{"id":29993,"date":"2015-03-23T10:43:42","date_gmt":"2015-03-23T14:43:42","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/new-approach-uses-twisted-light-to-increase-the-efficiency-of-quantum-cryptography-systems.php"},"modified":"2015-03-23T10:43:42","modified_gmt":"2015-03-23T14:43:42","slug":"new-approach-uses-twisted-light-to-increase-the-efficiency-of-quantum-cryptography-systems","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/new-approach-uses-twisted-light-to-increase-the-efficiency-of-quantum-cryptography-systems.php","title":{"rendered":"New Approach Uses \u2018Twisted Light&#8217; To Increase The Efficiency Of Quantum Cryptography Systems"},"content":{"rendered":"<p><p>    Researchers demonstrate how to encode 2.05 bits per photon,    doubling existing systems that use light polarization  <\/p>\n<p>    Researchers at the University of Rochester and their    collaborators have developed a way to transfer 2.05 bits per    photon by using twisted light. This remarkable achievement is    possible because the researchers used the orbital angular    momentum of the photons to encode information, rather than the    more commonly used polarization of light. The new approach    doubles the 1 bit per photon that is possible with current    systems that rely on light polarization and could help increase    the efficiency of quantum cryptography systems.  <\/p>\n<p>    Quantum cryptography promises more secure communications. The    first step in such systems is quantum key distribution (QKD),    to ensure that both the sender and receiver  usually referred    to as Alice and Bob  are communicating in such a way that only    they know what is being sent. They are the only ones who hold    the key to the messages, and the systems are set up in such a    way that the presence of any eavesdropper would be identified.  <\/p>\n<p>    In the paper, published in New Journal of Physics today,    Mohammad Mirhosseini and his colleagues describe a    proof-of-principle experiment that shows that using OAM to    encode information rather than polarization opens up the    possibility of high-dimensional QKD. Mirhosseini, a Ph.D.    student in Robert W. Boyds group at the University of    Rochesters Institute of Optics, explains that they were able    to encode a seven dimensional alphabet  that is, seven    letters or symbols  using both the orbital angular momentum    (OAM) of the photons and their angular position (ANG). These    two properties of the photons form what physicists refer to as    mutually unbiased bases, a requirement for QKD. Using mutually    unbiased bases, the correct answer is revealed only if Alice    encodes the information using a particular basis and Bob    measures in that same basis.  <\/p>\n<p>    In QKD, once they have generated a long, shared key, Alice and    Bob publicly announce the basis (or alphabet) they have used    for each symbol in the key. They then compare what alphabet was    used for sending and which one for receiving. They only keep    the part of the key in which they have used the same    alphabet. The letters they keep produce a secure key, which    they can use to encrypt messages and transmit these with    regular encryption without the need for quantum cryptography.  <\/p>\n<p>    If for any reason their communication is intercepted, because    of a fundamental property of quantum mechanics, there will be    discrepancies between Alice and Bobs keys. To check for this,    Alice and Bob sacrifice a short part of their key. They share    this publicly and identify any discrepancies. This lets them    know whether their connection is secure and, if not, they will    stop the communication.  <\/p>\n<p>    The researchers showed that using their system they were able    to generate and detect information at a rate of 4kHz and with    93% accuracy. A long term goal of the research is to realize    secure communications at GHz transmission rates, which is    desirable for telecommunication applications.  <\/p>\n<p>    Our experiment shows that it is possible to use twisted    light for QKD and that it doubles the capacity compared to    using polarization, said Mirhosseini. Unlike with    polarization, where it is impossible to encode more than one    bit per photon, twisted light could make it possible to    encode several bits, and every extra bit of information encoded    in a photon means fewer photons to generate and measure.  <\/p>\n<p>    In a previous experiment using a strong laser beam instead of    single photons, Boyds team were able to measure up to 25 modes    of OAM and ANG. This is equivalent to having 25 letters    available in your alphabet rather than 7. This shows the    potential for a system like the one described in the new paper    to have the capacity to transmit and measure 4.17 bits per    photon using more sophisticated equipment.  <\/p>\n<p>    Mirhosseini acknowledges that the real-world challenges are not    straightforward to overcome but when it comes to QKD, he is    excited about the possibilities their system opens up.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.photonicsonline.com\/doc\/new-approach-uses-twisted-light-to-increase-efficiency-of-quantum-cryptography-systems-0001?atc~c=771+s=773+r=001+l=a\/RK=0\/RS=I90aCZoXLIY9fWFnjAugliPBh4E-\" title=\"New Approach Uses \u2018Twisted Light' To Increase The Efficiency Of Quantum Cryptography Systems\">New Approach Uses \u2018Twisted Light' To Increase The Efficiency Of Quantum Cryptography Systems<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Researchers demonstrate how to encode 2.05 bits per photon, doubling existing systems that use light polarization Researchers at the University of Rochester and their collaborators have developed a way to transfer 2.05 bits per photon by using twisted light. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-29993","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29993"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=29993"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29993\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=29993"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=29993"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=29993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}