quant-ph0501175/LZO.tex
1: \documentclass[pra,aps,twocolumn,showpacs]{revtex4}
2: \usepackage{graphicx}
3: \usepackage{color}
4: 
5: \begin{document}
6: %\bibliographystyle{apsrev}
7: 
8: \title{Security improvement of using modified coherent state for quantum cryptography}
9: 
10: \author{Y. J. Lu}
11: \altaffiliation{currently with Photonics Industries International, Bohemia, NY} 
12: 
13: \author{Luobei Zhu}
14: \altaffiliation{Also with Carmel High School, Carmel, IN}
15: 
16: \author{Z. Y. Ou}\email{zou@iupui.edu}
17: 
18: \affiliation{Department of Physics, Indiana University-Purdue University Indianapolis \\ 402 N Blackford Street, Indianapolis, In 46202}
19: 
20: \date{\today}
21: 
22: \begin{abstract}
23: Weak coherent states as a photon source for quantum cryptography have limit in secure data rate and transmission distance because of the presence of multi-photon events and loss in transmission line. Two-photon events in a coherent state can be taken out by a two-photon interference scheme. We investigate the security issue of utilizing this modified coherent state in quantum cryptography. A 4 dB improvement in secure data rate or a nearly two-fold increase in transmission distance over the coherent state are found. With a recently proposed and improved encoding strategy, further improvement is possible.
24: \end{abstract}
25: \pacs{PACS Number:  03.67.Dd, 42.50.Dv, 42.50.Ar}
26: 
27: \maketitle
28: 
29: %%% ----------------------------------------------------------------------
30: 
31: \section{Introduction}
32: The ultimate security of quantum cryptography stems from the non-cloning theorem\cite{woo} of quantum mechanics, which is applied to a single quantum system. In other words, quantum
33: information can only be shared between two parties, the one (Alice) who creates it and the one (Bob) who receives it. Therefore, in the implementation in optical communication, the ideal source is a single photon source with information carried by individual photons. So far a weak coherent state from a laser is closest to a single photon source for quantum cryptography. The experimental realization\cite{BB92} of the first proposed quantum cryptography protocol, known as BB84 protocal\cite{bb84}, involved a heavily attenuated thermal source (which is worse than a laser in the aspect of multi-photon events). However, the existence of multiple photon events for a weak coherent state, even though very rare, poses serious problem for the security of the protocol. An eavesdropper (Eve) can in principle use the so-called photon number splitting attack to tap the information without being noticed.  Recent analysis by L\"utkenhaus\cite{lut} on the security of
34: quantum cryptography by a weak coherent state puts limit on the data rate and transmission distance for secure key distribution. 
35: 
36: Significant progress has been made in producing single photon states\cite{demartini,kitson,brunel,fleury,kurtsiefer,brouri,kim,michler,yama}. But so far these sources are fluorescence-based and have small efficiency. Furthermore, because the emission depends on energy  structure, it has a fixed wavelength and a finite time response for high repetition rate. So they are limited for practical applications. Recently a new scheme was proposed\cite{singh} and realized\cite{lu-ou} for producing a photon source with same single photon rate as a coherent state but less two-photon events. The scheme relies on a two-photon quantum interference phenomenon to reduce and eventually cancel the two-photon events from a coherent state. Although it cannot take out all the multi-photon events, it does take out the most dominating multi-photon events --
37: two-photon events. This modified coherent state (MCS) has the advantages of high data rate, well defined direction and wave-length independence for practical application in quantum cryptography. 
38: 
39: A new quantum cryptography protocol(SARG04) was recently proposed\cite{gisin} against the photon number splitting attack for weak coherent state. Such a scheme relies on a smarter encoding scheme that is based on nonorthogonal states and requires at least two or more photons for Eve to recover the data. Thus Eve needs at least three photons to use the photon number splitting attack. If we use this protocol on the modified coherent state, we will make a three-photon interference effect to cancel the three-photon term so that Eve can only rely on the 4-photon or higher order terms to apply the photon number splitting attack. So the modified coherent state still has advantage over a weak coherent state in this new protocol.
40: 
41: Because of the existence of the multi-photon terms, the modified coherent
42: state has similar security problems as the coherent state. But the influence of
43: those higher order terms will be smaller.  The security problem of the coherent state was
44: investigated by L{\" u}tkenhaus \cite{lut} and Brassard et al\cite{bras}.   In the following, we will apply the same line of argument of Ref.\cite{lut} to look for the optimum secure  data rate and transmission distance for a given transmission loss and dark counts of the detectors for the modified coherent state in both BB84 protocol in Ref.\cite{bb84} and the new SARG04 protocol in Ref.\cite{gisin}. To do that, we need to find the probability $P_m$ for multi-photon event and the probability $P_s$ to detect any photon in such a state. We will start in the following with the description of the modified coherent state.
45: 
46: 
47: \section{Generation of the modified coherent state (MCS)}
48: The modified coherent state is just a coherent state without the two-photon or three-photon terms.
49: It can be generated by mixing a coherent state with a two-photon state from parametric
50: down-conversion. There are two types of mixing. The first one is to inject the coherent state into
51: an optical parametric amplifier with a small gain. This is the scheme first proposed by Stoler to
52: produce light source with sub-Poisonian statistics. The second one mixes the two fields with a
53: beamsplitter. In practice the first method is more direct and simpler to implement. In the
54: following calculation, the results are more or less same. We will consider only the first method.
55: 
56: For simplicity of argument, we will only treat single mode case here. In reality, this corresponds
57: to, for example, a single temporal mode of pulses of light. We will concentrate on the
58: probabilities of detecting photons in each pulse. The data rate discussed below
59: will be the probability per pulse. In CW case, we will consider the average photon number ($ = |\alpha|^2$ for coherent state, see
60: below) rather than the intensity as our parameter. So the detection time  does not appear as a
61: separate parameter but is included in the average photon number. However, we do require the
62: detection time be much smaller than the coherence time of the field to ensure the single mode
63: approximation.
64: 
65: In an optical parametric amplifier, the interaction Hamiltonian is given by 
66: \begin{eqnarray}
67: \hat H = j \hbar \xi^*  \hat a^2/2 + h.c.,
68: \end{eqnarray}
69: where $\xi$ is proportional to the amplitude of the pump field and the nonlinear
70: conversion coefficient of the nonlinear medium. 
71: 
72: With the injection of a coherent state, the initial state is simply a coherent state
73: $|\alpha\rangle$ and the output state becomes
74: \begin{eqnarray}
75: |\Psi\rangle_{out} = \hat {\cal U} |\alpha\rangle
76: \end{eqnarray}
77: with
78: \begin{eqnarray}
79: \hat {\cal U} =  \exp {1\over 2} (\zeta^*  \hat a^2  - \zeta  \hat a^{\dagger 2}).
80: \end{eqnarray}
81: $\zeta$ is proportional to $\xi$.
82: As a matter of fact, the above state is simply the two-photon coherent state or the squeezed
83: coherent state first discussed by Yuen\cite{yuen}. In order to find the probability of photon
84: number, we expand the above state in the photon number state base and obtain from Ref.\cite{yuen,MW}
85: \begin{eqnarray}
86: |\Psi\rangle_{out} = \hat {\cal U}|\alpha\rangle = \sum_{n=0}^{\infty} C_n|n\rangle,
87: \end{eqnarray}
88: with
89: \begin{eqnarray}
90: C_n = {1\over \sqrt{n! \mu}} \Big ({\nu\over 2\mu}\Big)^{n\over 2}\exp\Big({\nu^*\over 2\mu}\alpha^2
91: - {|\alpha|^2\over 2}\Big) H_n\Big({\alpha \over \sqrt{2\mu\nu}}\Big),
92: \end{eqnarray}
93: where $H_n$ is the $n$th-order Hermite polynomial and 
94: \begin{eqnarray}
95: \mu \equiv \cosh(|\zeta|), ~\nu \equiv {\zeta\over|\zeta|} \sinh(|\zeta|),~~
96: {\rm or}~ \mu^2= 1+|\nu|^2.\nonumber
97: \end{eqnarray}
98: More specifically to our interest, we list
99: \begin{eqnarray}
100: C_0 &=&   {1\over \sqrt{\mu}} \exp({\nu^*\over 2\mu}\alpha^2 - {1\over 2}|\alpha|^2),\cr
101: C_1 &=&  C_0 {\alpha\over
102: \mu},\cr
103: C_2 &=& {C_0 \over \sqrt{2}}  \Big[
104: -{\nu\over \mu}+\Big({\alpha\over\mu}\Big)^2\Big],\cr
105: C_3 &=& {C_0 \over \sqrt{6}} \Big[
106: -{3\nu\alpha\over \mu^2}+ \Big({\alpha\over\mu}\Big)^3\Big],\cr
107: C_4 &=& {C_0 \over \sqrt{24}}\Big[
108: 3\Big({\nu\over\mu} \Big)^2- 6{\nu\alpha^2\over \mu^3}+
109: \Big({\alpha\over\mu}\Big)^4\Big],\nonumber
110: \end{eqnarray}
111: 
112: 
113: From the above, we easily find the probability for multi-photon event as
114: \begin{eqnarray}
115: P_m = 1 - |C_0|^2 - |C_1|^2.
116: \end{eqnarray}
117: This quantity is minimized when 
118: \begin{eqnarray}
119: \alpha^2 = \mu\nu
120: \end{eqnarray}
121: with a minimum value of
122: \begin{eqnarray}
123: P_m = 1 - {1\over\mu}\Big(1+{|\nu|\over\mu}\Big) e^{-(\mu-|\nu|)|\nu|}.
124: \end{eqnarray}
125: Notice that the two-photon probability $P_2 = |C_2|^2$ is  zero under this condition. This
126: results from a two-photon interference effect between the coherent state and the spontaneous
127: parametric down-conversion, i.e., interference between the two-photon amplitude $\mu\nu/\sqrt{2}$ of
128: parametric down-conversion and the two-photon amplitude $\alpha^2/\sqrt{2}$ of a coherent state. 
129: 
130: For SARG04 protocol, we need to minimize the probability for events of three or more photons. This
131: probability is given by
132: \begin{eqnarray}
133: P_m^{\prime} = 1 - |C_0|^2 - |C_1|^2- |C_2|^2,
134: \end{eqnarray}
135: which is minimized when
136: \begin{eqnarray}
137: \alpha^2 = 3\mu\nu
138: \end{eqnarray}
139: with a minimum value of 
140: \begin{eqnarray}
141: P_m^{\prime} = 1 - {1\over\mu}\Big(1+{|\nu|\over\mu}\Big)
142: \Big(1+{2|\nu|\over\mu}\Big) e^{-3(\mu-|\nu|)|\nu|}.
143: \end{eqnarray}
144: Similar to the two-photon case, when condition in Eq.(10) is satisfied, three-photon probability
145: $P_3 = |C_3|^2$ is zero as a result of three-photon interference. It is not easy to understand how
146: a three-photon effect can arise from parametric down-conversion with only even number of photons.
147: What happens is that a two-photon event from parametric down conversion combines with a single
148: photon event in coherent state to form a three-photon event with an amplitude of
149: $\sqrt{3/2}\mu\nu\alpha$. This amplitude interferes with another three-photon event directly from
150: the coherent state with an amplitude of $\alpha^3/\sqrt{6}$. Complete cancellation occurs when the
151: two amplitudes are equal leading to Eq.(10).
152: 
153: To evaluate the photon detection probability $P_s$, we notice that in practice, photodetection
154: usually has non-unit efficiency. This will reduce the signal level. We need to calculate the photon
155: detection probability under this non-ideal condition. The non-unit efficiency is modelled as a
156: beamsplitter of transmissivity
157: $\eta$. We may start with the photon number probability for single mode case as
158: \cite{MW}
159: \begin{eqnarray}
160: P_n = \Big\langle : {(\hat a'^{\dagger}\hat a')^n\over n!}\exp (-\hat a'^{\dagger}\hat a')
161: :\Big\rangle,\nonumber
162: \end{eqnarray}
163: where $: :$ denotes normal ordering and $\hat a' = \sqrt{\eta} \hat a + \sqrt{1-\eta}\hat a_0$ with
164: $\hat a_0$ in the vacuum. More specifically for the case of no photon:
165: \begin{eqnarray}
166: P_0 = \langle : \exp (-\hat a'^{\dagger}\hat a'):\rangle.\nonumber
167: \end{eqnarray}
168: Then a simple calculation leads to
169: \begin{eqnarray}
170: P_0 = \langle : \exp (-\eta \hat a^{\dagger}\hat a) :\rangle,
171: \end{eqnarray}
172: where the average is over the state in Eq.(2). Then the photon detection probability is simply
173: \begin{eqnarray}
174: P_s = 1 - P_0.
175: \end{eqnarray}
176: From the appendix, we have
177: \begin{eqnarray}
178: P_0 = {\exp\Big [ -{\eta x^2(\mu-|\nu|)\over
179: \mu+|\nu|(1-\eta)} - {\eta y^2(\mu+|\nu|)\over
180: \mu-|\nu|(1-\eta)}\Big ]\over\sqrt{\mu^2-|\nu|^2(1-\eta)^2}}
181: \end{eqnarray}
182: with $ x +i y  \equiv  \alpha  e^{-i\varphi/2}$ ($e^{i\varphi} \equiv \nu/|\nu|$).
183: 
184: With the condition in Eq.(7) for minimum multi-photon events, we have the signal probability
185: \begin{eqnarray}
186: P_s = 1-{\exp\Big [ -\eta \mu|\nu|(\mu-|\nu|)/
187: (\mu+|\nu|(1-\eta)) \Big ]\over\sqrt{\mu^2-|\nu|^2(1-\eta)^2}},
188: \end{eqnarray}
189: or
190: \begin{eqnarray}
191: P_s^{\prime} = 1-{\exp\Big [ -3\eta \mu|\nu|(\mu-|\nu|)/
192: (\mu+|\nu|(1-\eta)) \Big ]\over\sqrt{\mu^2-|\nu|^2(1-\eta)^2}}
193: \end{eqnarray}
194: for condition in Eq.(10).
195: 
196: \section{Optimum Secure Transmission Rate}
197: Next we evaluate the secure transmission rate based on the formulism from Ref.\cite{lut}. The
198: communication rate per slot (pulse) for a certain error rate $e$ is given by
199: \begin{equation}\label{}
200:     R = \frac{P_s}{2}\bigg [\rho (1 - \tau(e)) + f(e)h(e)\bigg ].
201: \end{equation}
202: In the above equation, the parameter $\rho$ is given by
203: \begin{equation}\label{}
204:     \rho = \frac{P_s - P_m}{P_s},
205: \end{equation}
206: which is the probability of detection events originating from the desirable photon events.
207: The compression function $\tau(e)$ is given by
208: \begin{equation}\label{}
209:     \tau(e) = \log_2 \bigg [1 + 4\frac{e}{\rho} - 4(\frac{e}{\rho})^2 \bigg ].
210: \end{equation}
211: The function $h(e)$ is the Shannon entropy function given by
212: \begin{equation}\label{}
213:     h(e) = -e \log_2 e - (1 - e) \log_2 (1 - e).
214: \end{equation}
215: The function $f(e)$ characterizes the performance of the error correction algorithm.
216: 
217: \begin{figure}
218: \centering \includegraphics[width=2.5in]{lzo-fig1.eps}
219: \caption{Communication rate as a function of (a) $|\alpha|^2$ for BB84 with coherent
220: state, (b) $\nu$ for BB84 with modified coherent state, and (c) $\nu$ for SARG04 with modified
221: coherent state. The overall efficiency is $\eta$ = - 9.45 dB, which  corresponds to a transmission
222: distance of 5 km in KTH15.}
223: \end{figure}
224: 
225: In order to simulate the communication rate, we need the values of $P_s$, $P_m$, $e$, and
226: $f(e)$. For BB84 protocol with the modified coherent state, $P_m$ and $P_s$ are given in Eqs.(7) and
227: (15), respectively. However, due to the existence of dark count of any photodetectors, Bob's
228: detection events can be contributed from a signal that originates from Alice's transmission, and a
229: dark count that originates from Bob's photodetectors. Therefore, after taking into account the
230: dark counts of the detectors, the signal probability $P_s$ has to be modified as
231: \begin{equation}\label{}
232:      P_s \rightarrow \bar P_s = P_s + P_d - P_s P_d,
233: \end{equation}
234: where $P_d$ is the dark count distribution and is simply equal to the dark counts per slot.
235: Similarly, the error rate is also resulted from the signal and the dark count, and can be
236: modelled by
237: \begin{equation}\label{}
238:     e = \frac{cP_s + P_d/2}{\bar P_s},
239: \end{equation}
240: where $c$ is a constant and characterizes a baseline signal error rate. Typical system
241: should have a value of $c$ less than $2\%$. The total detection efficiency $\eta$ can be separated
242: into the channel transmission and the quantum efficiency of Bob's photodetectors. For fiber
243: communications, the transmission in the quantum channel is given by
244: \begin{equation}\label{}
245:     \eta_c = 10^{-(al + L)/10},
246: \end{equation}
247: where $a$ is the loss coefficient of the fiber channel measured in dB/km, $l$ is the length
248: of the fiber, and $L$ is the loss in the receiver Bob's detection.
249: 
250: We evaluate the communication rate as a function of the free parameters  $\nu (\mu
251: =\sqrt{1+\nu^2})$ for MCS in BB84 and SARG04 or $|\alpha|^2$ for coherent state, using
252: parameters taken from the case KTH15 in Ref.\cite{lut}. The dark counts per slot is $P_d = 2 \times
253: 10^{-4}$. The baseline signal error rate is set to be $c = 0.01$. The loss coefficient $a$ of the
254: fiber channel is 0.2 dB/km, and the receiver loss is 1 dB. The quantum efficiency of the
255: photodetectors is $\eta_d = 0.18$. The total detection efficiency is then $\eta = \eta_c
256: \eta_d$.  For MCS in BB84, $P_m$ and $P_s$ are given in Eqs.(8) and (15)  while for SARG04 protocol
257: with MCS, $P_m$ and $P_s$ are from Eqs.(11) and (16), respectively. Fig.1 shows the
258: communication rates as a function of $|\alpha|^2$ at $l$ = 5 km for the BB84 protocol with coherent
259: state or as a function of $\nu$ for the modified coherent state in BB84 protocol and the SARG04
260: protocol. As can be seen,  there is a clear maximum on the
261: communication rate curve as a function of the adjustable parameter $\nu$ or $|\alpha|^2$. 
262: 
263: Next we concentrate on the optimal rate as we vary
264: the transmission distance $l$, then obtain the resulting curves as shown in Fig.2.    The overall
265: efficiency $\eta$ is plotted in the top axis of Fig.2 for reference.  The curve (a) is a simple repeat of Ref.\cite{lut}
266: for a weak coherent state in BB84. Curves (b) for MCS in BB84 and (c) for MCS in SARG04 have
267: significant improvement over (a). At zero transmission distance, we find a 4 dB increase in secure
268: data rate from modified coherent state over the coherent state in the BB84. A further 6 dB increase
269: in secure data rate is resulted from MCS with SARG04 protocol. Note that each curve features a
270: cutoff transmission distance. Modified coherent state has nearly two-fold increase in transmission
271: distance over the coherent state in BB84. A further nearly two-fold increase in
272: transmission distance is found with SARG04.
273: 
274: \begin{figure}[tpb]
275: \centering \includegraphics[width=2.5in]{lzo-fig2.eps}
276: \caption{Optimum rate as a function of transmission distance for: (a) BB84 with coherent state; (b)
277: BB84 with modified coherent state; (c) SARG04 with modified coherent state. }
278: \end{figure}
279:   
280: 
281: \acknowledgments
282: 
283: This paper is based upon work supported by the National Science Foundation under Grant No.
284: 0245421. We wish to acknowledge the support of NSF and the Purdue Research Foundation.
285: 
286: \appendix
287: 
288: \section{Calculation of Eq.(14)}
289: The average in Eq.(12) is over the state in Eq.(4). 
290: To do this we first convert Eq.(12) in the normal ordering form into one without normal ordering
291: from Ref.\cite{loui}:
292: \begin{eqnarray}
293: P_0 = \langle : \exp (-\eta \hat a^{\dagger}\hat a) :\rangle
294: = \langle  \exp [-\ln(1-\eta) \hat a^{\dagger}\hat a) ]\rangle.
295: \end{eqnarray}
296: Next we convert Eq.(A1) into anti-normal ordering form from Ref.\cite{loui} again:
297: \begin{eqnarray}
298: P_0 
299: &=& e^{-\ln(1-\eta)} \langle  {\cal A}\{\exp [(1-e^{-ln(1-\eta)}) \beta^*\beta
300: ]\}\rangle\nonumber\\
301: &=&{1\over 1-\eta} \langle  \alpha|\hat {\cal U^{\dagger}}{\cal A} \{\exp [-{\eta\over 1-\eta}
302: \beta^*\beta]\} \hat {\cal U}|\alpha \rangle.
303: \end{eqnarray}
304: Then we insert the closure relation:
305: \begin{eqnarray} 
306: {1\over\pi} \int d^2 \beta |\beta \rangle \langle  \beta | = 1
307: \end{eqnarray}
308: between $\hat b^n$ and $\hat b^{\dagger m}$ in ${\cal A}(\beta^{*m}\beta^{n})  = \hat b^n \hat
309: b^{\dagger m}$ in Eq.(A2) and we have
310: \begin{eqnarray}
311: P_0 =
312: {1\over\pi} \int d^2 \beta {1\over 1-\eta} \exp
313: (-{\eta\over 1-\eta} |\beta|^2)~ |\langle \beta |\hat {\cal U}|\alpha \rangle|^2.
314: \end{eqnarray}
315: From Ref.\cite{yuen,MW} we find
316: \begin{eqnarray}
317: &\langle& \beta |\hat {\cal U}|\alpha \rangle \cr
318: &=& {1\over\sqrt{\mu}}\exp \Big[-{|\alpha|^2+
319: |\beta|^2\over 2}+{\nu^*\alpha^2 -\nu\beta^{*2} +2\beta^*\alpha \over2\mu}\Big].\nonumber
320: \end{eqnarray}
321: Substituting the above expression in Eq.(A4) and with some lengthy manipulation, we arrive at the
322: expression in Eq.(14).
323: 
324: \begin {thebibliography} {99}
325: 
326: \bibitem {woo} W. K. Wootters and W. Zurek, Nature {\bf 299}, 802 (1982).
327: 
328: \bibitem {BB92} C. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, J.
329: Cryptology {\bf 5}, 3 (1992).
330: 
331: \bibitem {bb84} C. H. Bennett and G. Brassard, in {\it Proceedings of IEEE International Conference
332: on Computers, Systems, and Signal Processing, Bangalore, India} (IEEE, New York, 1984), pp.175-179.
333: 
334: \bibitem {lut} N. L{\" u}tkenhaus, Phys. Rev. A{\bf 61}, 052304 (2000).
335: 
336: \bibitem {demartini} F. De Martini, G. Di Giuseppe, and M. Marrocco,  Phys. Rev. Lett. {\bf 76}, 900
337: (1995).
338: 
339: \bibitem {kitson} S. C. Kitson et al., Phys. Rev. A{\bf 58},
340: 620 (1998).
341: 
342: \bibitem {brunel} C. Brunel et al., Phys. Rev. Lett. {\bf 83}, 2722 (1999).
343: 
344: \bibitem {fleury} L. Fleury et al., Phys. Rev. Lett. {\bf
345: 84}, 1148 (2000).
346: 
347: \bibitem {kurtsiefer} C. Kurtsiefer et al., Phys.
348: Rev. Lett. {\bf 85}, 290 (2000).
349: 
350: \bibitem {brouri} R. Brouri et al., Opt. Lett. {\bf 25}, 1294
351: (2000).
352: 
353: \bibitem {kim} J. Kim et al., Nature {\bf 397}, 500
354: (1999).
355: 
356: \bibitem {michler} P. Michler et al.,
357: Nature {\bf 406}, 968 (2000); P. Michler et al., Science {\bf 290}, 2282 (2000); C. Santori et al., Phys.
358: Rev. Lett. {\bf 86}, 1502 (2001).
359: 
360: \bibitem {yama} G. S. Solomon, M. Pelton, and Y. Yamamoto, Phys. Rev. Lett. {\bf 86}, 3903 (2001).
361: 
362: \bibitem {singh} A. B. Dodson and Reeta Vyas, Phys. Rev. A{\bf 47}, 3396 (1993); H. Deng, D.
363: Erenso, R. Vyas, and S. Singh, Phys. Rev. Lett. {\bf 86}, 2770 (2001).
364: 
365: \bibitem {lu-ou} Y. J. Lu and Z. Y. Ou, Phys. Rev. Lett.
366: {\bf 88}, 023601 (2002).
367: 
368: \bibitem {gisin} V. Scacrani, A. Acin, G. Ribordy, and N. Gisin, Phys. Rev. Lett.
369: {\bf 92}, 057901 (2004).
370: 
371: \bibitem {bras} G. Brassard, N. Lutkenhaus, T. Mor, and B. C. Sanders, Phys. Rev. Lett.
372: {\bf 85}, 1330 (2000).
373: 
374: \bibitem {yuen} H. P. Yuen, Phys. Rev. A{\bf 13}, 2226 (1976).
375: 
376: \bibitem {MW} L. Mandel and E. Wolf, {\it Optical Coherence and Quantum Optics}, Cambridge
377: University Press, New York (1995).
378: 
379: \bibitem {loui} W. H. Louisell, {\it Quantum Statistical Properties of Radiation}  (Wiley, New York,
380: 1973), pp.156-159.
381: 
382: 
383: \end{thebibliography}
384: 
385: 
386: \end{document}
387: % ------------------------------------------------------------------------
388: 
389: