Abstract
We describe initial results from an apparatus and protocol designed to implement quantum public key distribution, by which two users, who share no secret information initially: 1) exchange a random quantum transmission, consisting of very faint flashes of polarized light; 2) by subsequent public discussion of the sent and received versions of this transmission estimate the extent of eavesdropping that might have taken place on it, and finally 3) if this estimate is small enough, can distill from the sent and received versions a smaller body of shared random information (key), which is certifiably secret in the sense that any third party’s expected information on it is an exponentially small fraction of one bit. Because the system depends on the uncertainty principle of quantum physics, instead of usual mathematical assumptions such as the difficulty of factoring, it remains secure against an adversary with unlimited computing power.
Supported in part by an NSERC Postgraduate Scholarship.
Supported in part by NSERC under grant A4107.
This work was performed while this author was visiting IBM Research.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Bennett, C. H. and G. Brassard, “An update on quantum cryptography”, Advances in Cryptology: Proceedings of Crypto’ 84, August 1984, Springer-Verlag, pp. 475–480.
Bennett, C. H. and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing”, Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, December 1984, pp. 175–179.
Bennett, C.H. and G. Brassard, “Quantum public key distribution system”, IBM Technical Disclosure Bulletin, Vol. 28, 1985, pp. 3153–3163.
Bennett, C. H. and G. Brassard, “The dawn of a new era for quantum cryptography: The experimental prototype is working!”, SIGACT News, Vol. 20, no. 4, Fall 1989, pp. 78–82.
Bennett, C. H., G. Brassard and S. Breidbart, “Quantum cryptography II: How to re-use a one-time pad safely even if
”, unpublished manuscript available from the authors, November 1982.
Bennett, C. H., G. Brassard, S. Breidbart and S. Wiesner, “Quantum cryptography, or unforgeable subway tokens”, Advances in Cryptology: Proceedings of Crypto’ 82, August 1982, Plenum Press, pp. 267–275.
Bennett, C. H., G. Brassard and J.-M. Robert, “How to reduce your enemy’s information”, Advances in Cryptology — Crypto’ 85 Proceedings, August 1985, Springer-Verlag, pp. 468–476.
Bennett, C. H., G. Brassard and J.-M. Robert, “Privacy amplification by public discussion”, SIAM Journal on Computing, Vol. 17, no. 2, April 1988, pp. 210–229.
Brassard, G., Modern Cryptology: A Tutorial, Lecture Notes in Computer Science, Vol. 325, Springer-Verlag, Heidelberg, 1988.
Brickell, E. F. and A. M. Odlyzko, “Cryptanalysis: A survey of recent results”, Proceedings of the IEEE, Vol. 76, no. 5, May 1988, pp. 578–593.
Crépeau, C., “Correct and private reductions among oblivious transfers”, PhD Thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, February 1990.
Crépeau, C. and J. Kilian, “Achieving oblivious transfer using weakened security assumptions”, Proceedings of 29th IEEE Symposium on the Foundations of Computer Science, White Plains, New York, October 1988, pp. 42–52.
Deutsch, D., New Scientist, December 9, 1989, pp. 25–26.
Gottlieb, A., “Conjugal secrets — The untappable quantum telephone”, The Economist, Vol. 311, no. 7599, 22 April 1989, p. 81.
Wallich, P., “Quantum cryptography”, Scientific American, Vol. 260, no. 5, May 1989, pp. 28–30.
Wegman, M. N. and J. L. Carter, “New hash functions and their use in authentication and set equality”, Journal of Computer and System Sciences, Vol. 22, 1981, pp. 265–279.
Wiesner, S., “Conjugate Coding”, manuscript written circa 1970, unpublished until it appeared in SIGACT News, Vol. 15, no. 1, 1983, pp. 78–88.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1991 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bennett, C.H., Bessette, F., Brassard, G., Salvail, L., Smolin, J. (1991). Experimental Quantum Cryptography. In: Damgård, I.B. (eds) Advances in Cryptology — EUROCRYPT ’90. EUROCRYPT 1990. Lecture Notes in Computer Science, vol 473. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46877-3_23
Download citation
DOI: https://doi.org/10.1007/3-540-46877-3_23
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-53587-4
Online ISBN: 978-3-540-46877-6
eBook Packages: Springer Book Archive