Not Everyone Has A Laser Pointer Detector

In this method, not everyone has a laser pointer detector and instead sends their photons to a central node. Pass the photons through a beam splitter and measure them. These results can reveal the correlation between these bits, but do not disclose their values, and remain secret. In this device, information will remain secure even if attempts…

Hide Information In Light Particles Emitted By Laser Pointer

Quantum cryptography guarantees “unbreakable” security by hiding information in light particles or photons emitted from a laser pointer. In this form of cryptography, quantum mechanics is used to randomly generate a key. The sender, often referred to as Alice, sends the key through polarized photons with different polarization directions. The recipient, often referred to as Bob,…