28 September 2011 Cryptography and system state estimation using polarization states
Author Affiliations +
Abstract
We present new results on cryptography and system state estimation using polarization states of photons. Current quantum cryptography applications are based on the BB84 protocol which is not secure against photon siphoning attacks. Recent research has established that the information that can be obtained from a pure state in repeated experiments is potentially infinite. This can be harnessed by sending a burst of photons confined to a very narrow time window, each such burst containing several bits of information. The proposed method represents a new way of transmitting secret information. While polarization shift-keying methods have been proposed earlier, our method is somewhat different in that it proposes to discover the polarization state of identical photons in a burst from a laser which codes binary information. We also present results on estimating the state of a system based on the polarization of the received photons which can have applications in intrusion detection.
© (2011) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Subhash Kak, Subhash Kak, Pramode Verma, Pramode Verma, Greg MacDonald, Greg MacDonald, "Cryptography and system state estimation using polarization states", Proc. SPIE 8121, The Nature of Light: What are Photons? IV, 81210M (28 September 2011); doi: 10.1117/12.893659; https://doi.org/10.1117/12.893659
PROCEEDINGS
9 PAGES


SHARE
RELATED CONTENT

A quantum oblivious transfer protocol
Proceedings of SPIE (September 30 2013)
Link-layer vulnerabilities of quantum cryptography
Proceedings of SPIE (September 23 2005)
Quantum communication and single-photon technologies
Proceedings of SPIE (June 28 2001)
Free-space quantum cryptography for metropolitan areas
Proceedings of SPIE (October 15 2006)
Quantum three-pass cryptography protocol
Proceedings of SPIE (September 12 2002)
Simulation of quantum cryptolographic key distribution
Proceedings of SPIE (September 12 2002)

Back to Top