Abstract
A set of protocols for direct coding/decoding of the bi-photon light is proposed. Security of the protocols is provided by the possibility of obtaining information on the presence/absence of unauthorized intervention in the process of information transfer from the results of measurements for the channel states. Coding is realized by introducing an additional unbalance of the phases of two bi-photon light beams, and decoding is realized by heterodyne detection of quadratures of the bi-photon light followed by calculation of correlations of the quadratures.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
Ch. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” International Conference on Computers, Systems & Signal Processing (Bangalore, India, 1984).
Artur K. Ekert, Phys. Rev. Lett., 67, 661 (1991).
Ch. H. Bennett, F. Bessette, G. Brassard, et al., J. Cryptol., 5, 3 (1992).
D. N. Klyshko, Usp. Fiz. Nauk, 39, 573 (1996).
H. M. Wiseman and R. B. Killip, Phys. Rev. A, 57, 2169 (1998).
S. Mancini, V. I. Man’ko, and P. Tombesi, Phys. Lett. A, 213, 1 (1996).
S. N. Molotkov, J. Exp. Theor. Phys., 112, 370 (2011).
Leon Brillouin, Science and Information Theory, Academic Press, New York (1956).
Holger F. Hofmann, Takayoshi Kobayashi, and Akira Furusawa, Phys. Rev. A, 62, 013806 (2000).
G. S. Agarwal, Phys. Rev. Lett., 57, 827 (1986).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Usenko, C.V. Quantum cryptography with direct coding of the bi-photon light. J Russ Laser Res 33, 283–292 (2012). https://doi.org/10.1007/s10946-012-9283-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10946-012-9283-x