18 August 2005 Alice, Bob, and Eve in quantumland: from the polarization of photons to quantum information processing
Author Affiliations +
Abstract
The use of polarized photons in cryptography holds the promise of secure cryptographic quantum key distribution schemes. In theory, quantum key distribution provides a key with unconditional security. In practice, however, the implemented schemes are often operated in a regime which excludes unconditional security, or even in a regime in which insecurity can be proven. We shall describe here the basics of quantum key distribution, provide an overview of the main ideas that lead to a proof of its unconditional security, and discuss the insecurity of practical quantum key distribution to long distances. The above review will be undertaken with a special emphasis on the role of the polarization of photons. Finally, we shall briefly touch on the importance of photons and their polarization degree of freedom in recent proposals for small-scale optical quantum computing.
© (2005) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Tal Mor, "Alice, Bob, and Eve in quantumland: from the polarization of photons to quantum information processing", Proc. SPIE 5888, Polarization Science and Remote Sensing II, 588817 (18 August 2005); doi: 10.1117/12.620266; https://doi.org/10.1117/12.620266
PROCEEDINGS
9 PAGES


SHARE
RELATED CONTENT

143 km free-space quantum teleportation
Proceedings of SPIE (October 08 2014)
Approaches to a global quantum key distribution network
Proceedings of SPIE (October 05 2017)
Quantum private data sampling
Proceedings of SPIE (August 26 2009)
Practical quantum cryptography
Proceedings of SPIE (August 24 2004)
Gigahertz quantum cryptography
Proceedings of SPIE (February 18 2011)

Back to Top