High-dimensional quantum cryptography with twisted light

High-dimensional quantum cryptography with twisted light


Quantum key distributions (QKD) systems often rely on polarization of light for encoding, thus limiting the amount of information that can be sent per photon and placing tight bounds on the error that such a system can tolerate. Here we describe a proof-of-principle experiment that indicates the feasibility of high-dimensional QKD based on the transverse structure of the light field, allowing for the transfer of more than 1 bit per photon. Our implementation uses the orbital angular momentum (OAM) of photons and the corresponding mutually unbiased basis of angular position (ANG). Our experiment uses a digital micro-mirror device for the rapid generation of OAM and ANG modes at 4 kHz, and a mode sorter capable of sorting single photons based on their OAM and ANG content with a separation efficiency of 93%. Through the use of a 7-dimensional alphabet encoded in the OAM and ANG bases, we achieve a channel capacity of 2.05 bits per sifted photon. Our experiment shows that, in addition to having an increased information capacity, QKD systems based on spatial-mode encoding will be more tolerant to errors and thus more robust against eavesdropping attacks.

03.67.Dd, 03.67.-a, 42.50.Ex

1 Introduction

First introduced in 1984 by Bennett and Brassard, quantum key distribution (QKD) is a method for distributing a secret key between two parties [1, 2]. Due to a fundamental property of quantum physics known as the no-cloning theorem, any attempt made by a third party to eavesdrop inevitably leads to errors that can be detected by the sender and receiver [3]. Modern QKD schemes conventionally use a qubit system for encoding information, such as the polarization of a photon. Such systems are easily implemented because technology for encoding and decoding information in a qubit state-space is readily available today. Recently, the spatial degree of freedom of photons has been identified as an extremely useful resource for transferring information [4, 5]. The information transfer capacity of classical communication links has been increased to more than one terabit per second using spatial-mode multiplexing [6]. In addition, it has been shown that employing multilevel quantum states (qudits) can increase the robustness of a QKD system against eavesdropping [7, 8, 9]. Considering the above benefits, it is expected that realizing a large alphabet by means of spatial-mode encoding can drastically enhance the performance of a QKD system.

The feasibility of high-dimensional QKD in the spatial domain has been previously demonstrated by encoding information in the transverse linear momentum and position bases [10, 11]. While such encoding schemes provide a simple solution for increasing the information capacity, they are not suitable for long-haul optical links due to the cross-talk caused by diffraction. Diffraction creates a varying transmission loss for different spatial frequencies that results in mixing of spatial modes [12, 13]. Cross-talk increases the quantum bit error rate (QBER) and fundamentally limits the secure key rate of a QKD system. This adverse effect can be alleviated by employing OAM modes. Due to their rotational symmetry, OAM modes have the desirable property of remaining orthogonal upon propagation in a system with round apertures [14]. In a recent experiment, OAM modes were used for performing classical communication over a 3-km-long free-space optical link [15]. In this experiment, the main contribution of turbulence was shown to be a transverse displacement of the OAM modes i.e., a tip-tilt error that can be readily corrected for with present technology. As such, OAM modes are ideal candidates for use in a free-space quantum communication link.

The OAM of photons has enabled many applications in the field of quantum information including studies of quantum entanglement [16, 17, 18, 19], photonic superdense coding [20], realization of high-dimensional wavefunctions [21], and quantum cloning [22]. Similarly, a number of studies have investigated the benefits of employing OAM modes in quantum cryptography [23, 24, 25]. Recently, rotation-invariant OAM vector modes have been used for performing QKD in a two-dimensional state space [26]. Although this method offers an advantage in terms of optical alignment, it fails to utilize the large information capacity of the OAM basis. The complete realization of a high-dimensional QKD system with OAM has remained impractical up until now mostly due to the difficulty in efficiently sorting single photons in the OAM basis. Additionally, any realistic application requires a fast key-generation rate that cannot be achieved with most of the common methods for generating OAM modes.

2 High-dimensional QKD with orbital angular momentum

In this paper we describe a proof-of-principle experiment that demonstrates the feasibility of performing high-dimensional quantum cryptography with OAM modes. We encode information in a 7-dimensional set of OAM modes along with modes in the mutually unbiased basis of azimuthal angle (ANG). Our scheme uses a digital micro-mirror device (DMD) for fast generation, and an efficient technique for unambiguous sorting of both OAM and ANG modes. By combining these techniques, we selectively generate the set of 14 spatial modes at a rate of 4 kHz and correspondingly detect them with a separation efficiency of 93. We measure a channel capacity of 2.05 bits per sifted photon with an average symbol error rate of 10.5 that is well below the error bounds that are required for security against intercept-resend eavesdropping attacks. Of our error rate, 4% is due to detector dark counts and ambient light, and 6.5% is due to errors due to intermodal crosstalk.

Figure 1: a) The experimental setup. Alice prepares the modes by carving out pulses from a highly attenuated He-Ne laser using an AOM. The spatial mode information is impressed on these pulses with a DMD. Bob’s mode sorter and fan-out elements map the OAM modes and the ANG modes into separated spots that are collected by an array of fibers. b) The alphabet. CCD images of produced light field profiles in two complementary spatial bases of OAM and ANG (d = 7). The intensity profile of the modes are shown on the right. An example of binary holograms used for the generation of modes in each basis is shown on the left.

In our scheme, Alice randomly chooses her photons from two complementary bases. The primary encoding basis is a set of OAM vortex modes. These modes have a top-hat intensity structure and a helical phase profile characterized by , where (See Fig. 1). We construct a mutually unbiased basis set using a linear combination of OAM modes of index with equal amplitudes


where the dimension in our experiment. We refer to these modes as the angular (ANG) modes due to their localized intensity patterns (See Fig. 1). The ANG modes form a mutually unbiased basis with respect to the OAM basis [27, 28, 29]


Consequently, the measurement of a photon in the ANG basis provides no information about its OAM state and vice versa. Additionally, the ANG and the OAM bases remain mutually unbiased upon propagation (See Appendix A).

Our experimental setup is depicted in Fig. 1. A collimated beam from a helium-neon laser illuminates a binary hologram realized on a DMD to generate spatial modes [30]. We use a prepare-and-measure scheme similar to the BB84 protocol [1]. Alice initially picks a random sequence of desired OAM and ANG modes and loads the binary holograms for generating each of the modes in the sequence to the DMD’s internal memory. To transmit each symbol, Alice then triggers the DMD and modulates the beam using an acousto-optic modulator to create rectangular pulses of ns width. The beam power is attenuated such that each pulse contains on average photons. The prepared states are then imaged to Bob’s receiving aperture via a 4f telescope that forms a lossless 2-m-long communication link.

Bob’s mode sorter consists of two refractive elements for performing a log-polar to cartesian transformation [31]. Going through these elements, an OAM mode is converted to a plane wave with a tilt that is proportional to the OAM mode index . A single lens focuses such a plane wave into a spot that is shifted by an amount proportional to . Similarly, an ANG mode transforms to a localized spot shifted by an amount proportional to the angular index after the transformation. A beam splitter is used to randomly choose between the OAM and ANG bases. In order to reduce the overlap between the neighboring transformed modes, we use a coherent beam combination technique [32]. A fan-out element is realized on a phase-only spatial light modulator (SLM) to divide the incident light into multiple copies. The copies are phase corrected using a second SLM and are recombined by a lens to a series of much narrower spots with the same initial spacing between them. In addition, two cylindrical lenses are realized on the SLMs to adjust the aspect ratio of the transformed modes.

Figure 2: Key generation a) An example of a random sifted key from the experiment. The spatial modes are mapped to number between 0 to 6 (errors are marked in red and underlined). Each symbol is converted into a 3 digit binary number first and the binary key is randomized before the error-correction. Privacy amplification minimizes Eve’s information by shortening the key length. b) Alice encrypts the secret message (a picture [33]) using the shared secure key and Bob decrypts it. In this case a short key is repeated many times to match the bit length of the image. In practice, multiple use of a single key cannot provide security and a long key needs to be used.

The sorted modes are coupled to an array of fibers that are connected to avalanche photodiodes (APDs). Due to the limited number of available APDs (four), Bob’s data for each group of the the symbols is taken separately and is combined later. The signal from the APDs is processed by a field-programmable gate array (FPGA) to produce photon counts using a gating signal shared with Alice. The photon detection events are finally saved in Bob’s computer. Alice and Bob are also connected via a classical link realized by an ethernet cable running a TCP/IP protocol. After Alice and Bob collect a sufficiently large number of symbols, they stop the measurement. At this point, they publicly broadcast the bases used for preparation and measurement of each photon via the classical link. Alice and Bob then discard the measurements that were done in different bases. The key generated at this stage is referred to as the sifted key.

Figure 2 shows a portion of the sifted key generated in the experiment. At this stage, the two copies of the key owned by Alice and Bob are almost identical but they contain some discrepancies. The discrepancies are due to the imperfections in our system, namely imperfect mode-sorting, detector dark counts, and ambient light. However, any errors in the key must be attributed to an eavesdropper and corrected for using the procedure of error correction. The keys are transformed to a binary form on a symbol-by-symbol basis and randomized by means of a random-number generator shared by Alice and Bob. The cascade protocol is run by Alice and Bob to fix the discrepancies by comparing the two keys in a block-by-block fashion and performing parity checks [34]. After error-correction, Alice and Bob share two identical copies of the key. However, a portion of the key can still be known to Eve from eavesdropping on the quantum channel or from accessing the publicly available information transmitted in the classical channel during the error correction. Alice and Bob perform privacy amplification to minimize Eve’s information. This is done by using a universal hash function for mapping the error-corrected key to a shorter random key of desired length [35]. The amount by which the key is shortened at this stage is chosen by estimating the amount of information owned by Eve. Finally, the secure key is used to securely transmit information (a picture in this case) over the classical channel (See Fig. 2).

Figure 3: Conditional probability of detection. a) Theoretical predictions for an ideal system. The bases chosen by Alice and Bob are marked on the horizontal axis. b)The experimental results. To construct the matrix a total number of 14 million pulses with photon per each are sent by Alice. The signals from APDs and the gate are collected using a 300 MHz oscilloscope on the fast acquisition mode and processed on a computer. c) 3D view of the experimental data.

3 Security Analysis

Transmission and Detection Efficiency

The power transmission efficiency of the mode sorter’s refractive elements is measured to be . Two Holoeye PLUTO phase-only SLMs are used for realizing the holograms for the fan-out element and its corresponding phase-correcting element. In addition, two cylindrical lenses are realized on the SLMs to adjust the aspect ratio of the transformed beams. The diffraction efficiency of each SLM is measured to be approximately .

The fiber array consists of 7 multi-mode fibers with 62.5 /125 core/cladding diameters and NA = 0.275. We have measured the efficiency of coupling the transformed modes to the fiber array to be approximately . The detection is performed with Perkin-Elmer SPCM-AQRH-14 APDs. The quantum efficiency of the APDs is . The transmission efficiency of the optical link can be calculated as


Each detectors has a typical dark-count rate of and an after-pulsing probability of

Classical Information Capacity

Figure 3 shows the conditional probability of Bob detecting each mode as a function of the mode sent by Alice. Theoretical values for the case of a system with no errors is shown on the left for comparison. In order to measure the error rate more precisely, each row of the matrix is constructed by sending the same symbol many times and detecting all possible outcomes. This scheme eliminates the time consuming procedure of switching among different spatial modes and permits a much more accurate measurement of the error-rate using a large set of sent and received symbols.

The mutual information between the sent and received symbols is defined as


Here, is the event of sending symbol and is the event of detecting symbol . Assuming a uniform probability for sending modes and a uniform probability of an error occurring in the detection, the Eq. 4 can be simplified to [7]


Here, is the probability of correctly detecting each mode. The error rate caused by imperfect sorting is denoted by and the error rate due to the dark counts is shown by . For the case of our experiment, and . The total error rate is directly measured from data as . We have identified the error from the imperfect sorting, , by repeating the experiment in the high-light level and analyzing the results after background subtraction. The error probability can be divided to from stray light, from thermally-induced dark counts, and from after-pulsing.

Using these numbers, we calculate as 2.05 bits per photon. For comparison, the ideal value of for modes is equal to bits per photon. Further, the sorting mechanism by itself would result in a value of bits per photon in the absence of any background or dark counts. The probability of correctly detecting each mode in the absence of dark counts, also known as the separation efficiency of the mode sorter, is calculated to be slightly more than .

Note that the calculation of mutual information only requires the knowledge of the cross-talk and dark count values. The loss in the optical system reduces the key generation rate of the protocol. However, a uniform loss in the transmission and detection does not change the mutual information between Alice and Bob’s sifted keys since the time frames with no photon-detection event are removed in the basis reconciliation procedure.

Secure key rate

We consider a cloning-based individual attack. In this situation, the mutual information between the symbols owned by Alice and Eve can be written as [7]


Here, is the fidelity of Eve’s cloning machine. The value of Eve’s fidelity can be optimized to gain maximum information for any given error rate detected by Bob. This quantity is shown to be [7]


For our experiment, , resulting in bits. For a sufficiently long ensemble of symbols owned by Alice, Bob, and Eve the secure key is found to be [36, 2]


where is the sifted key rate. This rate can be written as a function of the pulse repetition rate


For our experiment we have . The DMD used in our system (Texas Instrument DLP3000) is capable of switching between the computer holograms stored in its memory at the speed of 4kHz. We refer to this mode of operation as burst mode. Burst mode can be used to transmit a short key at kHz. The internal memory can only store up to 100 patterns, which limits the applicability of the burst mode for a long key. To generate a long random key, we instead load each hologram onto the DMD using a computer. This task along with the time needed for synchronizing the two computers reduces the raw key generation rate to approximately Hz. Using kHz for the burst mode, we calculate (photons/sec) and (bits/sec).

Figure 4: Error-bound for security. Bob’s error bound calculated from theory as a function of the dimension of the Hilbert space for intercept-resend attacks with two MUBs (M=2) and coherent attacks is plotted along with QBER measured from our experimental data (the error bar shows one standard deviation). It is seen that the QBER from our experiment lies well below the theoretical bounds and hence it is sufficient for proof of security.

To assess quantitatively the security of our system, we plot the values for the error bound of an intercept-resend eavesdropping attack, a coherent attack, as well as the error rate from our experimental data in Fig. 4. In an intercept-resend attack, the eavesdropper (Eve) measures the state of the intercepted photon in an arbitrarily selected basis and then resends a photon prepared to be in this same state. In a coherent attack, Eve coherently probes a finite number of qudits in order to gain information about the key [7]. It is evident from this graph that our experimental error rate is well below the required bounds for security against both intercept-resend and coherent attacks (Fig 4). Unlike intercept-resend attacks, the error rate for coherent attacks only depends on system dimension and is independent of the number of MUBs [7]. Hence, increasing the number of MUBs beyond 2 results in a drop in the key rate without any gain in security against coherent attacks. Nevertheless, there is a clear increase in the allowed error rate for larger system dimensions, demonstrating an advantage for using a high-dimensional encoding scheme for QKD such as that of OAM.

Using the error rate, we estimate the information gained by Eve to be 0.35 bits per sifted photon for cloning-based individual attacks. It has been argued that cloning-based eavesdropping is the optimal strategy for an individual attack on systems based on qudits [7]. The portion of the key obtained by Eve is removed in the privacy amplification process, leading to a mutual information of 1.7 secure bits per sifted photon in the final key. It should be emphasized that our secure key rate analysis assumes an infinite key, while our experimental realization produces only a finite key [37]. We are working toward a finite key analysis of the security, which will be reported in the future.

In contrast to phase-only spatial light modulators (SLMs) that are limited to a frame rate of 60 Hz, the DMD used in our setup has the ability to rapidly switch between modes at a speed of 4 kHz. This is especially important considering the fact that the speed of generation of spatial modes limits the key generation rate of the system. We measure our raw key generation rate to be 16.4 bits per second (for operation in burst mode). After performing basis reconciliation and privacy amplification for a sufficiently long key, we estimate the secure key rate to be 6.5 bits per second, which is more than 3 orders of magnitude larger than that achieved in previous spatial-mode based protocols [11].

Photon number splitting attacks

The analysis above considers intercept-resend and cloning based attacks. The photon-number-splitting (PNS) attack is yet another possibility when the protocol uses imperfect single-photon sources. In our protocol, weak coherent pulses (WCPs) are used for realizing approximate single photon pulses. For small values of photon-number expectation values, a WCP contains either zero or one photon most of the times. However, the pulse may still contain multiple photons with a non-zero probability. In this situation, Eve can split one photon off a multi-photon signal, without disturbing the polarization or the spatial structure of the signal [38, 39, 40]. Eve can measure her photon after basis reconciliation and obtain complete information without causing any error in the signal.

The PNS attacks pose a more serious threat in the presence of loss. In this situation, Eve can, in principle, replace the lossy channel with a perfect quantum channel and only transmit to Bob the signals of her choice. An inequality has been developed in [41] that serves as a necessary condition for security


Here, is the total probability of detection events for Bob, and is the probability of having a pulse with multi-photons. For a coherent state with an average photon number o f , we have , and consequently


The total probability of detection events can be calculated by considering the signal detection events and the detector dark counts


Using the parameters for our experiments we have and . It can be see that and hence security against PNS attacks cannot be guaranteed in our current implementation. We discuss the possible approaches for providing security against PNS attacks in the following section.

4 Steps towards practical QKD with OAM modes

The secure key rate of a QKD system is considered as the ultimate metric for quantifying its performance. In the above sections we described how a high-dimensional encoding scheme such as that of OAM can potentially benefit the secure key rate of QKD protocols. While our experiment provides significant improvements in realizing OAM-based QKD, several challenges need to be addressed before such a protocol can be employed for practical applications. In addition to a high secure key rate, a free-space QKD link needs to provide reliable long distance operation, efficient classical post-processing, ease of alignment, and a rigorous security analysis considering the finite size of practical keys. While some of these requirements can be achieved by increasing the degree of sophistication of the system or through the use of state-of-the-art technology, there is still need for theoretical and experimental research before a full demonstration can be performed. Below, we address some of the current experimental limitations.

Fast key generation:

The secure key rate scales proportionally with the raw key generation rate. A fast rate can be achieved by using an array of static holograms for generating multiple modes and then multiplexing the modes using a series of beam splitters. A cheaper and much simpler alternative to this approach is to modulate the intensity and the phase of a laser beam in real time. Although holography techniques can achieve kHz mode switching rates using DMDs [30], practical QKD would require key rates in the GHz regime. OAM modes can be generated and switched at MHz rates using on-chip resonators [42] and potentially at GHz rates using Q-plates [43]. However, to generate the states in the ANG basis one would need to modulate both the amplitude and phase of the beam, a task that best suits free-space holography. Recently, a method involving static holograms realized on an SLM and an AOM for switching between them achieved a MHz mode-switching rate [44]. Unfortunately, the change in the wavelength caused by the AOM forbids applying this method for QKS since side-channel attacks could be performed based on spectrum. More research is required for developing high-speed methods for arbitrary generation of free-space spatial modes.

High throughput:

The key generation rate drops as loss increases. Moreover, high loss in the communication link makes the protocol vulnerable to PNS attacks. The throughput of our detection system can be readily increased by employing high efficiency spatial light modulators, or AR-coated custom refractive elements. This would translate to a six-fold increase in the transmission efficiency in our experiment. Additionally, the amount of loss due to the scattering in the air can be minimized by operating in the near-infrared regime.

Turbulence mitigation:

Atmospheric Turbulence results in degradation of the spatial profile of the modes upon propagation. This results in mixing of the neighboring OAM and ANG modes. The effects of turbulence on OAM modes has been a topic of extensive studies [29, 45, 46]. Common solutions for mitigating the adverse effects of atmospheric turbulence include the use of every other mode for encoding [47] and utilization of adaptive optics systems [48]. Recently, long-haul free-space propagation of OAM modes has been realized using novel detection schemes [15].

Larger dimensionality:

Increasing the number of the modes increases the information carried by each single photon and results in a higher secure bit rate. Previously, we have shown that our mode sorter is capable of sorting 25 OAM and ANG modes with an average mutual information of 4.17 bits per detected photons [32]. Consequently, the encoded information per photon can be readily increased by increasing the number of APDs in the experiment. Ultimately, the number of modes supported by the optical link is limited by the sizes of the transmitting and receiving apertures.

Universal security proof:

A comprehensive security proof for a QKD system should include both the fundamental and practical properties of the physical system. The security analysis presented in this work assumes an infinitely long key. For a finite key, the efficiency of classical post-processing need to be measured and used for a more rigorous calculation of the secure key rate [49]. In addition, our analysis assumes a uniform error-rate and transmission efficiency for all the modes. While our data demonstrates the rationale for this approximation, a more comprehensive analysis needs to include the effects of non-uniform error rate and loss in a multi-level QKD system. More research is needed to establish the theoretical framework for security analysis of such systems.

Finally, we have demonstrated security against intercept-resend and cloning-based attacks, while our implementation remains vulnerable to photon-number-splitting attacks. This limitation can be avoided by either reducing the loss in the system or by employing the decoy-state protocol [50]

5 Conclusions

In conclusion, we have demonstrated that practical QKD based on spatial-mode encoding is realizable with current technology. We perform a proof-of-principle experiment that uses a 7-dimensional alphabet encoded in OAM and in the mutual unbiased basis of ANG modes. We implement a fast mode-generation technique that uses a DMD to generate spatial modes at a speed of 4 kHz and a mode-transformation technique that is able to measure the OAM and ANG content of a photon with an accuracy of 93%. Using these two methods, we achieve a mutual information of 2.05 bits per sifted photon, which is more than twice the maximum allowable capacity of a two-dimensional QKD system. The QBER of our scheme is measured to be 10.5, which is sufficient for proving unconditional security against coherent and individual eavesdropping attacks for an infinite key. In addition, we lay out a clear path for how our system can be enhanced to perform practical, high-dimensional QKD using current technology. For example, our QBER can be significantly reduced through the use of better detectors and a more sophisticated mode-transformation technique. Our experiment opens the door to realizing real-world, multi-level quantum communication systems with record capacities and levels of security.

Appendix A Diffraction and radial modes

It is known that OAM modes with larger mode index have a larger rms (root mean squared) radius in the far field [51]. Given the different radial profiles of different OAM modes, one might be concerned that the security of the protocol is compromised. More specifically, we are interested to know whether Eve can gain information by using the photons that fall outside Bob’s aperture? The details of the diffraction behavior depends on the radial profile of the OAM modes as defined in the transmitter’s aperture. We consider OAM modes with a top-hat intensity profile such as the ones used in our experiment. Since diffraction plays no role once the Fresnel number is sufficiently large, this issue does not directly apply to our experiment. However, the answer to the question for a low-Fresnel-number system is not trivial. Below, we show that it is impossible for Eve to gain any information by performing this attack regardless of the Fresnel number of the system.

Intercept and intercept attack

In an intercept and intercept attack (also known as denial of service) Eve detects a photon without retransmitting it. Since Alice and Bob disregards the frames with no photons in basis reconciliation, Eve will not have any mutual information with the sifted key and hence there is no loss of security.

Intercept and resend attack

Figure 5: Bob’s and Eve’s receiving apertures

In this type of attack Eve detects a photon that falls outside of Bob’s apertures in a random basis. She then resends a photon in a state determined by the result of her measurement into the Bob’s aperture. The geometry for Bob’s and Eve’s apertures are shown in Fig. 5. Note that the and are all bound between zero and infinity and so we are considering the most general case.

We demonstrate an OAM mode’s optical field at any plane by . The probability for detecting each of the OAM modes by Eve can be written as


Assuming Alice chooses to send OAM modes randomly with a probability of (where is the total number of modes used), the probability for detecting any OAM mode will be


Similarly, the probability for detecting each of the ANG modes can be written as


and the probability for detecting any ANG mode will be


We can simplify Eq. 16 using the definition of the ANG modes


Substituting we get


The above result shows that it is equally probable for Eve to detect a photon from either the OAM basis or the ANG basis using the beam from any range of radii. Consequently, it is impossible for Eve to gain information by detecting a photon from outside of Bob’s aperture. Moreover, the result remains valid at any plane from near field to far field.


  1. Bennett C H and Brassard G 1984 Proc. IEEE Int. Conf. pp. 175–179 (Bangalore)
  2. Gisin N, Ribordy G, Tittel W and Zbinden H 2002 Rev. Mod. Phys. 74 145–195
  3. Wootters W K and Zurek W H 1982 Nature 299 802–803
  4. Molina-Terriza G, Torres J P and Torner L 2007 Nat Phys. 3 305–310
  5. Gibson G, Courtial J, Padgett M J, Vasnetsov M, Pas’ko V, Barnett S M and Franke-Arnold S 2004 Opt. Express 12 5448–5456
  6. Wang J, Yang J Y, Fazal I M, Ahmed N, Yan Y, Huang H, Ren Y, Yue Y, Dolinar S, Tur M and Willner A E 2012 Nature Photon. 6 488–496
  7. Cerf N, Bourennane M, Karlsson A and Gisin N 2002 Phys. Rev. Lett. 88 127902
  8. Ali-Khan I, Broadbent C and Howell J 2007 Phys. Rev. Lett. 98 060503
  9. Zhang Z, Mower J, Englund D, Wong F N C and Shapiro J H 2014 Phys. Rev. Lett. 112 120506
  10. Walborn S, Lemelle D, Almeida M and Ribeiro P 2006 Phys. Rev. Lett. 96 090501
  11. Etcheverry S, Cañas G, Gómez E S, Nogueira W A T, Saavedra C, Xavier G B and Lima G 2013 Sci. Rep. 3:2316
  12. Shapiro J H 1974 Appl. Opt. 13 2614
  13. Miller D A B 2000 Appl. Opt. 39 1681–1699
  14. Slepian D 1965 JOSA 55 1110–1114
  15. Krenn M, Fickler R, Fink M, Handsteiner J, Malik M, Scheidl T, Ursin R and Zeilinger A 2014 arXiv:1402.2602
  16. Mair A, Vaziri A, Weihs G and Zeilinger A 2001 Nature 412 313–316
  17. Leach J, Jack B, Romero J, Jha A K, Yao A M, Franke-Arnold S, Ireland D G, Boyd R W, Barnett S M and Padgett M J 2010 Science 329 662–665
  18. McLaren M, Mhlanga T, Padgett M J, Roux F S and Forbes A 2014 Nat. Commun. 5 3248
  19. Leach J, Bolduc E, Gauthier D J and Boyd R W 2012 Phys. Rev. A 85 060304
  20. Barreiro J T, Wei T C and Kwiat P G 2008 Nat Phys. 4 282–286
  21. Malik M, Mirhosseini M, Lavery M P J, Leach J, Padgett M J and Boyd R W 2014 Nat. Commun. 5 3115
  22. Nagali E, Sansoni L, Sciarrino F, De Martini F, Marrucci L, Piccirillo B, Karimi E and Santamato E 2009 Nature Photon. 3 720–723
  23. Mafu M, Dudley A, Goyal S, Giovannini D, McLaren M, Padgett M J, Konrad T, Petruccione F, Lütkenhaus N and Forbes A 2013 Phys. Rev. A 88 032305
  24. Groblacher S, Jennewein T, Vaziri A, Weihs G and Zeilinger A 2006 New J. Phys. 8 75–75
  25. Vaziri A, Weihs G and Zeilinger A 2002 Phys. Rev. Lett. 89 240401
  26. Vallone G, D’Ambrosio V, Sponselli A, Slussarenko S, Marrucci L, Sciarrino F and Villoresi P 2014 arXiv:1402.2932v1 pp. 1–11
  27. Giovannini D, Romero J, Leach J, Dudley A, Forbes A and Padgett M 2013 Phys. Rev. Lett. 110 143601
  28. D’Ambrosio V, Cardano F, Karimi E, Nagali E, Santamato E, Marrucci L and Sciarrino F 2013 Sci. Rep. 3:2726
  29. Malik M, Rodenburg B, Mirhosseini M, Leach J, Lavery M P J, Padgett M J and Boyd R W 2012 Opt. Express 20 13195–13200
  30. Mirhosseini M, Magaña-Loaiza O S, Chen C, Rodenburg B, Malik M and Boyd R W 2013 Opt. Express 21 30196–30203
  31. Lavery M P J, Robertson D J, Berkhout G C G, Love G D, Padgett M J and Courtial J 2012 Opt. Express 20 2110
  32. Mirhosseini M, Malik M, Shi Z and Boyd R W 2013 Nat. Commun. 4 2781
  33. Old Persian cuneiform writing from the Xerxes tablet (Persia, circa 470 BC). Photo courtesy of Wendy Harns via flickr.
  34. Brassard G and Salvail L 1994 EUROCRYPT’93 pp. 410–423
  35. Bennett C H, Brassard G, Crépeau C and Maurer U M 1995 IEEE Trans. Inform. Theory 41 1915–1923
  36. Csiszar I and Korner J 1978 IEEE Trans. Inform. Theory 24 339–348
  37. Scarani V and Renner R 2008 Phys. Rev. Lett. 100 200501
  38. Yuen H P 1996 Quantum Semiclass. Opt. 8 939
  39. Huttner B, Imoto N, Gisin N and Mor T 1995 Phys. Rev. A 51 1863–1869
  40. Lütkenhaus N 2000 Phys. Rev. A 61 052304
  41. Brassard G, Lütkenhaus N, Mor T and Sanders B 2000 Phys. Rev. Lett. 85 1330–1333
  42. Strain M J, Cai X, Wang J, Zhu J, Phillips D B, Chen L, Lopez-Garcia M, O’Brien J L, Thompson M G, Sorel M and Yu S 2014 Nat. Commun. 5 4856
  43. Karimi E, Piccirillo B, Nagali E, Marrucci L and Santamato E 2009 Applied Physics Letters 94 231124
  44. Radwell N, Brickus D, Clark T W and Franke-Arnold S 2014 Opt. Express 22 12845–12852
  45. Tyler G A and Boyd R W 2009 Opt. Lett. 34 142–144
  46. Paterson C 2005 Phys. Rev. Lett. 94 153901
  47. Rodenburg B, Lavery M P J, Malik M, Mirhosseini M, Robertson D J, Padgett M and Boyd R W 2012 Opt. Lett. 37 3735–3737
  48. Rodenburg B, Mirhosseini M, Malik M, Magaña-Loaiza O S, Yanakas M, Maher L, Steinhoff N K, Tyler G A and Boyd R W 2014 New J. Phys. 16 033020
  49. Scarani V, Bechmann-Pasquinucci H, Cerf N J, Dusek M, Lütkenhaus N and others 2009 Rev. Mod. Phys. 81 1301–1350
  50. Hwang W Y 2003 Phys. Rev. Lett. 91 057901
  51. Phillips R L and Andrews L C 1983 Appl. Opt. 22 643
Comments 0
Request Comment
You are adding the first comment!
How to quickly get a good reply:
  • Give credit where it’s due by listing out the positive aspects of a paper before getting into which changes should be made.
  • Be specific in your critique, and provide supporting evidence with appropriate references to substantiate general statements.
  • Your comment should inspire ideas to flow and help the author improves the paper.

The better we are at sharing our knowledge with each other, the faster we move forward.
The feedback must be of minimum 40 characters and the title a minimum of 5 characters
Add comment
Loading ...
This is a comment super asjknd jkasnjk adsnkj
The feedback must be of minumum 40 characters
The feedback must be of minumum 40 characters

You are asking your first question!
How to quickly get a good answer:
  • Keep your question short and to the point
  • Check for grammar or spelling errors.
  • Phrase it like a question
Test description