Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Quantum key distribution
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
=== E91 protocol: Artur Ekert (1991) === [[Artur Ekert]]'s scheme<ref name=":0">{{cite journal |last1=Ekert |first1=Artur K. |title=Quantum cryptography based on Bell's theorem |journal=Physical Review Letters |date=5 August 1991 |volume=67 |issue=6 |pages=661β663 |doi=10.1103/PhysRevLett.67.661 |pmid=10044956 |bibcode=1991PhRvL..67..661E |s2cid=27683254 }}</ref> uses entangled pairs of photons. These can be created by Alice, by Bob, or by some source separate from both of them, including eavesdropper Eve. The photons are distributed so that Alice and Bob each end up with one photon from each pair. The scheme relies on two properties of entanglement. First, the entangled states are perfectly correlated in the sense that if Alice and Bob both measure whether their particles have vertical or horizontal polarizations, they always get the same answer with 100% probability. The same is true if they both measure any other pair of complementary (orthogonal) polarizations. This necessitates that the two distant parties have exact directionality synchronization. However, the particular results are completely random; it is impossible for Alice to predict if she (and thus Bob) will get vertical polarization or horizontal polarization. Second, any attempt at eavesdropping by Eve destroys these correlations in a way that Alice and Bob can detect. Similarly to [[BB84]], the protocol involves a private measurement protocol before detecting the presence of Eve. The measurement stage involves Alice measuring each photon she receives using some basis from the set <math> Z_{0}, Z_{\frac{\pi}{8}}, Z_{\frac{\pi}{4}}</math> while Bob chooses from <math> Z_{0}, Z_{\frac{\pi}{8}}, Z_{-\frac{\pi}{8}}</math> where <math>Z_{\theta}</math> is the <math>\{|{\uparrow}\rangle, \; |{\rightarrow}\rangle\}</math> basis rotated by <math>\theta</math>. They keep their series of basis choices private until measurements are completed. Two groups of photons are made: the first consists of photons measured using the same basis by Alice and Bob while the second contains all other photons. To detect eavesdropping, they can compute the test statistic <math>S</math> using the correlation coefficients between Alice's bases and Bob's similar to that shown in the [[Bell test experiments]]. Maximally entangled photons would result in <math>|S|=2\sqrt{2}</math>. If this were not the case, then Alice and Bob can conclude Eve has introduced local realism to the system, violating [[Bell's theorem]]. If the protocol is successful, the first group can be used to generate keys since those photons are completely anti-aligned between Alice and Bob.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)