Cryptography Reference
In-Depth Information
3. J.-C. Boileau, D. Gottesman, R. Laflamme, D. Poulin, and R. Spekkens, quant-
ph/0306199, 2003.
4. A. Muller, T. Herzog, B. Huttner, W. Tittel, H. Zbinden, and N. Gisin, Appl.
Phys. Lett., 70, 793, 1997.
5. D.S. Bethune and W.P. Risk, IQEC'98 Digest of Postdeadline Papers, 12-2, 1998.
6. Z. Walton, A.F. Abouraddy, A.V. Sergienko, B.E.A. Saleh, and M.C. Teich, Phys.
Rev. A, 67, 062309, 2003.
7. Z. Walton, A.F. Abouraddy, A.V. Sergienko, B.E.A. Saleh, and M.C. Teich, Phys.
Rev. Lett. , 91, 087901, 2003.
8. J. Brendel, N. Gisin, W. Tittel, and H. Zbinden, Phys. Rev. Lett., 82, 2594, 1999.
9. A.V. Belinsky and D.N. Klyshko, Laser Phys. (Moscow), 2, 112, 1992.
10. C.H. Bennett, Phys. Rev. Lett., 68, 3121, 1992.
11. M. Martinelli, Opt. Comm., 72, 341, 1989.
12. S.L. Braunstein and A. Mann, Phys. Rev. A, 51, R1727, 1995.
13. M. Zukowski, A. Zeilinger, M.A. Horne, and A.K. Ekert, Phys. Rev. Lett., 71,
4287, 1993.
14. C.H. Bennett and G. Brassard, Proceedings of the IEEE International Conference on
Computers, Systems and Signal Processing, 175-179, 1984.
15. T.E. Keller and M.H. Rubin, Phys. Rev. A, 56, 1534, 1997.
16. F. De Martini, G. Di Giuseppe, and S. Padua, Phys. Rev. Lett., 87, 150401, 2001.
17. Y.-H. Kim and W.P. Grice, J. Mod. Optics, 49, 2309, 2002.
18. T. Yamamoto, M. Koashi, S.K. Ozdemir, and N. Imoto, Nature, 421, 343, 2003.
19. H. Bechmann-Pasquinucci and W. Tittel, Phys. Rev. A, 61, 62308, 2000.
20. K. Inoue, E. Waks, and Y. Yamamoto, Phys. Rev. Lett., 89, 37902, 2002.
21. W. Tittel, J. Brendel, H. Zbinden, and N. Gisin, Phys. Rev. Lett. , 84, 4737, 2000.
22. One can always convert an active-detection scheme to a passive-detection
scheme by using a beam splitter to probabilistically send the received pho-
ton(s) to one of some number of separate detection setups. A drawback of
this approach is that the number of optical elements required is increased. The
passive schemes described in this chapter, like that in Reference [8], are “in-
trinsically passive,” in that they achieve passive operation without increasing
the number of optical elements required.
23. The idea of using pole states is explored in Reference [19]; however, that paper
does not mention the possibility of passive detection.
24. A similar idea is presented in Reference [20]. In that paper, Alice uses four
states of a three-state quantum system, and Bob achieves passive detection
by mapping Alice's three-state quantum system into an eight-state quantum
system.
25. On the occasions when Bob's detection pattern is (early, middle), (middle,
early), (middle, late), or (late, middle), he has also effectively measured in the
time basis. However, to simplify the analysis by making the probability of
successful bit-sharing independent of the basis in which Alice sent, we con-
sider only the extreme cases (early, early) and (late, late) as valid time-basis
detections.
26. A femtosecond pump pulse is typically desired for experiments involving the
simultaneous creation of multiple down-converted photon pairs [16]. Our im-
plementation does not require such a brief pump pulse and will work with a
picosecond laser, such as that used in Reference [21].
Search WWH ::




Custom Search