E91 protocol: Artur Ekert (1991)(quantum key exchange )---quantum key distribution (QKD)
Artur Ekert< https://en.wikipedia.org/wiki/Artur_Ekert >(Air Force's pilot career see
if!? )'s scheme uses entangled pairs of photons. These can be created by Alice, by Bob,
or by some source separate from both of them, including eavesdropper Eve. The photons
are distributed so that Alice and Bob each end up with one photon from each pair.
The scheme relies on two properties of entanglement. First, the entangled states are perfectly correlated in the sense that if Alice and Bob both measure whether their particles have vertical or horizontal polarizations, they always get the same answer with 100% probability. The same is true if they both measure any other pair of complementary (orthogonal ) polarizations. This necessitates that the two distant parties have exact directionality synchronization. However, the particular results are completely random; it is impossible for Alice to predict if she (and thus Bob ) will get vertical polarization or horizontal polarization. Second, any attempt at eavesdropping by Eve destroys these correlations in a way that Alice and Bob can detect.
Similarly to BB84[< https://shinichiwanko2000.livedoor.blog/archives/29370900.html >2025年09月22日 description---BB84, < https://shinichiwanko2000.livedoor.blog/archives/29376541.html >2025年09月23日 comparison with BB84, origin---SARG04{this is what happens when your friends are bad友人が悪いとこんなことに?・?・! ?? } ], the protocol involves a private measurement protocol before detecting the presence of Eve. The measurement stage involves Alice measuring each photon she receives using some basis from the set Z _0 , Z _{π /8} , Z _{π /4} while Bob chooses from Z _0 , Z \{π /8} , Z _{− π /8} where Z _θ is the { | ↑ 〉, | → 〉} basis rotated by θ . They keep their series of basis choices private until measurements are completed. Two groups of photons are made: the first consists of photons measured using the same basis by Alice and Bob while the second contains all other photons. To detect eavesdropping, they can compute the test statistic S using the correlation coefficients between Alice's bases and Bob's similar to that shown in the Bell test experiments. Maximally entangled photons would result in | S | =[≒? ] 2 √2 . If this were not the case, then Alice and Bob can conclude Eve has introduced local realism to the system, violating Bell's theorem< https://en.wikipedia.org/wiki/Bell%27s_theorem >{←, < https://shinichiwanko2000.livedoor.blog/archives/29406274.html > 2025年09月28日 Buscemi nonlocality非局在(Bell testsベル不等式テストまたはベル実験としても 知られるベル テストは、アルバート アインシュタインの局所実在論の概念に関連して量子力学 の理論をテストするように設計された現実世界の物理実験です. ジョン・スチュワート・ベルに ちなんで名付けられたこの実験は、現実世界が局所実在論を満たすかどうかをテストします,, ) }. If the protocol is successful, the first group can be used to generate keys since those photons are completely anti- aligned between Alice and Bob.
< https://en.wikipedia.org/wiki/Quantum_key_distribution#E91_protocol:_Artur_Ekert_.28199 1.29 >
{authenticationデータ確認(証明、認証、立証、公証?? ) important as well! ?,, }
The scheme relies on two properties of entanglement. First, the entangled states are perfectly correlated in the sense that if Alice and Bob both measure whether their particles have vertical or horizontal polarizations, they always get the same answer with 100% probability. The same is true if they both measure any other pair of complementary (orthogonal ) polarizations. This necessitates that the two distant parties have exact directionality synchronization. However, the particular results are completely random; it is impossible for Alice to predict if she (and thus Bob ) will get vertical polarization or horizontal polarization. Second, any attempt at eavesdropping by Eve destroys these correlations in a way that Alice and Bob can detect.
Similarly to BB84[< https://shinichiwanko2000.livedoor.blog/archives/29370900.html >2025年09月22日 description---BB84, < https://shinichiwanko2000.livedoor.blog/archives/29376541.html >2025年09月23日 comparison with BB84, origin---SARG04{this is what happens when your friends are bad友人が悪いとこんなことに?・?・! ?? } ], the protocol involves a private measurement protocol before detecting the presence of Eve. The measurement stage involves Alice measuring each photon she receives using some basis from the set Z _0 , Z _{π /8} , Z _{π /4} while Bob chooses from Z _0 , Z \{π /8} , Z _{− π /8} where Z _θ is the { | ↑ 〉, | → 〉} basis rotated by θ . They keep their series of basis choices private until measurements are completed. Two groups of photons are made: the first consists of photons measured using the same basis by Alice and Bob while the second contains all other photons. To detect eavesdropping, they can compute the test statistic S using the correlation coefficients between Alice's bases and Bob's similar to that shown in the Bell test experiments. Maximally entangled photons would result in | S | =[≒? ] 2 √2 . If this were not the case, then Alice and Bob can conclude Eve has introduced local realism to the system, violating Bell's theorem< https://en.wikipedia.org/wiki/Bell%27s_theorem >{←, < https://shinichiwanko2000.livedoor.blog/archives/29406274.html > 2025年09月28日 Buscemi nonlocality非局在(Bell testsベル不等式テストまたはベル実験としても 知られるベル テストは、アルバート アインシュタインの局所実在論の概念に関連して量子力学 の理論をテストするように設計された現実世界の物理実験です. ジョン・スチュワート・ベルに ちなんで名付けられたこの実験は、現実世界が局所実在論を満たすかどうかをテストします,, ) }. If the protocol is successful, the first group can be used to generate keys since those photons are completely anti- aligned between Alice and Bob.
< https://en.wikipedia.org/wiki/Quantum_key_distribution#E91_protocol:_Artur_Ekert_.28199 1.29 >
{authenticationデータ確認(証明、認証、立証、公証?? ) important as well! ?,, }
コメント
コメントを投稿