Quantum Cryptography Using Entangled Photons in Energy-Time Bell States
Quantum Cryptography Using Entangled Photons in Energy-Time Bell States
Quantum Cryptography Using Entangled Photons in Energy-Time Bell States
1
leading to a detection in the different time slots both at Like in the BB84 protocol [16] it is the use of com-
Alice’s and at Bob’s detector. Obviously, this reasoning plementary bases that ensures the detection of an eaves-
holds for any combination of two detectors. In order to dropper [17]. If we consider for instance the most in-
build up the secret key, Alice and Bob now publicly agree tuitive intercept/resend strategy, the eavesdropper inter-
about the events where both detected a photon in one of cepts the photons, measures them in one of the two bases
the satellite peaks – without revealing in which one – or and sends new, accordingly prepared photons instead.
both in the central peak – without revealing the detec- Since she never knows in which basis Bob’s measurement
tor. This additional information enables both of them to will take place, she will in half of the cases eavesdrop
know exactly via which arm the sister photon, detected and resend the photons in the ”wrong basis” and there-
by the other person, has traveled. For instance, to come fore will statistically introduce errors in Bobs results, re-
back to the above given example, if Bob tells Alice that vealing in turn her presence. For a more general treat-
he detected his photon in a satellite peak as well, she ment of quantum key distribution and eavesdropping us-
knows that the process must have been | s ip ; | s iA | s iB . ing energy-time complementarity, we refer the reader to
The same holds for Bob who now knows that Alice pho- [18].
ton traveled via the short arm in her interferometer. If To generate the short pump pulses, we use a pulsed
both find the photons in the right peak, the process was diode laser (PicoQuant PDL 800), emitting 600ps
| l ip ; | l iA | l iB . In either case, Alice and Bob have corre- (FWHM) pulses of 655 nm wavelength at a repetition
lated detection times. The cross terms where one of them frequency of 80 MHz. The average power is of ≈ 10 mW,
detect a photon in the left and the other one in the right equivalent to an energy of 125 pJ per pulse. The light
satellite peak do not occur. Assigning now bitvalues 0 passes a dispersive prism, preventing the small quantity
(1) to the short (long) processes, Alice and Bob finally of also emitted infrared light to enter the subsequent
end up with a sequence of correlated bits. setup, and a polarizing beamsplitter (PBS), serving as
Otherwise, if both find the photon in the central optical isolator. The pump is then focussed into a single-
slot, the process must have been | s ip ; | l iA | l iB or mode fiber and is guided into a fiber optical Michelson
| l ip ; | s iA | s iB . If both possibilities are indistinguish- interferometer made of a 3 dB fiber coupler and chem-
able, we face the situation of interference and the prob- ically deposited silver end mirors. The path length dif-
ability for detection by a given combination of detectors ference corresponds to a difference of travel times of ≈
(e.g. the ”+”-labeled detector at Alice’s and the ”–” la- 1.2 ns, splitting the pump pulse into two, well seperated
beled one at Bob’s) depends on the phases α, β and φ pulses. The arm-length difference of the whole interfer-
in the three interferometers. The quantum mechanical ometer can be controlled using a pizoelectric actuator in
treatment leads to Pi,j = 21 1 + ijcos(α + β − φ) with
order to ensure any desired phase difference. Besides, the
i,j = ±1 denoting the detector labels [14]. Hence, chos- temperature is maintained stable. In order to control the
ing appropriate phase settings, Alice and Bob will always evolution of the polarization in the fibers, we implement
find perfect correlations in the output ports. Either both three fiber-optical polarization controllers, each one con-
detect the photons in detector ”–” (bitvalue ”0”), or both sisting of three inclinable fiber loops – equivalent to three
in detector ”+” (bitvalue ”1”). Since the correlations de- waveplates in the case of bulk optic. The first device
pend on the phases and thus on the energy of the pump, is placed before the interferometer and ensures that all
signal and idler photons, we refer to this base as the en- light, leaving the Michelson interferometer by the input
ergy base (showing wave like behaviour), stressing the port will be reflected by the already mentioned PBS and
complementarity with the other, the time basis (showing thus will not impinge onto the laser diode. The second
particle like behaviour). controller serves to equalize the evolution of the polariza-
tion states within the different arms of the interferome-
ter, and the last one enables to control the polarization
Laser
Bob
2
converted photons are then focussed into a fiber coupler, Bell inequalities as well [15,19]. From the mean visibil-
separating them in half of the cases, and are guided to ity of (92.2±0.8)%, we can infer to a violation of Bell
Alice and Bob, respectively. The interferometers (type inequalities by 27 standard deviations.
Michelson) located there have been described in detail in
[6]. They consist of a 3-port optical circulator, providing
600
access to the second output arm of the interferometer,
a 3 dB fiber coupler and Faraday mirrors in order to
this case, ”the same” refers to the coherence time of the phase [a.u.]
3
advantage of using discrete energy-time states, up to di- pulses where the detecting electronics has to be activated
mension 4, in our scheme, is the fact that no fast change whenever a weak pulse (containing most of the time no
between non-commuting bases is necessary. Nature itself photon) was emitted.
chooses between the complementary properties energy [9] G. Brassard, N. Lütkenhaus, T. Mor, and B.C. Sanders.
and time. Furthermore, the recent demonstration that quant-ph/9911054.
energy-time entanglement can be preserved over long dis- [10] H. Weinfurter, Europhys. Lett 25, 559 (1994). M. Mich-
tances [6] shows that this scheme is perfectly adapted to ler, K. Mattle, H. Weinfurter, and A. Zeilinger. Phys.
long-distance quantum cryptography. Rev. A 53, R1209 (1996).
We would like to thank J.D. Gautier for technical sup- [11] C.H. Bennett, G. Brassard, C. Crpeau, R. Jozsa, A.
port and PicoQuant for fast delivery of the laser. This Peres, and W.K. Wootters. Phys. Rev. Lett. 70 1895
(1993). D. Bouwmeester, J.-W. Pan, K. Mattle, M. Eibl,
work was supported by the Swiss PPOII and the Euro-
D. Boschi, S. Branca, F. De Martini, L. Hardy, and S.
pean QuCom IST projects.
Popescu. Phys. Rev. Lett. 80, 1121 (1998). A. Furusawa,
J.L. Sorensen, S.L. Braunstein, C.A. Fuchs, H.J. Kimble,
and E.S. Polzik. Science 282, 706 (1998).
[12] K. Mattle, H. Weinfurter, P.G. Kwiat, and A. Zeilinger.
Phys. Rev. Lett. 76, 4656 (1996).
[13] J.-W. Pan, D. Bouwmeester, H. Weinfurter, and A.
Zeilinger. Phys. Rev. Lett. 80, 3891 (1998).
[1] Physics World, March 1998, special issue in quan- [14] J. Brendel, N. Gisin, W. Tittel, and H. Zbinden. Phys.
tum communication including an article by W. Tittel, Rev. Lett. 82, 2594 (1999).
G.Ribordy, and N.Gisin on quantum cryptography. [15] J.D. Franson, Phys. Rev. Lett. 62, 2205 (1989).
[2] See e.g. D. Welsh, Codes and Cryptography, Oxfors Sci- [16] C.H. Bennett and G. Brassard, in Proceedings of IEEE
ence Publication, Clarendon Press, Oxford (1988). International Conference on Computers, Systems and
[3] A. Muller, T. Herzog, B. Huttner, W. Tittel, H. Zbinden, Signal Processing, Bangalore, India (IEEE, New York,
and N. Gisin, Appl. Phys. Lett 70, 793 (1997). G. Ri- 1984), p.175
bordy, J.-D. Gautier, N. Gisin, O. Guinnard, and H. [17] C. Fuchs, N. Gisin, R. B. Griffiths, C. S. Niu and A.
Zbinden. quant-ph/9905056. Peres Phys. Rev. A 56, 1163 (19997). I. Cirac and N.
[4] P.D. Townsend. Opt. Fiber Technology 4, 345 (1998). Gisin, Phys. Lett. A 229, 1 (1997).
R.J. Hughes, G.L. Morgan, and C.G. Peterson. quant- [18] H. Bechmann-Pasquinucci and W. Tittel. quant-
ph/9904038. J.-M. Mérolla, Y. Mazurenko, J.-P. Goedge- ph/9910095.
buer, and W.T. Rhodes. Phys. Rev. Lett. 82, 1656 [19] J.S. Bell, Physics 1, 195 (1964).
(1999).
[5] P.R.Tapster, J.G. Rarity, and P.C.M. Owens. Phys. Rev.
Lett. 73, 1923 (1994). W. Tittel, J. Brendel, N. Gisin, T.
Herzog, and H. Zbinden. Phys. Rev. A 57, 3229 (1998). ++ +– –+ ––
W. Tittel, J. Brendel, H. Zbinden, and N. Gisin. Phys. sP sA &sP sB 278±6 197±5 187±5 147±4
Rev. Lett. 81, 3563 (1998). G. Weihs, T. Jennewein, C. lP lA &lP lB 304±7 201±5 200±5 148±5
Simon, H. Weinfurter, and A. Zeilinger, Phys. Rev. Lett. sP sA &lP lB 11±0.8 10.4±0.8 9.2±0.7 9.4±0.7
81, 5039 (1998). lP lA &sP sB 11.2±0.4 8.6±0.4 9.1±0.4 8.5±0.4
[6] W. Tittel, J. Brendel, N. Gisin, and H. Zbinden. Phys. QBER [%] 3.7±0.2 4.6±0.2 4.5±0.2 5.7±0.3
Rev. A 59, 4150 (1999).
TABLE I. Results of the measurement in the time ba-
[7] A.K. Ekert, Phys. Rev. Lett. 67, 661 (1991).
sis. The different coincidence count rates are due to different
[8] When using coherent states, the eavesdropper can take
quantum efficiencies of the detectors, and the slight asymme-
advantage of the fact that there always is a small proba-
try in the correlated events can be explained by the non-equal
bility of finding more than one photon in the same pulse,
transmission probabilities within the interferometers.
hence in the same state. In these cases, she simply mea-
sures one and lets pass the other one unmeasured. This
strategy can be somewhat circumvented using photon
pairs, where one photon serves as trigger for the sec- ++ +– –+ ––
ond one. However, since the possibility to create more Visibility [%] 92.5±1.8 92.6±1.4 89.3±1.9 94.5±1.6
than one pair at the same time increases with the pump max. 518±13 416±8 359±9 279±7
intensity, we face a similar problem concerning the simul- min. 20±5 16±3 20±4 8±2
taneous presence of more than one photon in the same QBER [%] 3.7±0.9 3.7±0.7 5.3±1 2.8±0.8
state. Note that this probability can be made arbitrarily
small in both cases using weaker pulses or lower pump TABLE II. Results of the measurement in the energy-basis.
energies. Still, there is an important difference, favouring
the implementation of photon pairs: Whenever the trig-
ger photon has been detected, there is one photon left in
the setup. This contrasts with the schemes based on faint