<<  >> (p.7)
    Author Topic: I don't believe Quantum Computing will ever threaten Bitcoin  (Read 5506 times)
    Voland.V
    Full Member
    ***
    Offline Offline

    Activity: 224
    Merit: 120


    View Profile WWW
    March 26, 2020, 10:31:25 AM
     #121

    Who can explain how spin bound photons are controlled in quantum cryptography?
    2 bonded photons.
    One photon is transmitted through an optical communication channel and received at the second end of the communication channel.
    That's understandable.
    And how is the associated photon controlled and held?
    Or is it not needed?
    How can this moment of technology be explained in a simple and clear way?   

    I'll have a go. I assume you're talking about Quantum Key Distribution, - please correct me if not!

    The process is that an interferometer generates the entangled photon pair, then the photons are sent one to each party. So 'Alice' receives one photon and 'Bob' receives the other. As for the mechanism of transfer, it can be optical cable or (as in China's QUESS) a satellite signal (as attenuation through vacuum and thin atmosphere is negligible) - anything really so long as the mechanism can keep signal loss to a minimum - or quantum repeaters can be used to maintain the signal.

    The result then is that Alice and Bob each have the secure information received from the photon. Once the photon has been received, its data has been received too, and there is then no need to actually hold the photon itself. The point is that due to the fact that each photon is part of an entangled pair, they each contain the same information, which can then be used as a shared key.

    That's the process, anyway. For information about security, probably first have a look at the BB84 protocol, and then go on from there to later developments such as Kak's 3 Stage Protocol (quantum double-lock)... but I think we covered security a few months ago in this thread.
    ---------------------------
    Thank you very much.
    You answered exactly the question that I asked. You explained the principle clearly, that's the main thing. Protocol is secondary, there can be a lot of them, and the principle of linked photons is always the basis of quantum key distribution.
    I must have been inattentive earlier.
    I have one more question.
    You write:
    "The process is that an interferometer generates the entangled photon pair, then the photons are sent one to each party."
    This interferometer, the place from which the entangled photons are sent to Alice and Bob, has no information about these photons?
    Is it impossible to leak information about the backs of the photons, and therefore the keys, in this place?
Page 6
Viewing Page: 7