Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Special pages
Niidae Wiki
Search
Search
Appearance
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Quantum key distribution
(section)
Page
Discussion
English
Read
Edit
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
View history
General
What links here
Related changes
Page information
Appearance
move to sidebar
hide
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
=== E91 protocol: Artur Ekert (1991) === [[Artur Ekert]]'s scheme<ref name=":0">{{cite journal |last1=Ekert |first1=Artur K. |title=Quantum cryptography based on Bell's theorem |journal=Physical Review Letters |date=5 August 1991 |volume=67 |issue=6 |pages=661β663 |doi=10.1103/PhysRevLett.67.661 |pmid=10044956 |bibcode=1991PhRvL..67..661E |s2cid=27683254 }}</ref> uses entangled pairs of photons. These can be created by Alice, by Bob, or by some source separate from both of them, including eavesdropper Eve. The photons are distributed so that Alice and Bob each end up with one photon from each pair. The scheme relies on two properties of entanglement. First, the entangled states are perfectly correlated in the sense that if Alice and Bob both measure whether their particles have vertical or horizontal polarizations, they always get the same answer with 100% probability. The same is true if they both measure any other pair of complementary (orthogonal) polarizations. This necessitates that the two distant parties have exact directionality synchronization. However, the particular results are completely random; it is impossible for Alice to predict if she (and thus Bob) will get vertical polarization or horizontal polarization. Second, any attempt at eavesdropping by Eve destroys these correlations in a way that Alice and Bob can detect. Similarly to [[BB84]], the protocol involves a private measurement protocol before detecting the presence of Eve. The measurement stage involves Alice measuring each photon she receives using some basis from the set <math> Z_{0}, Z_{\frac{\pi}{8}}, Z_{\frac{\pi}{4}}</math> while Bob chooses from <math> Z_{0}, Z_{\frac{\pi}{8}}, Z_{-\frac{\pi}{8}}</math> where <math>Z_{\theta}</math> is the <math>\{|{\uparrow}\rangle, \; |{\rightarrow}\rangle\}</math> basis rotated by <math>\theta</math>. They keep their series of basis choices private until measurements are completed. Two groups of photons are made: the first consists of photons measured using the same basis by Alice and Bob while the second contains all other photons. To detect eavesdropping, they can compute the test statistic <math>S</math> using the correlation coefficients between Alice's bases and Bob's similar to that shown in the [[Bell test experiments]]. Maximally entangled photons would result in <math>|S|=2\sqrt{2}</math>. If this were not the case, then Alice and Bob can conclude Eve has introduced local realism to the system, violating [[Bell's theorem]]. If the protocol is successful, the first group can be used to generate keys since those photons are completely anti-aligned between Alice and Bob.
Summary:
Please note that all contributions to Niidae Wiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Encyclopedia:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Search
Search
Editing
Quantum key distribution
(section)
Add topic