3 February 2004 A theoretical and experimental test on the security of quantum cryptography key distribution Ekert's protocol based on Wigner's inequality
Author Affiliations +
Abstract
In this paper we prove both theoretically and experimentally the insecurity of the Ekert’s protocol for quantum-key distribution when based on the Wigner inequality when entangled photon pairs are used as source. The security proof of the Eckert’s protocol based on Wigner’s inequality consists in verifying the violation of W ≥ 0 (which corresponds to local-realistic theories). We highlight that a violation of the Wigner’s inequality occurs when Eve controls the two quantum channels. We give the theoretical motivation for this result and we perform an experiment proving this weakness, by realizing the condition of Eve gaining total control of the source of photon pairs. In addition we calculate the modified version of this inequality which guarantees safe quantum-key distribution, thus proving it experimentally.
© (2004) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Stefania Castelletto, Stefania Castelletto, Ivo Pietro Degiovanni, Ivo Pietro Degiovanni, Maria Luisa Rastello, Maria Luisa Rastello, Ivano Ruo Berchera, Ivano Ruo Berchera, Fabio Antonio Bovino, Fabio Antonio Bovino, Anna Maria Colla, Anna Maria Colla, Giuseppe Castagnoli, Giuseppe Castagnoli, } "A theoretical and experimental test on the security of quantum cryptography key distribution Ekert's protocol based on Wigner's inequality", Proc. SPIE 5161, Quantum Communications and Quantum Imaging, (3 February 2004); doi: 10.1117/12.506703; https://doi.org/10.1117/12.506703
PROCEEDINGS
11 PAGES


SHARE
RELATED CONTENT

Mathematical models of quantum noise
Proceedings of SPIE (January 08 2013)
Quantum three-pass cryptography protocol
Proceedings of SPIE (September 13 2002)
Delayed-choice quantum cryptography
Proceedings of SPIE (February 03 2004)
Calculation of the Exchange Coupling in Si:P Donor Systems
Proceedings of SPIE (February 23 2005)

Back to Top