Abstract
Quantum cryptography generates unbreakable cryptographic codes by encoding information using single photons, which until now have relied on highly attenuated lasers as sources1,2. But these sources can create pulses that contain more than one photon, making them vulnerable to eavesdropping by photon splitting3,4. Here we present an experimental demonstration of quantum cryptography that uses a photon turnstile device, which is more reliable for delivering photons one at a time. This device allows completely secure communication in circumstances under which this would be impossible with an attenuated laser.
Similar content being viewed by others
Main
Our quantum-cryptography system (see supplementary information for full technical details) implements a protocol known as BB84 (ref. 5). The photon turnstile is a single quantum dot in a micropost cavity6,7, which is optically excited by a pulsed laser. The security improvements attainable with this device can be quantified by two measurements: the probability that the device will inject a photon into the quantum channel, measured as 0.007 by comparing the count rate at detector 0 (see supplementary information) to the repetition rate of the excitation laser (76 MHz); and the second-order correlation, denoted by g(2) (see supplementary information).
This quantity gives the amount of suppression of multiphoton states from our device relative to attenuated laser light — a laser with perfect intensity stability is characterized by g(2) = 1, whereas our turnstile device has g(2) = 0.14. The probability that our device will emit a multiphoton state is therefore an order of magnitude smaller than a laser that emits photons at the same rate, meaning that security is improved in the presence of channel losses8.
In our implementation of BB84, the sender of the message, Alice, encodes information by preparing the polarization of each photon in either the horizontal or right circular polarization for binary 0, and vertical or left circular for binary 1. This is done by an electro-optic modulator. The modulator is driven by a data generator that produces the secret key, giving a random four-level signal that corresponds to the four different polarization states in the BB84 protocol. The state of the data generator is recorded by a time-interval analyser and is stored by a computer.
After the polarization is prepared, the photon is sent into the quantum channel, a 1-metre free-space propagation, and is detected by the receiving party, Bob. Bob measures the photons by using passive polarization optics and avalanche photodiodes with dark counts of about 80 s−1 (see supplementary information). The detection probability, due to losses in the optics and photodiodes, is 0.24. Detection events are recorded by a second time-interval analyser and are stored by a second computer for subsequent comparison with Alice.
The error rate of the system is measured as 2.5%. These errors are corrected by using an error-correction algorithm9. After error correction, privacy amplification is carried out to create the final key, yielding a communication rate of 25 kbits s−1.
To demonstrate the advantage of our source over standard laser light, we use both the turnstile device and an attenuated laser to carry out quantum cryptography. A variable attenuator is inserted into the quantum channel to simulate channel losses. Figure 1 shows the theoretical and experimentally measured communication rates for our turnstile device and for laser light, as a function of channel loss. When losses are low, the communication rate of the attenuated laser is greater because our turnstile device is limited by its efficiency and by losses in the collection optics. At greater channel losses, however, the laser emits too many multiphoton states, causing a more rapid reduction in communication rate. At around 16 decibels, the turnstile begins to outperform the laser. Above 23 dB of loss, secure communication is no longer possible with the laser — however, our source is able to withstand channel losses of about 28 dB. This demonstrates the security advantage of our photon turnstile in the presence of channel losses.
In the final phase of communication, the secret key is used as a one-time pad to exchange the message (here a picture of Stanford University's Memorial Church; Fig. 2). The cryptography system is used to exchange a 20-kilobyte key. Alice uses her copy of the key to do a bitwise exclusive OR logic operation with each bit of the message. The resulting encrypted message looks like white noise to anyone without a copy of the key, but Bob decodes it by carrying out a second bitwise exclusive OR operation using his copy of the key.
A similar experiment using diamond colour centres has recently been reported10.
References
Buttler, W. T. et al. Phys. Rev. Lett. 24, 5652–5655 (2000).
Marand, C. & Townsend, P. D. Optics Lett. 20, 1695–1697 (1995).
Brassard, G., Lütkenhaus, N., Mor, T. & Sanders, B. C. Phys. Rev. Lett. 85, 1330–1333 (2000).
Lütkenhaus, N. Phys. Rev. A 61, 052304 (2000).
Bennett, C. H. & Brassard, G. Proc. IEEE Int. Conf. Comp. Syst. Sig. Process., Bangalore, India 175–179 (IEEE, New York, 1984).
Santori, C., Pelton, M., Solomon, G., Dale, Y. & Yamamoto, Y. Phys. Rev. Lett. 86, 1502–1505 (2001).
Santori, C., Fattal, D., Vuckovic, J., Solomon, G. S. & Yamamoto, Y. Nature 419, 594–597 (2002).
Waks, E., Santori, C. & Yamamoto, Y. Phys. Rev. A 66, 042315 (2002).
Brassard, G. & Salvail, L. Advances in Cryptology: Eurocrypt '93, Lecture Notes in Computer Science Vol. 765 (ed. Hellseth, T.) 410–423 (Springer, Berlin, 1994).
Beveratos, A. et al. Phys. Rev. Lett. 89, 187904 (2002).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing financial interests.
Supplementary information
Rights and permissions
About this article
Cite this article
Waks, E., Inoue, K., Santori, C. et al. Quantum cryptography with a photon turnstile. Nature 420, 762 (2002). https://doi.org/10.1038/420762a
Issue Date:
DOI: https://doi.org/10.1038/420762a
This article is cited by
-
Room temperature operation of germanium–silicon single-photon avalanche diode
Nature (2024)
-
Applications of single photons to quantum communication and computing
Nature Reviews Physics (2023)
-
Atomically-thin single-photon sources for quantum communication
npj 2D Materials and Applications (2023)
-
Single-emitter quantum key distribution over 175 km of fibre with optimised finite key rates
Nature Communications (2023)
-
Enhancing quantum cryptography with quantum dot single-photon sources
npj Quantum Information (2022)
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.