Paper
18 August 2005 Alice, Bob, and Eve in quantumland: from the polarization of photons to quantum information processing
Author Affiliations +
Abstract
The use of polarized photons in cryptography holds the promise of secure cryptographic quantum key distribution schemes. In theory, quantum key distribution provides a key with unconditional security. In practice, however, the implemented schemes are often operated in a regime which excludes unconditional security, or even in a regime in which insecurity can be proven. We shall describe here the basics of quantum key distribution, provide an overview of the main ideas that lead to a proof of its unconditional security, and discuss the insecurity of practical quantum key distribution to long distances. The above review will be undertaken with a special emphasis on the role of the polarization of photons. Finally, we shall briefly touch on the importance of photons and their polarization degree of freedom in recent proposals for small-scale optical quantum computing.
© (2005) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Tal Mor "Alice, Bob, and Eve in quantumland: from the polarization of photons to quantum information processing", Proc. SPIE 5888, Polarization Science and Remote Sensing II, 588817 (18 August 2005); https://doi.org/10.1117/12.620266
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Photons

Quantum key distribution

Quantum communications

Polarization

Information security

Quantum computing

Signal detection

RELATED CONTENT


Back to Top