Entangled-photon six-state quantum cryptography

We have implemented the `six-state' quantum cryptography protocol using polarization-entangled photon pairs, in which the polarization of each photon of a pair is measured in one of three randomly chosen bases. For a given amount of eavesdropping, this protocol results in a larger error rate than in four- or two-state protocols, but reduces the number of key-producing events. We have experimentally investigated several incoherent eavesdropping strategies, and verified the predicted enhancement in error rate. However, we demonstrate that for low error rates, the efficiency for secret key generation is higher when using the four-state protocol.

[1]  B. Krauskopf,et al.  Proc of SPIE , 2003 .

[2]  Anders Karlsson,et al.  Security of quantum key distribution using d-level systems. , 2001, Physical review letters.

[3]  Edo Waks,et al.  Security of quantum key distribution with entangled photons against individual attacks , 2000, quant-ph/0012078.

[4]  N. Gisin,et al.  Experimental entanglement distillation and ‘hidden’ non-locality , 2001, Nature.

[5]  A. G. White,et al.  Experimental verification of decoherence-free subspaces. , 2000, Science.

[6]  N. Lütkenhaus Security against individual attacks for realistic quantum key distribution , 2000 .

[7]  Weinfurter,et al.  Quantum cryptography with entangled photons , 1999, Physical review letters.

[8]  White,et al.  Entangled state quantum cryptography: eavesdropping on the ekert protocol , 1999, Physical review letters.

[9]  Gisin,et al.  Quantum cryptography using entangled photons in energy-time bell states , 1999, Physical review letters.

[10]  Dagmar Bruß,et al.  Quantum Key Distribution: from Principles to Practicalities , 1999, Applicable Algebra in Engineering, Communication and Computing.

[11]  Bahaa E. A. Saleh,et al.  Quantum cryptography using femtosecond-pulsed parametric down-conversion , 1999 .

[12]  Norbert Lütkenhaus,et al.  ESTIMATES FOR PRACTICAL QUANTUM CRYPTOGRAPHY , 1999 .

[13]  S. Wolf,et al.  Quantum Cryptography on Noisy Channels: Quantum versus Classical Key-Agreement Protocols , 1999, quant-ph/9902048.

[14]  H. Bechmann-Pasquinucci,et al.  Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography , 1998, quant-ph/9807041.

[15]  D. Bruß Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.

[16]  Yeshaiahu Fainman,et al.  Evaluation of the cost of error-correction protocol in quantum cryptographic transmission , 1998, Other Conferences.

[17]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[18]  Ueli Maurer,et al.  Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[19]  Ueli Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[20]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[21]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.