman,et al.  Quantum cryptography based on orthogonal states. , 1995, Physical review letters.

[20]  N. Imoto,et al.  Quantum cryptography with coherent states , 1995, Technical Digest. CLEO/Pacific Rim'95. The Pacific Rim Conference on Lasers and Electro-Optics.

[21]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[22]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[23]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[24]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[25]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..