You are on page 1of 4

Quantum Cryptography with Entangled Photons

Thomas Jennewein, Christoph Simon, Gregor Weihs,


Harald Weinfurter†, and Anton Zeilinger
Institut für Experimentalphysik, Universität Wien,
Boltzmanngasse 5, A–1090 Wien, Austria
†Sektion Physik, Universität München,
Schellingstr. 4/III, D-80799 München, Germany‡
(February 1, 2008)

used for testing the inequality. In3 , Ekert pointed out


that eavesdropping inevitably affects the entanglement
arXiv:quant-ph/9912117v1 28 Dec 1999

By realizing a quantum cryptography system based on po-


between the two constituents of a pair and therefore re-
larization entangled photon pairs we establish highly secure
duces the degree of violation of Bell’s inequality. While
keys, because a single photon source is approximated and
we are not aware of a general proof that the violation
the inherent randomness of quantum measurements is ex-
of a Bell inequality implies the security of the system,
ploited. We implement a novel key distribution scheme us-
ing Wigner’s inequality to test the security of the quantum this has been shown5 for the BB84 protocol adapted to
channel, and, alternatively, realize a variant of the BB84 pro- entangled pairs and the CHSH inequality6 .
tocol. Our system has two completely independent users sep- In any real cryptography system, the raw key gener-
arated by 360 m, and generates raw keys at rates of 400 – ated by Alice and Bob contains errors, which have to
800 bits/second with bit error rates arround 3%. be corrected by classical error correction7 over a public
channel. Furthermore it has been shown that whenever
Alice and Bob share a sufficiently secure key, they can en-
hance its security by privacy amplification techniques8 ,
The primary task of cryptography is to enable two par- which allow them to distill a key of a desired security
ties (commonly called Alice and Bob) to mask confiden- level.
tial messages such, that the transmitted data are illegible A range of experiments have demonstrated the feasi-
to any unauthorized third party (called Eve). Usually bility of quantum key distribution, including realizations
this is done using shared secret keys. However, in prin- using the polarization of photons9 or the phase of pho-
ciple it is always possible to intercept classical key dis- tons in long interferometers10. These experiments have a
tribution unnoticedly. The recent development of quan- common problem: the sources of the photons are attenu-
tum key distribution1 can cover this major loophole of ated laser pulses which have a non-vanishing probability
classical cryptography. It allows Alice and Bob to estab- to contain two or more photons, leaving such systems
lish two completely secure keys by transmitting single prone to the so called beam splitter attack11 .
quanta (qubits) along a quantum channel. The underly- Using photon pairs as produced by parametric down-
ing principle of quantum key distribution is that nature conversion allows us to approximate a conditional single
prohibits to gain information on the state of a quantum photon source12 with a very low probability for generat-
system without disturbing it. Therefore, in appropriately ing two pairs simultaneously and a high bit rate13 . More-
designed schemes, no tapping of the qubits is possible over, when utilizing entangled photon pairs one immedi-
without showing up to Alice and Bob. These secure keys ately profits from the inherent randomness of quantum
can be used in a One-Time-Pad protocol2 , which makes mechanical observations leading to purely random keys.
the entire communication absolutely secure. Various experiments with entangled photon pairs have
Two well known concepts for quantum key distribu- already demonstrated that entanglement can be pre-
tion are the BB84 scheme and the Ekert scheme. The served over distances as large as 10 km14 , yet none of
BB84 scheme1 uses single photons transmitted from Al- these experiments was a full quantum cryptography sys-
ice to Bob, which are prepared at random in four partly tem. We present in this paper a complete implementation
orthogonal polarization states: 0◦ , 45◦ , 90◦ , 135◦ . If Eve of quantum cryptography with two users, separated and
tries to extract information about the polarization of the independent of each other in terms of Einstein locality
photons she will inevitably introduce errors, which Alice and exploiting the features of entangled photon pairs for
and Bob can detect by comparing a random subset of the generating highly secure keys.
generated keys. In the following we will describe the variants of the
The Ekert scheme3 is based on entangled pairs and uses Ekert scheme and of the BB84 scheme which we both
Bell’s inequality4 to establish security. Both Alice and implemented in our experiment, based on polarization
Bob receive one particle out of an entangled pair. They entangled photon pairs in the singlet state
perform measurements along at least three different di-
rections on each side, where measurements along parallel 1
axes are used for key generation and oblique angles are |Ψ− i = √ [|HiA |V iB − |V iA |HiB ] , (1)
2
where photon A is sent to Alice and photon B is sent If the measured probabilities violate Wigner’s inequal-
to Bob, and H and V denote the horizontal and vertical ity, then the security of the quantum channel is ascer-
linear polarization respectively. This state shows perfect tained, and the generated keys can readily be used. This
anticorrelation for polarization measurements along par- scheme is an improvement on the Ekert scheme which
allel but arbitrary axes. However, the actual outcome uses the CHSH inequality and requires three settings of
of an individual measurement on each photon is inher- Alice’s and Bob’s analyzers for testing the inequality and
ently random. These perfect anticorrelations can be used generating the keys. From the resulting nine combina-
for generating the keys, yet the security of the quan- tions of settings, four are taken for testing the inequality,
tum channel remains to be ascertained by implementing two are used for building the keys and three are omitted
a suitable procedure. at all. However in our scheme each user only needs two
Our first scheme utilizes Wigner’s inequality15 for es- analyzer settings and the detected photons are used more
tablishing the security of the quantum channel, in anal- efficiently, thus allowing a significantly simplified experi-
ogy to the Ekert scheme which uses the CHSH inequality. mental implementation of the quantum key distribution.
Here Alice chooses between two polarization measure- As a second quantum cryptography scheme we imple-
ments along the axes χ and ψ, with the possible results mented a variant of the BB84 protocol with entangled
+1 and −1, on photon A and Bob between measurements photons, as proposed in Reference17 . In this case, Al-
along ψ and ω on photon B. Polarization parallel to the ice and Bob randomly vary their analysis directions be-
analyzer axis corresponds to a +1 result, and polarization tween 0◦ and 45◦ (Figure 1b). Alice and Bob observe
orthogonal to the analyzer axis corresponds to −1. perfect anticorrelations of their measurements whenever
Assuming that the photons carry preassigned values they happen to have parallel oriented polarizers, lead-
determining the outcomes of the measurements χ, ψ, ω ing to bitwise complementary keys. Alice and Bob ob-
and also assuming perfect anticorrelations for measure- tain identical keys if one of them inverts all bits of the
ments along parallel axes, it follows, that the probabil- key. Polarization entangled photon pairs offer a means to
ities for obtaining +1 on both sides, p++ , must obey approximate a single photon situation. Whenever Alice
Wigner’s inequality: makes a measurement on photon A, photon B is pro-
jected into the orthogonal state which is then analyzed
p++ (χ, ψ) + p++ (ψ, ω) − p++ (χ, ω) ≥ 0 . (2) by Bob, or vice versa. After collecting the keys, Alice
and Bob authenticate their keys by openly comparing a
The quantum mechanical prediction pqm ++ for these small subset of their keys and evaluating the bit error
probabilities at arbitrary analyzer settings α (Alice) and rate.
β (Bob) measuring the Ψ− state is The experimental realization of our quantum key dis-
tribution system is sketched in Figure 2. Type-II para-
pqm
++ (α, β) =
1
2 sin2 (α − β) . (3) metric down-conversion in β-barium borate18 (BBO),
pumped with an argon-ion laser working at a wavelength
The analyzer settings χ = −30◦ , ψ = 0◦ , and ω = 30◦
of 351 nm and a power of 350 mW, leads to the produc-
lead to a maximum violation of Wigner’s inequality (2):
tion of polarization entangled photon pairs at a wave-
pqm ◦ ◦ qm ◦ ◦ qm ◦ ◦ length of 702 nm. The photons are each coupled into
++ (−30 , 0 ) + p++ (0 , 30 ) − p++ (−30 , 30 ) =
1 1 3
500 m long optical fibers and transmitted to Alice and
= 8 + 8 − 8 = − 81 ≥ 0 . (4) Bob respectively, who are separated by 360 m.
Alice and Bob both have Wollaston polarizing beam
As Wigner’s inequality is derived assuming perfect an- splitters as polarization analyzers. We will associate
ticorrelations, which are only approximately realized in a detection of parallel polarization (+1) with the key
any practical situation, one should be cautious in ap- bit 1 and orthogonal detection (−1) with the key bit
plying it to test the security of a cryptography scheme. 0. Electro-optic modulators in front of the analyzers
When the deviation from perfect anticorrelations is sub- rapidly switch (rise time < 15 ns, minimum switching
stantial, Wigner’s inequality has to be replaced by an interval 100 ns) the axis of the analyzer between two de-
adapted version16 . sired orientations, controlled by quantum random signal
In order to implement quantum key distribution, Alice generators19. These quantum random signal generators
and Bob each vary their analyzers randomly between two are based on the quantum mechanical process of split-
settings, Alice: −30◦ , 0◦ and Bob: 0◦ , 30◦ (Figure 1a). ting a beam of photons and have a correlation time of
Because Alice and Bob operate independently, four possi- less than 100 ns.
ble combinations of analyzer settings will occur, of which The photons are detected in silicon avalanche photo
the three oblique settings allow a test of Wigner’s in- diodes20 . Time interval analyzers on local personal com-
equality and the remaining combination of parallel set- puters register all detection events as time stamps to-
tings (Alice= 0◦ and Bob= 0◦ ) allows the generation of gether with the setting of the analyzers and the detection
keys via the perfect anticorrelations, where either Alice result. A measurement run is initiated by a pulse from a
or Bob has to invert all bits of the key to obtain identical separate laser diode sent from the source to Alice and Bob
keys. via a second optical fiber. Only after a measurement run

2
is completed, Alice and Bob compare their lists of detec- Alice and Bob arrange their keys in blocks of n bits and
tions to extract the coincidences. In order to record the evaluate the bit parity of the blocks (a single bit indicat-
detection events very accurately, the time bases in Alice’s ing an odd or even number of ones in the block). The par-
and Bob’s time interval analyzers are controlled by two ities are compared in public, and the blocks with agree-
rubidium oscillators. The stability of each time base is ing parities are kept after discarding one bit per block22 .
better than 1 ns for one minute. The maximal duration Since parity checks only reveal odd occurrences of bit
of a measurement is limited by the amount of memory in errors, a fraction of errors remains. The optimal block
the personal computers (typically one minute). length n is determined by a compromise between key
Overall our system has a measured total coincidence losses and remaining bit errors. For a bit error rate p the
rate of ∼ 1700s−1 , and a singles rate of ∼ 35000s−1 probability for k wrong bits in a block of  n bits is given
. From this, one can estimate the overall detection ef- by the binomial distribution Pn (k) = nk pk (1 − p)n−k .
ficiency of each photon path to be 5 % and the pair Neglecting terms for three or more errors and account-
production rate to be 7 · 105 s−1 . Our system is very ing for the loss of one bit per agreeing parity, this algo-
immune against a beam splitter attack because the ratio rithm has an efficiency η(n) = (1 − Pn (1))(n − 1)/n,
of two-pair events is only ∼ 3 · 10−3 , where a two-pair defined as the ratio between the key sizes after par-
event is the emission of two pairs within the coincidence ity check and before. Finally, under the same approx-
window of 4 ns. The coincidence window in our exper- imation as above, the remaining bit error rate p′ is
iment is limited by the time resolution of our detectors p′ = (1 − Pn (0) − Pn (1))(2/n). Our key has a bit er-
and electronics, but in principle it could be reduced to ror rate p = 2.5 %, for which η(n) is maximized at n = 8
the coherence time of the photons, which is usually of the with η(8) = 0.7284, resulting in p′ = 0.40 %. Hence, from
order of picoseconds. ∼ 80000 bits of raw key with a quantum bit error rate of
In realizing the quantum key distribution based on 2.5 %, Alice and Bob use 10 % of the key for checking
Wigner’s inequality, Alice’s analyzer switch randomly the security and the remaining 90 % of the key to distill
with equal frequency between −30◦ and 0◦ , and Bob’s 49984 bits of error corrected key with a bit error rate of
analyzer between 0◦ and 30◦ . After a measurement, Alice 0.4%. Finally, Alice transmits a 43200 bit large image to
and Bob extract the coincidences for the combinations of Bob via the One-Time-Pad protocol, utilizing a bitwise
settings of (−30◦ , 30◦ ), (−30◦ , 0◦ ) and (0◦ , 30◦ ), and cal- XOR combination of message and key data (Figure 3).
culate each probability. E.g. the probability p++ (0◦ , 30◦ ) In this letter we presented the first full implementation
is calculated from the numbers of coincident events C++ , of entangled state quantum cryptography. All the equip-
C+− , C−+ , C−− measured for this combination of set- ment of the source and of Alice and Bob has proven to op-
tings by erate outside shielded lab-environments with a very high
C++ reliability. While further practical and theoretical inves-
p++ (0◦ , 30◦ ) = . (5) tigations are still necessary, we believe that this work
C++ + C+− + C−+ + C−− demonstrates that entanglement based cryptography can
We observed in our experiment that the left hand side be tomorrow’s technology.
of inequality (2) evaluated to −0.112 ± 0.014. This vio- This work was supported by the Austrian Science
lation of (2) is in good agreement with the prediction of Foundation FWF (Projects No. S6502, S6504 and
quantum mechanics and ensures the security of the key F1506), the Austrian Academy of Sciences, and the TMR
distribution. Hence the coincident detections obtained program of the European Commission (Network contract
at the parallel settings (0◦ , 0◦ ), which occur in a quar- No. ERBFMRXCT96-0087).
ter of all events, can be used as keys. In the experiment
Alice and Bob established 2162 bits raw keys at a rate
of 420 bits/second21 , and observed a quantum bit error
rate of 3.4 %.
In our realization of the BB84 scheme, Alice’s and
Bob’s analyzers both switch randomly between 0◦ and
1
45◦ . After a measurement run, Alice and Bob extract the C. H. Bennett and G. Brassard, Proc. Internat. Conf. Com-
coincidences measured with parallel analyzers, (0◦ , 0◦ ) puter Systems and Signal Processing, Bangalore, pp. 175
and (45◦ , 45◦ ), which occur in half of the cases, and gen- (1984). C. H. Bennett, G. Brassard, and A. Ekert, Scientific
erate the raw keys. Alice and Bob collected ∼ 80000 bits American, pp. 26, October 1992.
2
of key at a rate of 850 bits/second, and observed a quan- In this classical cryptographic protocol the message is com-
tum bit error rate of 2.5 %, which ensures the security of bined with a random key string of the same size as the
the quantum channel. message to form an encoded message which cannot be de-
For correcting the remaining errors while maintaining ciphered by any statistical methods. G.S. Vernam, J. Am.
the secrecy of the key, various classical error correction Inst. Elec. Eng. 55, 109 (1926).
3
A.K. Ekert, Phys. Rev. Lett. 67, 661 (1991).
and privacy amplification schemes have been developed7 . 4
J. S. Bell, Physics (Long Island City, N.Y.) 1, 195 (1965).
We implemented a simple error reduction scheme requir- 5
C. Fuchs, N. Gisin, R. B. Griffiths, C. S. Niu, and A. Peres,
ing only little communication between Alice and Bob.

3
Phys. Rev. A 56, 1163 (1997). color table unchanged.
6 24
J. F. Clauser, M. A. Horne, A. Shimony, and R. A. Holt, The “Venus” von Willendorf was found in 1908 at Wil-
Phys. Rev. Lett. 23, 880 (1969). lendorf in Austria and presently resides in the Naturhis-
7
C.H. Bennett and G. Brassard, J. Cryptology 5, 3 (1992). torisches Museum, Vienna. Carved from limestone and
8
C.H. Bennett, G. Brassard, C. Crépeau, and U.M. Maurer, dated 24.000–22.000 BC, she represents an icon of prehis-
IEEE Trans. Inf. Theo. 41, 1915 (1995). toric art.
9
C. H. Bennett, F. Bessette, G. Brassard, L. Savail, and J.
Smolin, J. Cryptology 5, 3 (1992); A. Muller, J. Breguet,
and N. Gisin, Europhys. Lett. 23, 383 (1993); J.D. Franson
and B.C. Jacobs, Electron. Lett. 31, 232 (1995); W. T.
Buttler, R. J. Hughes, P. G. Kwiat, S. K. Lamoreaux, G.
G. Luther, G. L. Morgan, J. E. Nordholt, C. G. Peterson,
and C. M. Simmons, Phys. Rev. Lett. 81, 3283 (1998).
10
C. Marand and P.D. Townsend, Opt. Lett. 20, 1695 (1995);
R.J. Hughes, G.G. Luther, G.L. Morgan, C.G. Peterson,
and C. Simmons, Lect. Notes in Comp. Sci. 1109, 329
(1996); A. Muller, T. Herzog, B. Huttner, W. Tittel, H. FIG. 1. Settings for Alice’s and Bob’s analyzers for real-
Zbinden, and N. Gisin, Appl. Phys. Lett. 70, 793 (1997). izing quantum key distribution based either on (a) Wigner’s
11
N. Lütkenhaus, G. Brassard, T. Mor, and B.C. Sanders, to inequality or (b) the BB84 protocol. The angular coordinates
be published. are referenced to the propagation direction of the particle.
12
One photon of the pair can be used as a trigger for finding
the other photon of the pair, provided that the probability
of producing two pairs at a single time can be neglected.
P. Grangier, G. Roger, and A. Aspect, Europhys. Lett., 1,
4, 173 (1986); J.G. Rarity, P.R. Tapster, and E. Jakeman,
Opt.Comm. 62, 201 (1987).
13
Note also that in our case the beam splitter attack is less
effective than for coherent pulses, because even when two
pairs are produced simultaneously, Eve does not gain any
information in those cases where Alice and Bob detect pho-
tons belonging to the same pair, because then the photon FIG. 2. The polarization entangled photons are transmit-
detected by Eve originates from a different pair and is com- ted via optical fibers to Alice and Bob, who are separated by
pletely uncorrelated to Alice’s and Bob’s photons. 360 m, and both photons are analyzed, detected and regis-
14
P.R. Tapster, J.G. Rarity, and P.C.M. Owens, Phys. Rev. tered independently. After a measurement run the keys are
Lett. 73, 1923 (1994); W. Tittel, J. Brendel, H. Zbinden, established by Alice and Bob through classical communica-
and N. Gisin, Phys. Rev. Lett. 81, 3563 (1998); G. Weihs, tion over a standard computer network.
T. Jennewein, C. Simon, H. Weinfurter, and A. Zeilinger,
Phys. Rev. Lett. 81, 5039 (1998).
15
E.P. Wigner, Am. J. Phys., 38, 1005 (1970).
16
M. Zukowski, private communication; L. C. Ryff, Am. J.
Phys. 65(12), 1197 (1997).
17
C.H. Bennett, G. Brassard, and N.D. Mermin, Phys. Rev.
Lett. 68, 557 (1992).
18
P. G. Kwiat, K. Mattle, H. Weinfurter, A. Zeilinger, A.
V. Sergienko, and Y. H. Shih, Phys. Rev. Lett. 75, 4337
(1995).
19
T. Jennewein, U. Achleitner, G. Weihs, H. Weinfurter, and
A. Zeilinger, to appear in Rev. Sci. Instr.
20
S. Cova, M. Ghioni, A. Lacaita, C. Samori, and F. Zappa,
Appl. Opt., 35, 1956 (1996).
21
Note that it would be simple to bias the frequencies of
analyzer combinations to increase the production rate of
the keys.
22
Removal of one bit erases the information about the blocks
contained in the (public) parities. FIG. 3. The 49984 bit large keys generated by the BB84
23 scheme are used to securely transmit an image23 (a) of the
Windows-BMP format containing 60 × 90 pixel, 8 bit color
information per pixel: 43200 bit of picture information. “Venus von Willendorf”24 effigy. Alice encrypts the image
The file includes some header information and a color table, via bitwise XOR operation with her key and transmits the
encrypted image (b) to Bob via the computer network. Bob
making the entire picture file 51840 bit. We encrypted only
the picture information, leaving the file header and the decrypts the image with his key, resulting in (c) which shows
only few errors due to the remaining bit errors in the keys.

You might also like