Entangled State Quantum Cryptography: Eavesdropping on the Ekert Protocol

D. S. Naik, C. G. Peterson, A. G. White, A. J. Berglund, and P. G. Kwiat
Phys. Rev. Lett. 84, 4733 – Published 15 May 2000
PDFExport Citation

Abstract

Using polarization-entangled photons from spontaneous parametric down-conversion, we have implemented Ekert's quantum cryptography protocol. The near-perfect correlations of the photons allow the sharing of a secret key between two parties. The presence of an eavesdropper is continually checked by measuring Bell's inequalities. We investigated several possible eavesdropper strategies, including pseudo–quantum-nondemolition measurements. In all cases, the eavesdropper's presence was readily apparent. We discuss a procedure to increase her detectability.

  • Received 18 October 1999

DOI:https://doi.org/10.1103/PhysRevLett.84.4733

©2000 American Physical Society

Authors & Affiliations

D. S. Naik1, C. G. Peterson1, A. G. White1,2, A. J. Berglund1, and P. G. Kwiat1,*

  • 1Physics Division, P-23, Los Alamos National Laboratory, Los Alamos, New Mexico 87545
  • 2Department of Physics, University of Queensland, Brisbane, Queensland 4072, Australia

  • *To whom all correspondence should be addressed.Electronic address: Kwiat@lanl.gov

References (Subscription Required)

Click to Expand
Issue

Vol. 84, Iss. 20 — 15 May 2000

Reuse & Permissions
Access Options
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review Letters

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×