Abstract
In our modern era of telecommunications and the Internet, information has become a valuable commodity. Sometimes it must therefore be protected against theft - in this case, loss of secret information to an eavesdropper. Most of today's transactions are protected using encryption unproven to be secure against a computational attack by a classical computer and, in fact, the standardly used encryption algorithms are provably vulnerable to the mind-boggling parallelism of a quantum computer, should one ever be physically realized. Enter quantum cryptography. Underlying nearly all forms of encryption is the necessity for a truly secret key, a random string of zeros and ones; the basic notion of quantum cryptography is to employ single photon transmissions (or the closest attainable approximation to these) to distribute the random key material, while removing the threat of an undetected eavesdropper. Now, nearly twenty years since the seminal quantum cryptography paper by Bennett and Brassard (Bennett C H and Brassard G 1984 Proc. IEEE Int. Conf. on Computers, Systems, and Signal Processing (Bangalore) (New York: IEEE) pp 175-9), we take a look at several state-of-the-art implementations, and glimpse how future quantum cryptosystems might look.We start with papers from three of the world's leading experimental quantum cryptography efforts: Stucki et al and Bethune and Risk describe working systems for quantum key distribution (QKD) over telecommunications fibres (at 1550 nanometres and 1300 nanometres, respectively). The former's achievement of quantum key exchange over 67 kilometres of optical fibre is a world record, as is the experimental demonstration by Hughes et al of daylight free-space QKD over a 10 km atmospheric range.Next, Lütkenhaus and Jahma explore the possible vulnerabilities of such systems (which employ attenuated laser pulses instead of actual single photon states) to conceivable future eavesdropping technologies. Enzer et al have implemented a totally new protocol, using polarization-entangled photons, which in some circumstances can tolerate higher error rates than the traditional one of Bennett and Brassard; moreover, the use of entanglement provides a means of `automatic source verification'.Finally, looking to the future, Elliott gives a provocative view of how these technologies may be merged into network operation, and Shapiro describes a method to combine a novel source of entangled photons with a means to transfer the photons' quantum state to trapped-atom quantum memories. If realized, these systems could presage the world's first quantum network. Focus on Quantum Cryptography Contents Quantum key distribution over 67 km with a plug&playsystem D Stucki, N Gisin, O Guinnard,G Ribordy and H Zbinden Autocompensatingquantum cryptography Donald S Bethune and William P Risk Practical free-space quantum keydistribution over 10 km in daylight and at night Richard J Hughes, Jane E Nordholt, Derek Derkacs andCharles G Peterson Quantum key distribution with realistic states:photon-number statistics in the photon-number splitting attack Norbert Lütkenhaus and Mika Jahma Entangled-photon six-state quantum cryptography Daphna G Enzer, Phillip G Hadley, RichardJ Hughes, Charles G Peterson and Paul GKwiat Building the quantumnetwork Chip Elliott Architectures for long-distance quantumteleportation Jeffrey H Shapiro Ground tosatellite secure key exchange using quantum cryptography J G Rarity, P R Tapster, P M Gorman and P Knight Method for decoupling error correction fromprivacy amplification Hoi-Kwong Lo Paul G Kwiat University of Illinois at Urbana-Champaign, USA
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.