We discuss a simple experiment illustrating the fundamentals of quantum cryptography. Our experiment is performed using novel complementary observables: the transverse position and momentum of photons. In the classical optics regime the experiment serves as an interesting and simple classroom demonstration of the principles of quantum key distribution.
REFERENCES
1.
Quantum Theory and Measurement
, edited by J. A.
Wheeler
and W. H.
Zurek
(Princeton
, U.P., Princeton, NJ, 1983
).2.
N.
Gisin
, G.
Ribordy
, W.
Tittel
, and H.
Zbinden
, “Quantum cryptography
,” Rev. Mod. Phys.
74
, 145
–195
(2002
).3.
C. E.
Shannon
and W.
Weaver
, The Mathematical Theory of Communication
(The University of Illinois Press
, Urbana, IL, 1948
).4.
C. H.
Bennett
and G.
Brassard
, “Quantum Cryptography: Public Key Distribution and Coin Tossing
,” in Proceedings of the International Conference on Computer Systems and Signal Processing
, Bangalore
, 1984
, pp. 175
–179
.5.
C. H.
Bennett
, F.
Bessette
, G.
Brassard
, L.
Salvail
, and J.
Smolin
, “Experimental quantum cryptography
,” J. Cryptology
5
, 3
–20
(1992
).6.
A. K.
Ekert
, “Quantum cryptography based on Bell’s theorem
,” Phys. Rev. Lett.
67
, 661
–663
(1991
).7.
T.
Jennewein
, C.
Simon
, G.
Weihs
, H.
Weinfurter
, and A.
Zeilinger
, “Quantum cryptography with entangled photons
,” Phys. Rev. Lett.
84
, 4729
–4732
(2000
).8.
D.
Naik
, C.
Peterson
, A.
White
, A.
Berlund
, and P.
Kwiat
, “Entangled state quantum cryptography: Eavesdropping on the Ekert protocol
,” Phys. Rev. Lett.
84
, 4733
–4736
(2000
).9.
W.
Tittel
, J.
Brendel
, H.
Zbinden
, and N.
Gisin
, “Quantum cryptography using entangled photons in energy-time Bell states
,” Phys. Rev. Lett.
84
, 4737
–4740
(2000
).10.
F.
Grosshans
and P.
Grangier
, “Continuous variable quantum cryptography using coherent states
,” Phys. Rev. Lett.
88
, 057902
–1
(2002
).11.
T. C.
Ralph
, “Continuous variable quantum cryptography
,” Phys. Rev. A
61
, 010303
–1
(1999
).12.
W. K.
Wootters
and W. H.
Zurek
, “A single quantum cannot be cloned
,” Nature (London)
299
, 802
–803
(1982
).13.
D.
Stoler
, “Operator methods in physical optics
,” J. Opt. Soc. Am.
71
, 334
–341
(1981
).14.
M. P.
Almeida
, S. P.
Walborn
, and P. H. S.
Ribeiro
, “Experimental investigation of quantum key distribution with position and momentum of photon pairs
,” Phys. Rev. A
72
, 022313
–1
(2005
).15.
M.
D’Angelo
, Y.-H.
Kim
, S. P.
Kulik
, and Y.
Shih
, “Identifying entanglement using quantum ghost interference and imaging
,” Phys. Rev. Lett.
92
, 233601
–1
(2004
).16.
J. C.
Howell
, R. S.
Bennink
, S. J.
Bentley
, and R. W.
Boyd
, “Realization of the Einstein-Podolsky-Rosen Paradox using momentum- and position-entangled photons from spontaneous parametric down conversion
,” Phys. Rev. Lett.
92
, 210403
–1
(2004
).17.
© 2006 American Association of Physics Teachers.
2006
American Association of Physics Teachers
AAPT members receive access to the American Journal of Physics and The Physics Teacher as a member benefit. To learn more about this member benefit and becoming an AAPT member, visit the Joining AAPT page.