English
 
Help Privacy Policy Disclaimer
  Advanced SearchBrowse

Item

ITEM ACTIONSEXPORT

Released

Journal Article

Secure communication with single-photon two-qubit states

MPS-Authors
/persons/resource/persons60291

Beige,  Almut
Laser Physics, Max Planck Institute of Quantum Optics, Max Planck Society;
Quantum Dynamics, Max Planck Institute of Quantum Optics, Max Planck Society;

/persons/resource/persons60478

Englert,  Berthold-Georg
Laser Physics, Max Planck Institute of Quantum Optics, Max Planck Society;

/persons/resource/persons60651

Kurtsiefer,  Christian
Laser Spectroscopy, Max Planck Institute of Quantum Optics, Max Planck Society;

/persons/resource/persons60928

Weinfurter,  Harald
Laser Spectroscopy, Max Planck Institute of Quantum Optics, Max Planck Society;

External Resource
No external resources are shared
Fulltext (restricted access)
There are currently no full texts shared for your IP range.
Fulltext (public)
There are no public fulltexts stored in PuRe
Supplementary Material (public)
There is no public supplementary material available
Citation

Beige, A., Englert, B.-G., Kurtsiefer, C., & Weinfurter, H. (2002). Secure communication with single-photon two-qubit states. Journal of Physics A-Mathematical and General, 35(28), L407-L413. Retrieved from http://www.iop.org/EJ/S/0/27065/T0w.DBWQeJ1omxntm,GJEA/abstract/0305-4470/35/28/103.


Cite as: https://hdl.handle.net/11858/00-001M-0000-000F-C1EF-C
Abstract
We propose a cryptographic scheme that is deterministic: Alice sends single photons to Bob, and each and every photon detected supplies one key bit-no photon is wasted. This is in marked contrast to other schemes in which a random process decides whether the next photon sent will contribute to the key or not. The determinism is achieved by preparing the photons in two- qubit states, rather than the one-qubit states used in conventional schemes. In particular, we consider the realistic situation in which one qubit is the photon polarization and the other a spatial alternative. Further, we show how one can exploit the deterministic nature for direct secure communication, that is without the need-for establishing A shared key first.