We have built an imaging system that uses a photon's position or time-of-flight information to image an object, while using the photon's polarization for security. This ability allows us to obtain an image which is secure against an attack in which the object being imaged intercepts and resends the imaging photons with modified information. Popularly known as “jamming,” this type of attack is commonly directed at active imaging systems such as radar. In order to jam our imaging system, the object must disturb the delicate quantum state of the imaging photons, thus introducing statistical errors that reveal its activity.

1.
M.
Kolobov
,
Rev. Mod. Phys.
71
,
1539
(
1999
).
2.
L.
Lugiato
,
A.
Gatti
, and
E.
Brambilla
,
J. Opt. B: Quantum Semiclassical Opt.
4
,
S176
(
2002
).
3.
A. N.
Boto
,
P.
Kok
,
D. S.
Abrams
,
S. L.
Braunstein
,
C. P.
Williams
, and
J. P.
Dowling
,
Phys. Rev. Lett.
85
,
2733
(
2000
).
4.
V.
Giovannetti
,
S.
Lloyd
, and
L.
Maccone
,
Science
306
,
1330
(
2004
).
5.
N.
Spagnolo
,
C.
Vitelli
,
V.
Lucivero
,
V.
Giovannetti
,
L.
Maccone
, and
F.
Sciarrino
,
Phys. Rev. Lett.
108
,
233602
(
2012
).
6.
Z.
Dutton
,
J. H.
Shapiro
, and
S.
Guha
,
J. Opt. Soc. Am. B
27
,
A63
(
2010
).
7.
N.
Treps
,
N.
Grosse
,
W.
Bowen
,
C.
Fabre
,
H. A.
Bachor
, and
P.
Lam
,
Science
301
,
940
(
2003
).
8.
D. C.
Schleher
,
Electronic Warfare in the Information Age
(
Artech House
,
1999
).
9.
S. J.
Roome
,
Electron. Commun. Eng. J.
2
,
147
(
1990
).
10.
S.
Kristoffersen
and
Ø.
Thingsrud
, in
Proceedings of EUSAR
(
2004
), Vol. 2, p.
871
.
11.
T. S.
Humble
,
R. S.
Bennink
,
W. P.
Grice
, and
I. J.
Owens
,
Proc. SPIE
7342
,
73420H
(
2009
).
12.
P. M.
Anisimov
,
D. J.
Lum
,
S.
Blane McCracken
,
H.
Lee
, and
J. P.
Dowling
,
New J. Phys.
12
,
083012
(
2010
).
13.
C.
Bennett
and
G.
Brassard
, in
Proceedings of IEEE International Conference CSSP
(
1984
), p.
175
.
14.
B.
Huttner
and
A. K.
Ekert
,
J. Mod. Opt.
41
,
2455
(
1994
).
15.
M.
Bourennane
,
A.
Karlsson
,
G.
Bjork
,
N.
Gisin
, and
N.
Cerf
,
J. Phys. A
35
,
10065
(
2002
).
16.
C.
Bennett
,
F.
Bessette
,
G.
Brassard
,
L.
Salvail
, and
J.
Smolin
,
J. Cryptology
5
,
3
(
1992
).
17.
N.
Gisin
,
G.
Ribordy
,
W.
Tittel
, and
H.
Zbinden
,
Rev. Mod. Phys.
74
,
145
(
2002
).
18.
C.
Bennett
,
G.
Brassard
,
S.
Breidbart
, and
S.
Wiesner
, in Advances in
Cryptology: Proceedings of Crypto '82
(
1982
), p.
267
.
19.
P.
Kwiat
,
K.
Mattle
,
H.
Weinfurter
,
A.
Zeilinger
,
A.
Sergienko
, and
Y.
Shih
,
Phys. Rev. Lett.
75
,
4337
(
1995
).
20.
A. K.
Jha
,
M.
Malik
, and
R. W.
Boyd
,
Phys. Rev. Lett.
101
,
180405
(
2008
).
21.
A.
McCarthy
,
R. J.
Collins
,
N. J.
Krichel
,
V.
Fernandez
,
A. M.
Wallace
, and
G. S.
Buller
,
Appl. Opt.
48
,
6241
(
2009
).
22.
G.
Howland
,
P. B.
Dixon
, and
J. C.
Howell
,
Appl. Opt.
50
,
5917
(
2011
).
23.
G.
Brassard
,
N.
Lütkenhaus
,
T.
Mor
, and
B.
Sanders
,
Phys. Rev. Lett.
85
,
1330
(
2000
).
24.
Y.
Zhao
,
B.
Qi
,
X.
Ma
,
H.-K.
Lo
, and
L.
Qian
,
Phys. Rev. Lett.
96
,
070502
(
2006
).
25.
D.
Bouwmeester
,
J.-W.
Pan
,
K.
Mattle
,
M.
Eibl
,
H.
Weinfurter
, and
A.
Zeilinger
,
Nature
390
,
575
(
1997
).
26.
J. B.
Pendry
,
Science
312
,
1780
(
2006
).
27.
M.
Bigelow
,
N.
Lepeshkin
, and
R. W.
Boyd
,
Science
301
,
200
(
2003
).
28.
A. R.
Dixon
,
Z. L.
Yuan
,
J. F.
Dynes
,
A. W.
Sharpe
, and
A. J.
Shields
,
Appl. Phys. Lett.
96
,
161102
(
2010
).
29.
F.
Steinlechner
,
P.
Trojek
,
M.
Jofre
,
H.
Weier
,
D.
Perez
,
T.
Jennewein
,
R.
Ursin
,
J.
Rarity
,
M. W.
Mitchell
,
J. P.
Torres
,
H.
Weinfurter
, and
V.
Pruneri
,
Opt. Express
20
,
9640
(
2012
).
30.
M.
Malik
,
M. N.
O'Sullivan
,
B.
Rodenburg
,
M.
Mirhosseini
,
J.
Leach
,
M. P. J.
Lavery
,
M. J.
Padgett
, and
R. W.
Boyd
,
Opt. Express
20
,
13195
(
2012
).
You do not currently have access to this content.