We have built an imaging system that uses a photon's position or time-of-flight information to image an object, while using the photon's polarization for security. This ability allows us to obtain an image which is secure against an attack in which the object being imaged intercepts and resends the imaging photons with modified information. Popularly known as “jamming,” this type of attack is commonly directed at active imaging systems such as radar. In order to jam our imaging system, the object must disturb the delicate quantum state of the imaging photons, thus introducing statistical errors that reveal its activity.
REFERENCES
1.
M.
Kolobov
, Rev. Mod. Phys.
71
, 1539
(1999
).2.
L.
Lugiato
, A.
Gatti
, and E.
Brambilla
, J. Opt. B: Quantum Semiclassical Opt.
4
, S176
(2002
).3.
A. N.
Boto
, P.
Kok
, D. S.
Abrams
, S. L.
Braunstein
, C. P.
Williams
, and J. P.
Dowling
, Phys. Rev. Lett.
85
, 2733
(2000
).4.
V.
Giovannetti
, S.
Lloyd
, and L.
Maccone
, Science
306
, 1330
(2004
).5.
N.
Spagnolo
, C.
Vitelli
, V.
Lucivero
, V.
Giovannetti
, L.
Maccone
, and F.
Sciarrino
, Phys. Rev. Lett.
108
, 233602
(2012
).6.
Z.
Dutton
, J. H.
Shapiro
, and S.
Guha
, J. Opt. Soc. Am. B
27
, A63
(2010
).7.
N.
Treps
, N.
Grosse
, W.
Bowen
, C.
Fabre
, H. A.
Bachor
, and P.
Lam
, Science
301
, 940
(2003
).8.
9.
S. J.
Roome
, Electron. Commun. Eng. J.
2
, 147
(1990
).10.
S.
Kristoffersen
and Ø.
Thingsrud
, in Proceedings of EUSAR
(2004
), Vol. 2, p. 871
.11.
T. S.
Humble
, R. S.
Bennink
, W. P.
Grice
, and I. J.
Owens
, Proc. SPIE
7342
, 73420H
(2009
).12.
P. M.
Anisimov
, D. J.
Lum
, S.
Blane McCracken
, H.
Lee
, and J. P.
Dowling
, New J. Phys.
12
, 083012
(2010
).13.
C.
Bennett
and G.
Brassard
, in Proceedings of IEEE International Conference CSSP
(1984
), p. 175
.14.
B.
Huttner
and A. K.
Ekert
, J. Mod. Opt.
41
, 2455
(1994
).15.
M.
Bourennane
, A.
Karlsson
, G.
Bjork
, N.
Gisin
, and N.
Cerf
, J. Phys. A
35
, 10065
(2002
).16.
C.
Bennett
, F.
Bessette
, G.
Brassard
, L.
Salvail
, and J.
Smolin
, J. Cryptology
5
, 3
(1992
).17.
N.
Gisin
, G.
Ribordy
, W.
Tittel
, and H.
Zbinden
, Rev. Mod. Phys.
74
, 145
(2002
).18.
C.
Bennett
, G.
Brassard
, S.
Breidbart
, and S.
Wiesner
, in Advances in Cryptology: Proceedings of Crypto '82
(1982
), p. 267
.19.
P.
Kwiat
, K.
Mattle
, H.
Weinfurter
, A.
Zeilinger
, A.
Sergienko
, and Y.
Shih
, Phys. Rev. Lett.
75
, 4337
(1995
).20.
A. K.
Jha
, M.
Malik
, and R. W.
Boyd
, Phys. Rev. Lett.
101
, 180405
(2008
).21.
A.
McCarthy
, R. J.
Collins
, N. J.
Krichel
, V.
Fernandez
, A. M.
Wallace
, and G. S.
Buller
, Appl. Opt.
48
, 6241
(2009
).22.
G.
Howland
, P. B.
Dixon
, and J. C.
Howell
, Appl. Opt.
50
, 5917
(2011
).23.
G.
Brassard
, N.
Lütkenhaus
, T.
Mor
, and B.
Sanders
, Phys. Rev. Lett.
85
, 1330
(2000
).24.
Y.
Zhao
, B.
Qi
, X.
Ma
, H.-K.
Lo
, and L.
Qian
, Phys. Rev. Lett.
96
, 070502
(2006
).25.
D.
Bouwmeester
, J.-W.
Pan
, K.
Mattle
, M.
Eibl
, H.
Weinfurter
, and A.
Zeilinger
, Nature
390
, 575
(1997
).26.
J. B.
Pendry
, Science
312
, 1780
(2006
).27.
M.
Bigelow
, N.
Lepeshkin
, and R. W.
Boyd
, Science
301
, 200
(2003
).28.
A. R.
Dixon
, Z. L.
Yuan
, J. F.
Dynes
, A. W.
Sharpe
, and A. J.
Shields
, Appl. Phys. Lett.
96
, 161102
(2010
).29.
F.
Steinlechner
, P.
Trojek
, M.
Jofre
, H.
Weier
, D.
Perez
, T.
Jennewein
, R.
Ursin
, J.
Rarity
, M. W.
Mitchell
, J. P.
Torres
, H.
Weinfurter
, and V.
Pruneri
, Opt. Express
20
, 9640
(2012
).30.
M.
Malik
, M. N.
O'Sullivan
, B.
Rodenburg
, M.
Mirhosseini
, J.
Leach
, M. P. J.
Lavery
, M. J.
Padgett
, and R. W.
Boyd
, Opt. Express
20
, 13195
(2012
).© 2012 American Institute of Physics.
2012
American Institute of Physics
You do not currently have access to this content.