Skip to main content
Log in

On the justification of quantum cryptography based on time shifts

  • Quantum Information Science
  • Published:
Journal of Experimental and Theoretical Physics Letters Aims and scope Submit manuscript

Abstract

The security of quantum cryptography based on time shifts has been mathematically proved. The procedures of preparing and measuring the most strongly localized states with a support in a finite frequency band are described. It has shown that measurements of states in the finite frequency band and a finite time window are sufficient for detecting any change in input states. The use of available multiplex fiber optic systems based on an arrayed waveguide grating for time-shift quantum cryptography is briefly discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. S. Wiesner, SIGACT News 15, 78 (1983).

    Article  MATH  Google Scholar 

  2. C. H. Bennett and G. Brassard, in Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India (IEEE, New York, 1984), p. 175.

    Google Scholar 

  3. C. H. Bennett, Phys. Rev. Lett. 68, 3121 (1992).

    ADS  MATH  MathSciNet  Google Scholar 

  4. W. K. Wootters and W. H. Zurek, Nature 299, 802 (1982).

    Article  ADS  Google Scholar 

  5. S. N. Molotkov, Pis’ma Zh. Éksp. Teor. Fiz. 79, 691 (2004) [JETP Lett. 79, 559 (2004)].

    Google Scholar 

  6. C. Elliot, D. Pearson, and G. Troxel, quant-ph/0307049.

  7. D. S. Bethune and W. P. Risk, New J. Phys. 4, 42.1 (2002).

    Article  Google Scholar 

  8. D. S. Bethune, M. Navarro, and W. P. Risk, quantph/0104089.

  9. A. S. Holevo, Probabilistic and Statistical Aspects of Quantum Theory (North-Holland, Amsterdam, 1980).

    Google Scholar 

  10. S. N. Molotkov, Pis’ma Zh. Éksp. Teor. Fiz. 74, 477 (2001) [JETP Lett. 74, 436 (2001)].

    Google Scholar 

  11. A. K. Ekert, B. Huttner, G. M. Palma, and A. Peres, Phys. Rev. A 50, 1047 (1994).

    Article  ADS  Google Scholar 

  12. H. E. Brandt, J. M. Myer, and S. J. Lomonaco, Jr., Phys. Rev. A 56, 4456 (1997).

    Article  ADS  Google Scholar 

  13. B. A. Slutsky, R. Rao, Pang-Chen Sun, and Y. Fainman, Phys. Rev. A 57, 2383 (1998).

    Article  ADS  Google Scholar 

  14. K. Tamaki, M. Koashi, and N. Imoto, quant-ph/0212161.

  15. K. Tamaki, M. Koashi, and N. Imoto, quant-ph/0212162.

  16. K. Tamaki and N. Lutkenhaus, quant-ph/0308048.

  17. A. Peres, Quantum Theory: Concepts and Methods (Kluwer, Dordrecht, 1993).

    Google Scholar 

  18. D. Slepian and H. O. Pollak, Bell Syst. Tech. J. 40, 40 (1961).

    MathSciNet  Google Scholar 

  19. W. H. Fuchs, J. Math. Anal. Appl. 9, 317 (1964).

    Article  MATH  MathSciNet  Google Scholar 

  20. D. Slepian, J. Math. Phys. 44, 99 (1965).

    MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

__________

Translated from Pis’ma v Zhurnal Éksperimental’no\(\overset{\lower0.5em\hbox{$\smash{\scriptscriptstyle\smile}$}}{l} \) i Teoretichesko\(\overset{\lower0.5em\hbox{$\smash{\scriptscriptstyle\smile}$}}{l} \) Fiziki, Vol. 80, No. 7, 2004, pp. 576–582.

Original Russian Text Copyright © 2004 by Molotkov.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Molotkov, S.N. On the justification of quantum cryptography based on time shifts. Jetp Lett. 80, 507–512 (2004). https://doi.org/10.1134/1.1839301

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1134/1.1839301

PACS numbers

Navigation