2005
DOI: 10.1103/physrevlett.94.040501
|View full text |Cite
|
Sign up to set email alerts
|

Experimental Quantum Coin Tossing

Abstract: In this Letter we present the first implementation of a quantum coin-tossing protocol. This protocol belongs to a class of "two-party" cryptographic problems, where the communication partners distrust each other. As with a number of such two-party protocols, the best implementation of the quantum coin tossing requires qutrits, resulting in a higher security than using qubits. In this way, we have also performed the first complete quantum communication protocol with qutrits. In our experiment the two partners s… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
137
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 144 publications
(137 citation statements)
references
References 17 publications
0
137
0
Order By: Relevance
“…There, different multilevel degrees of freedom, such as spatial modes (13), time-energy (14), path (15,16), as well as continuous variables (17,18), have been used. Entanglement of spatial modes of photons has especially attracted much attention in recent years (19)(20)(21)(22)(23)(24)(25)(26)(27)(28), because it is readily available from optical nonlinear crystals and the number of involved modes of the entanglement can be very high (29).…”
mentioning
confidence: 99%
“…There, different multilevel degrees of freedom, such as spatial modes (13), time-energy (14), path (15,16), as well as continuous variables (17,18), have been used. Entanglement of spatial modes of photons has especially attracted much attention in recent years (19)(20)(21)(22)(23)(24)(25)(26)(27)(28), because it is readily available from optical nonlinear crystals and the number of involved modes of the entanglement can be very high (29).…”
mentioning
confidence: 99%
“…As a way to account for errors, the related primitive of bit string generation was also considered [20][21][22] . In practice, a first implementation concerned a protocol that becomes insecure for any loss 23 , while a promising solution gave results that unfortunately cannot be used in realistic conditions 24 . More recently, an implementation of the loss-tolerant protocol 25 used an entangled-photon source to eliminate the problem of multiphoton pulses.…”
mentioning
confidence: 99%
“…We report elsewhere [14] an experimental realisation of quantum bit-string generation, based on the protocol and security analysis presented here. We note that another experiment realising quantum coin tossing has recently been reported [15]. This experiment is an impressive achievement from the point of view of physics (for example, it is one of the first to realise individual control over quantum qutrits).…”
mentioning
confidence: 95%