E91 Protocol
An entanglement-based quantum key distribution protocol using Bell inequality violations for security.
E91 is a QKD protocol proposed by Artur Ekert in 1991. Unlike BB84, it uses entanglement and Bell inequalities to guarantee security.
The Key Idea
Alice and Bob share entangled photon pairs. By measuring Bell inequality violations, they can verify:
- Their photons are genuinely entangled
- No eavesdropper has disturbed the quantum channel
The Setup
A source produces Bell pairs:
One photon goes to Alice, one to Bob.
Measurement Bases
| Alice’s Choices | Angles |
|---|---|
| 0° | |
| 45° | |
| 90° |
| Bob’s Choices | Angles |
|---|---|
| 22.5° | |
| 67.5° | |
| 112.5° |
The Protocol
Step 1: Measurement
For each photon pair:
- Alice randomly chooses , , or and measures
- Bob randomly chooses , , or and measures
Step 2: Public Comparison
Alice and Bob announce their measurement choices (not results).
Step 3: Key Generation
When Alice chose and Bob chose , or Alice chose and Bob chose :
- These bases are parallel
- Results are perfectly anti-correlated
- Use for key bits
Step 4: Security Check
Use other combinations (, , , ) to compute CHSH:
Step 5: Verify Bell Violation
- If : Maximum quantum violation, no eavesdropper
- If : Some disturbance, possibly Eve
- If : Classical correlations only, Eve has full information
Security from Bell Violations
The key insight: Bell violations certify quantum correlations.
If Eve intercepts and resends, she breaks the entanglement, reducing Bell violation. Alice and Bob detect this as reduced value.
Comparison with BB84
| Aspect | BB84 | E91 |
|---|---|---|
| Resource | Single photons | Entangled pairs |
| Security proof | No-cloning | Bell inequalities |
| Source location | With Alice | Can be anywhere |
| Device-independent | No | Closer to DI |
Advantages of E91
- Source can be untrusted: Even if Eve controls the source, Bell violations prove security
- Path to device-independence: Foundation for Device-Independent QKD (DI-QKD)
- Symmetric: Neither party needs to trust the source
Practical Considerations
- Generating high-quality entangled pairs is harder than single photons
- Loss affects both photons (reduces rate more)
- Demonstrated over 100+ km
See also: Quantum Key Distribution, BB84 Protocol, Bell Inequality