Share Email Print

Proceedings Paper

Alice, Bob, and Eve in quantumland: from the polarization of photons to quantum information processing
Author(s): Tal Mor
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

The use of polarized photons in cryptography holds the promise of secure cryptographic quantum key distribution schemes. In theory, quantum key distribution provides a key with unconditional security. In practice, however, the implemented schemes are often operated in a regime which excludes unconditional security, or even in a regime in which insecurity can be proven. We shall describe here the basics of quantum key distribution, provide an overview of the main ideas that lead to a proof of its unconditional security, and discuss the insecurity of practical quantum key distribution to long distances. The above review will be undertaken with a special emphasis on the role of the polarization of photons. Finally, we shall briefly touch on the importance of photons and their polarization degree of freedom in recent proposals for small-scale optical quantum computing.

Paper Details

Date Published: 18 August 2005
PDF: 9 pages
Proc. SPIE 5888, Polarization Science and Remote Sensing II, 588817 (18 August 2005); doi: 10.1117/12.620266
Show Author Affiliations
Tal Mor, Technion (Israel)

Published in SPIE Proceedings Vol. 5888:
Polarization Science and Remote Sensing II
Joseph A. Shaw; J. Scott Tyo, Editor(s)

© SPIE. Terms of Use
Back to Top