Advertisement

The Keys to Quantum Secrets

  • Colin P. Williams
  • Scott H. Clearwater

Abstract

Modern schemes for exchanging secret messages, such as the one-time pad and public key procedures that we saw in Chapter 4, rely on the sender and receiver to possess certain “keys.” Such keys are simply large numbers that have been carefully constructed so as to have special mathematical properties. If the appropriate keys are known, then any encrypted messages are easily unscrambled. But without the keys it is computationally intractable, at least with any classical computer, to crack a coded message. Consequently, the integrity of these cryptosystems relies on the keys being kept secret.

Keywords

Secret Message Quantum Cryptography Calcite Crystal Polarization Orientation Polarize Photon 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Chapter 6

  1. Bennett, C, and G. Brassard. “The Dawn of a New Era for Quantum Cryptography: The Experimental Prototype is Working!” SIGACT News, Vol. 20, Fall, pp. 78–82 (1989).CrossRefGoogle Scholar
  2. Bennett, C, Bessette, F., and G. Brassard. “Experimental Quantum Cryptography,” Lecture Notes in Computer Science, Vol. 473, Springer-Verlag, Berlin, pp. 253–265 (1991).Google Scholar
  3. Bennett, C, Bessette, F., Brassard, G., Salvail, L., and J. Smolin. “Experimental Quantum Cryptography,” Journal of Cryptology, Vol. 5, pp. 3–28 (1992).MATHCrossRefGoogle Scholar
  4. Bennett, G, Brassard, G. and A. Ekert. “Quantum Cryptography,” Scientific American, October, pp. 50–57 (1992).Google Scholar
  5. Buttler, W., Hughes, R., Kwiat, P., Luther, G., Morgan, G., Nordholt, J., Peterson, G, and C. Simmons. “Free-Space Quantum Key Distribution,” Los Alamos preprint archive, http://xxx.lanl.gov/archive/quant-ph/9801006 (1998).
  6. Buttler, W., Hughes, R., Kwiat, P., Lamoreaux, S., Luther, G., Morgan, G., Nord-holt, J., Peterson, G, and C. Simmons. “Practical Free-Space Quantum Key Distribution Over 1 Kilometer,” Los Alamos preprint archive, http://xxx.lanl.gov/archive/quant-ph/9805071 (1998).
  7. Deutsch, D. “Quantum Communication Thwarts Eavesdroppers,” New Scientist, December 9, pp. 25–26 (1989).Google Scholar
  8. Ekert, A. “Quantum Cryptography Based on Bell’s Theorem,” Physical Review Letters, Vol. 67, pp. 661–663 (1991).MathSciNetMATHCrossRefGoogle Scholar
  9. Ekert, A., Rarity, J., Tapster, P., and G. Palma. “Practical Quantum Cryptography Based on Two-Photon Interferometry,” Physical Review Letters, Vol. 69, 31 August, pp. 1293–1295 (1992).CrossRefGoogle Scholar
  10. Franson, J., and H. Lives. “Quantum Cryptography Using Optical Fibers,” Applied Optics, Vol. 33, pp. 2949–2954 (1995).CrossRefGoogle Scholar
  11. Hecht, E., and A. Zajac. Optics, Addison-Wesley, Reading, MA, p. 228 (1974).Google Scholar
  12. Hughes, R., Alde, D., Dyer, P., Luther, G., Morgan, G., and M. Schauer. “Quantum Cryptography,” Contemporary Physics, Vol. 36, pp. 149–163 (1995).CrossRefGoogle Scholar
  13. Hughes, R., James, D., Knill, E., Laflamme, R., and A. Petschek. “Decoherence Bounds on Quantum Computation with Trapped Ions,” Physical Review Letters, Vol. 77, pp. 3240–3243 (1996).CrossRefGoogle Scholar
  14. Hughes, R., Buttler, W., Kwiat, P., Luther, G., Morgan, G., Nordholt, J., Peterson, G, and G Simmons. “Secure Communications Using Quantum Cryptography,” Proceedings of SPIE, Vol. 3076, pp. 2–11 (1997).CrossRefGoogle Scholar
  15. Marand, G, and P. Townsend “Quantum Key Distribution Over Distances as Long as 30 km,” Optics Letters, 15 August, Vol. 20, No. 16, pp. 1695–1697 (1995).CrossRefGoogle Scholar
  16. Muller, A., Zbinden, H., and N. Gisin. “Quantum Cryptography Over 23 km in Installed Under-Lake Telecom Fibre,” Europhysics Letters, Vol. 33, pp. 335–339 (1996).CrossRefGoogle Scholar
  17. Townsend, P., Rarity, J., and P. Tapster. “Single Photon Interference in 10 km-Long Optical Fibre Interferometer,” Electronics Letters, Vol. 29, 1 April, pp. 634–635 (1993).CrossRefGoogle Scholar
  18. Townsend, P., Rarity, J., and P. Tapster. “Enhanced Single Photon Fringe Visibility in a 10 km-Long Prototype Quantum Cryptography Channel,” Electronics Letters, Vol. 29, July, pp. 1291–1293 (1993a)CrossRefGoogle Scholar

Copyright information

© Colin P. Williams and Scott H. Clearwater 2000

Authors and Affiliations

  • Colin P. Williams
  • Scott H. Clearwater

There are no affiliations available

Personalised recommendations