Satoshi Hada
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
We describe results from an apparatus and protocol designed to implement quantum key distribution, by which two users, who share no secret information initially: (1) exchange a random quantum transmission, consisting of very faint flashes of polarized light; (2) by subsequent public discussion of the sent and received versions of this transmission estimate the extent of eavesdropping that might have taken place on it, and finally (3) if this estimate is small enough, distill from the sent and received versions a smaller body of shared random information, which is certifiably secret in the sense that any third party's expected information on it is an exponentially small fraction of one bit. Because the system depends on the uncertainty principle of quantum physics, instead of the usual mathematical assumptions such as the difficulty of factoring, it remains secure against an adversary with unlimited computing power. © 1992 International Association for Cryptologic Research.
Satoshi Hada
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Kenneth L. Clarkson, K. Georg Hampel, et al.
VTC Spring 2007
Charles H. Bennett
International Journal of Theoretical Physics
W.F. Cody, H.M. Gladney, et al.
SPIE Medical Imaging 1994