Quantum cryptography transmission method and system

ABSTRACT

This invention proposes an alternative: quantum cryptography by ambiguity in time. It comprises the conversion of K bits to be transmitted into a train of K pulses of particle flows of time width ΔT and whose frequency Tb, is predetermined knowing that each of the K pulses being shifted or not in time such that the k th  pulse is shifted by a duration t0 respectively t1, with respect to the initial instant of the period depending on the value “0”, respectively “1” of the k th  bit, where k is an integer such that 0≦k&lt;K and the shifts t0 and t1 are such that 0≦t0,t1≦Tb−ΔT and 0&lt;It1−t0I&lt;ΔT.

[0001] The invention concerns the field of cryptography.

[0002] Through the use of cryptography, a message can only be read by its recipient. A key is used to encrypt the message. The owner of the key is the only person who can read the message received.

[0003] The encryption key must therefore be transmitted by the sender to the recipient of the encrypted message. Transmission is carried out such that only the recipient of the encrypted message receives this encryption key. Interception by a third party of the encryption key is detected by the sender or the recipient. Consequently, the encryption key or the elements of the key detected as having been intercepted are not used to encrypt the message.

[0004] The principle of transmitting encryption keys is used, for example, in quantum cryptography. It consists of using physical properties to guarantee the integrity of a received encryption key.

[0005] The encryption key consists of a bit sequence. Generally, a photon polarization state is associated with each bit. The light flow, encoded by polarization, is then attenuated. The probability of detecting two photons associated with the same bit is then negligible.

[0006] The sender can encode the encryption key on two nonorthogonal states (a given polarization state and a state at 45°). Concerning this subject, Bennett wrote the article “Quantum Cryptography using any two Nonorthogonal states” in Physics Review letters 68 in 1992. In reception, the detection states are chosen in a base with two states. These two detection states are orthogonal respectively to each state of the base used by the sender. During transmission, the transmission and detection states are chosen independently of each other.

[0007] If the states chosen by the transmitter and the receiver are orthogonal, the detection probability is zero. The measurement result is certain, there is no ambiguity. If they are not orthogonal, there are two possible measurement results since the probability of detecting the photon is 0.5. If the photon is detected, it is certain that the transmitter state is at 45° to the receiver state. There is no ambiguity. Irrespective of the polarization configuration, there is always a possibility of not detecting the photon. This non detection of the photon makes deducing the choice of transmitter polarization, using the receiver state, ambiguous.

[0008] This ambiguity concerning the polarization is used in quantum cryptography. A non recipient cannot reproduce the message since it is impossible to avoid losing information.

[0009] This type of quantum cryptography is known as “polarization ambiguity quantum cryptography” since it uses photon polarization states. A certain number of problems are to be faced. They concern the encoding of the encryption key on the polarization states of the photons in a light flow. During transmission, there is a problem of polarization distortion. For example, transmission by optical fibers requires complex systems which are difficult to implement and very expensive. For example,

[0010] either the use of polarization-maintained fibers, which are expensive and difficult to implement,

[0011] or the use of complex systems implementing, for example, Faraday rotators.

[0012] This invention proposes an alternative: quantum cryptography by ambiguity in time. It is easier to implement since protected, amongst other things, against problems of transmission by optical fibers. Two photons transmitted successively with a time difference Δt will be received in the transmission order with the same time difference Δt, independently of the transmission medium.

[0013] The invention concerns a digital data encoding method intended for transmission by particle flow such that the probability of transmitting two particles per period is negligible, wherein it includes the transformation of the sequence of K bits of digital data in a train of K pulses of particle flows of time width ΔT whose frequency Tb is predetermined, knows that each of the K pulses being shifted or not in time such that the k^(th) pulse is shifted by a duration t0, respectively t1, with respect to the initial instant of the period depending on the value “0”, respectively “1” of the k^(th) bit, where k is an integer such that 0≦k<K and the shifts t0 and t1 are such that 0≦t0,t1≦Tb−ΔT and 0<It1−t0I<ΔT.

[0014] The invention proposes a method to decode digital data encoded according to the procedure wherein, given Δt=ΔT−It1−t0I, it comprises:

[0015] observation of the flow of particles received on or two time windows for each bit reception period of duration Tb,

[0016] detection of particles in the time observation window(s) generates either a bit of value “0” or “1”, or a signal indicating ambiguity.

[0017] The advantages and features of the invention will be clearer on reading the following description, given as an example, illustrated by the attached figures representing in:

[0018]FIG. 1, the representation of the value of a bit transmitted as a pulse according to the invention,

[0019]FIG. 2, the time observation windows of the decoder according to the invention,

[0020]FIG. 3(a), a first example of realization of a second variant of the encoder 1 according to the invention,

[0021]FIG. 3(b), the representation of the value of a bit to be transmitted as control signal of the modulator included in the encoder 1 of FIG. 3(a).

[0022]FIG. 4, a third variant of the encoder 1 according to the invention,

[0023]FIG. 5, a second example of realization of the second variant of the encoder 1 according to the invention,

[0024]FIG. 6, the disc of the mechanical chopper of the third and fourth examples of realization of the second variant of the encoder 1 according to the invention,

[0025]FIG. 7(a), a third example of realization of the second variant of the encoder 1 according to the invention,

[0026]FIG. 7(b), a representation of the light flow at the input of the modulator of the encoder 1 of FIG. 6(a).

[0027]FIG. 8, a fourth example of realization of the second variant of the encoder 1 according to the invention,

[0028]FIG. 9(a) and 9(b), the Mach-Zender interferometer of encoder 1 of FIG. 7 in its two different states,

[0029]FIG. 10, a first example of realization of the quantum cryptography transmission system according to the invention,

[0030]FIG. 11(a) and 11(b), two variants of the decoder according to the invention,

[0031]FIG. 12, a second example of realization of the quantum cryptography transmission system according to the invention.

[0032] The principle of this invention is based on the reproduction of the state of the art polarization ambiguity arrangement in the time domain.

[0033] The information is encoded in pulses of time width ΔT as shown on FIG. 1. These pulses may, for example, be light pulses. Generally, they may be pulses of particle flows (photons, electrons, positrons, etc.). The transmitter produces two types of pulse separated by a time shift of, for example, It1−t0I=ΔT/2. One bit of the digital data representing the information to be encoded is associated with each time period of duration Tb. One of the pulses is associated with the bit of value “0” (that shifted by t0 with respect to the initial instant of the period of duration Tb), the other with the bit of value “1” (that shifted by t1). The duration Tb is such that it satisfies the following relation Tb≧ΔT+It1−t0I. The two pulses are shifted so that they overlap for a time interval Δt=ΔT−It1−t0I (=ΔT/2, in our example) >0. On the example of FIG. 1, the pulse associated with the bit of value “1” is delayed with respect to the pulse associated with the bit of value “0” and t0=0. Generally, t0 and t1 are such that 0≦t0,t1≦Tb−ΔT and 0<It1−t0I<ΔT. If the receiver detects a photon during the period of overlap, it cannot know which type of pulse it comes from, and consequently the value “0” or “1” of the bit which was transmitted. To detect the bit value unambiguously, only the photons received in the two time windows given on FIG. 2 are observed. One window is used to observe the first half of the first pulse and the other the second half of the second pulse. Consequently, the photons reaching the receiver during the overlap interval Δt are not observed.

[0034] More explicitly, the decoding comprises:

[0035] observation of the flow of particles received on or two time windows for each bit reception period of duration Tb,

[0036] if t0<t1, the first time observation window starts at instant t0 (inclusive) and ends at instant t1 (exclusive), the second observation window starts, if necessary, at instant t1+Δt (exclusive) and ends at instant t1+T (inclusive) or vice versa,

[0037] if t1<t0, the first time observation window starts at instant t1 (inclusive) and ends at instant t0 (exclusive), the second observation window starts, if necessary, at instant t0+Δt (exclusive) and ends at instant t0+T (inclusive) or vice versa,

[0038] detection of particles in the time observation window(s) generates:

[0039] a bit of value “0”:

[0040] if t0<t1, when a particle is detected in the window starting at t0 of period k,

[0041] if t1<t0, when a particle is detected in the window starting at t0+Δt of period k,

[0042] a bit of value “1”:

[0043] if t1<t0, when a particle is detected in the window starting at t1 of period k,

[0044] if t0<t1, when a particle is detected in the window starting at t1+Δt of period k,

[0045] a signal indicating an ambiguity on the bit value if no particle was detected in the first, and if necessary, in the second observation window.

[0046] In our example, the bits are transmitted according to the format of FIG. 1 and the observation windows of the receiver are given by FIG. 2.

[0047] The particle flow pulses carrying the information to be transmitted in time shifted format are, for example:

[0048] [ENCODER A] Either produced directly by an encoded pulse source 11 ⁺³ (for example, a laser generating a discontinuous laser beam according to the diagram of encoded pulses shown on FIG. 1),

[0049] [ENCODER B] Or shifted in time by t0 or t1 depending on the data to be encoded by a controllable delay gate 13 receiving a particle pulse flow from a pulse source 11 ⁺²,

[0050] [ENCODER C] Or chopped with the appropriate time shift (t0 or t1) depending on the data to be encoded by an encoded pulse chopper 12 ⁺³ at frequency Tb in a continuous beam from a laser 11,

[0051] [ENCODER D] Or chopped by a pulse chopper 12 at frequency Tb in a continuous beam from a source 11 then given a time shift of t0 or t1 depending on the data to be encoded by a controllable delay gate 13,

[0052] The various encoders 1 and decoders 3 considered on FIGS. 3 to 12 are given as examples. They illustrate encoding on light beam. More generally, any type of particle flow (photons, electrons, positrons, etc.) may be considered.

[0053] [ENCODER A] The first variant of encoder 1 is not illustrated. Encoder 1 includes at least one encoded pulse source 11 ⁺³. It produces particle flow pulses of time width ΔT and frequency Tb. In addition, the pulses from this source are shifted by t0 or t1 depending on the value of the data bits to be encoded. The values of the time shifts t0 and t1 are such that 0≦t0,t1≦Tb−ΔT and 0<It1−t0I<ΔT. In our example, the source 11 ⁺³ is a laser, for example a mode-locked laser producing light pulses according to the diagram on FIG. 1 with t0=0.

[0054] [ENCODER B] FIG. 3 shows a second variant of encoder 1 using a modulator 131. Modulator 131 is electro-optical or acousto-optical, etc. Encoder 1 includes a pulse source 11 ⁺². This source 11 ⁺² generates a particle flow as a train of pulses of time width ΔT and frequency Tb. The pulse source 11 ⁺² is, for example, a mode-locked laser. Mode-locked lasers produce pulse trains separated by a constant time interval equal to the time for the back and forth movement in the laser cavity. It is difficult to control the laser in order to produce the time shifts required depending on the bits to be encoded. Consequently, in the variant proposed by FIG. 4, these shifts are produced outside the laser 11 ⁺² using a controllable delay gate 13. The delay gate 13 makes the pulses follow or not a delay line according to the shift required and determined by the bits to be encoded. This type of delay gate 13 can be produced, for example, using a modulator 131 to switch the polarization between two directions specific to the polarizing prisms 132 _(S) and 132 _(R) placed downstream. Polarizing prism 132 _(S) guides the pulses depending on their polarizations to a first or a second path. The second polarizing prism 132 _(R) brings them back to the output of the delay gate 13. Depending on the path followed by the pulses, the distance traveled is more or less long. For example, if the pulse is not shifted, if follows a direct path and if it is shifted, it follows an elongated path.

[0055] [ENCODER C] The first example of realization of the third variant of encoder 1 shown on FIG. 3(a) is simple. The beam generated by the laser 11 goes through a modulator 121. Modulator 121 has two operating modes: active mode and inactive mode. It can be electro-optical, acousto-optical, etc. Modulator 121 receives a control signal which has two states. One state corresponds to inactive mode, the other state to active mode. FIG. 3(b) shows the control voltage of an electro-optical modulator 121. It is designed to create pulses of time width ΔT at frequency Tb with a time shift t0 or t1 depending on the value “0” or “1” of the bits. When the control voltage reaches a threshold value Vπ, modulator 121 is active. Modulator 121 in active state switches the polarization of the light beam passing through it by 90°. A polarizer 122 is placed downstream from modulator 121. Polarizer 122 switches off the beam when modulator 121 is not active. In fact, polarizer 122 only allows the beam to pass when its polarization corresponds to that obtained at the output of modulator 121 when active. When idle therefore, no beam is transmitted by the system 12 ⁺³.

[0056] This first example of realization of the third variant of encoder 1 therefore includes a source 11 producing a continuous flow of particles followed by an encoded pulse chopper 12 ⁺³ with at least one encoded pulse recorder 121 receiving the continuous flow, and a switch 122 to allow transmission only during the recorded pulse.

[0057] Another technique consists of using a mechanical chopper 123 which chops pulses of given time width ΔT at the desired frequency Tb on a continuous particle flow.

[0058]FIG. 5 shows a second example of realization of the third variant of encoder 1. It uses a mechanical chopper whose disc 123 ₁ has only one opening. A phase check device 124 generates a voltage (VCO) to command the speed of rotation of the disc 123 ₁. Varying the control voltage dephases more or less the disc rotation and therefore shifts by a duration t0 or t1 the creation of a pulse in the beam from laser 11.

[0059] A disc 123 ₂ with two openings like that shown on FIG. 6 can be used to avoid having to check the disc rotation phase. So that the pulses have the same shape and same duration T, the two openings have identical shapes (triangles, squares, rectangles, etc.). In addition, they are diametrically opposed and shifted by ½ an opening. The two pulses created are therefore shifted by half a width. The advantage is to provide the shift of ΔT/2 independently of the disc rotation spectral width. For a shift other than ΔT/2, the shift is no longer ½ an opening but adapted to the required time shift.

[0060] The two pulses are created on two separate beams since they have orthogonal polarizations, as shown on FIGS. 7(a) and 8. To do this, the beam from laser 11 is split into two beams. The polarizations of these two beams are orthogonal. This separation is produced, for example, with a polarizing prism 122 _(M). Disc 123 ₂ is positioned so that one beam crosses one of the openings directly. The other beam is guided to the other opening using, for example, a mirror 125″. One of the beams then has pulses at instants t1 and the other beam has pulses at instants t0. To encode data, one or other of the two pulses must then be chosen.

[0061] The third example of realization of the third variant of encoder 1 shown on FIG. 7(a) proposes a first pulse selection device. The two beams are recombined after passing through disc 123 ₂. A repolarizing cube 122 _(V) is used to perform this recombination. It is placed on the path of one of the beams. The other beam is guided to the repolarizing cube 122 _(V) using, for example, a mirror 125′. The recombined beam has the two pulse types t0 and t1 each on a given polarization as shown on FIG. 7(b). The selection device is placed on the light beam resulting from the recombination. It includes, for example, a modulator 121 which is activated or not depending on the pulse selected. The modulator 121 places the selected pulses corresponding to the data to be encoded on a given polarization. The selection device then only allows the polarization containing the selected pulses to pass, by using a polarizer 122.

[0062] The selection device described by the fourth example of realization of the third variant of encoder 1 on FIG. 8 is produced using another technique. It is an optical routing technique. It uses, for example, a Mach-Zender interferometer i set to zero step difference. The interferometer has two input and output channels as shown on FIGS. 9(a) and 9(b). Depending on the dephasing introduced in one arm of the interferometer (e.g. 0 for t0 or π for t1), one of the input channels is connected to one of the output channels. This dephasing is easy to achieve by mounting one of the mirrors 125 _(i)′″ on a piezo-electric block 127 _(i). This is used to elongate the length of one arm by a distance equal to one wavelength. A half-wave plate 126 can be used on one of the input channels of the interferometer i The polarizations of the two beams are then identical at the input of the interferometer i.

[0063] The examples of realization of the third variant of encoder 1 on FIGS. 7 and 8 show an encoded pulse chopper 12 ⁺³ which has a given structure. The encoded pulse chopper 12 ⁺³ includes at least one particle flow separator 122 _(M) on two channels. A chopper 123 as such is used to chop on the particle flow pulses shifted by t0 on the first channel and by t1 on the second channel. A device (121+122 or i) is used to select at each period the pulse shifted by t0 or by t1 depending on the value “0” or “1” of the bit to be encoded on this period.

[0064] [ENCODER D] The fourth variant of encoder 1 is not illustrated. It includes a source supplying a continuous particle flow (single mode laser, etc.) Pulses of time width ΔT are chopped at frequency Tb in the continuous flow. They are produced by a pulse chopper 12 generating pulses either not shifted, or all shifted by t (0≦t≦Tb−ΔT). The structure of the pulse chopper 12 may, for example, be similar to that of the encoded pulse choppers 12 ⁺³ described above. The pulses are then shifted or not by a delay gate 13 (for example similar to that of the second variant of encoder 1). The pulses output from the delay gate 13 then carry the data to be transmitted according, for example, to the diagram on FIG. 1.

[0065] Once the data is encoded as pulses shifted or not by an encoder 1 including, for example, an encoded pulse chopper 12 ⁺³ on the particle flow from a continuous source 11, it must be attenuated. The probability that the decoder 3 represented on FIG. 10 detects two photons on the same pulse must be negligible. It is this principle which brings in the quantum dimension of the cryptography. The attenuator 2 is positioned after encoder 1 in the transmitter. It includes a half-wave plate 21 followed by a polarizer 22 which produces two beams: a “key” attenuated beam and a secondary beam. The intense beam leaving by the secondary channel can also be transmitted to the receiver. It is used, for example, to create a “sync” reference signal to synchronize the receiver clock. In particular, it is used to synchronize the decoder 3. The “sync” signal is transmitted either directly in optical format or as a microwave signal, etc.

[0066] A first variant of the decoder 3 shown on FIG. 11(a) includes a photon counter 31′ activated only during the observation windows shown on FIG. 2. Following the detection of a photon in the “key” quantum signal by the photon counter 31′ in either of the observation windows, the decoder 3 decides whether a bit of value “0” or “1” has been transmitted. If the photon counter 31′ does not detect any photons in either observation window, the decoder 3 decides that there is non-reception. It cannot determine whether this non-reception is due to poor quality transmission or to interception by a third party.

[0067] If the time width ΔT and the spectral width Δv of the pulses transmitted satisfy the minimum state relation Δv.ΔT=1, a second variant of the decoder 3 proposed by FIG. 11(b) can be used. The laser 11 used to produce such pulses may be, for example, a mode-locked laser. The photons of the “key” quantum signal received are filtered by a filter of spectral width Δv. The photons of spectral width Δv are observed by the photon counter 31′ activated on the observation windows shown on FIG. 2. The photons reflected by the filter Δv are also counted by a photon counter 31″. The comparator 32 checks whether the number N_(Δ) _(f) of reflected photons is greater to much greater than the number N_(Δ) _(v) of photons observed in the observation windows. If this is the case, the decoder 3 decides that the data transmitted has been intercepted by a third party. Otherwise, depending on whether the photon counter 31′ detects a photon in one or other of the observation windows, the decoder 3 decides whether a bit of value “0” or “1” has been transmitted. Lastly, if the photon counter 31′ does not detect any photons in either observation window, the decoder 3 decides that there is non-reception. It cannot determine whether this non-reception is due to poor quality transmission or to interception by a third party.

[0068] Depending on the type of source (11, 11 ⁺². etc.) used, for example a mode-locked laser, the pulse durations may then lie between 10 ps and 100 fs. These values of much less than the response times of some existing photon counters (typically 1 ns). In this case, the photon counter (31, 31′) cannot distinguish between a shifted pulse and a non-shifted pulse, or between a pulse shifted by t0 and a pulse shifted by t1. This function can then be carried out by using, for example, an optical gate (not shown on the figures) upstream from the photon counter (31, 31′). This gate is electrically controlled It must be fast enough to produce detection gates of sufficiently short duration corresponding to the observation windows of FIG. 2 if the response time of the photon counter (31, 31′) is too long.

[0069] The decoder 3 shown on FIGS. 11(a) and 11(b) therefore includes at least one particle counter 31′ either activated on the observation windows of FIG. 2 or placed downstream from a gate producing particle detection gates corresponding to these windows. If the pulses transmitted by the transmitter have minimum state, the decoder can also include a filter of spectral width Δv upstream from the particle counter 31′. It may also include a particle counter 31″ on the flow reflected by the filter Δv and a comparator 32 receiving the number of particles detected by the particle counters 31′ and 31″ which can detect the interception of the transmission by a third party.

[0070]FIG. 12 shows a second example of realization of the quantum cryptography transmission system with time encoding according to the invention. A pulse source 11 ⁺² generates the particle flow as a train of pulses of time width ΔT and frequency Tb. For example, if the pulses are too short with respect to the switching time of a gate and/or for the shift to be detected by a particle counter 31′, the transmission system used may have the structure of an interferometer as shown on FIG. 12. In this case, the delay gate 13 includes the separating element of the interferometer. The particle flow is therefore split into two parts sent on the two arms of the interferometer. In one arm, the delay gate 13 may, for example, transmit or not the pulse in a delay line of duration ΔT/2 (if t0=0, t1=T/2) depending on the data to be encoded. The particle flows are attenuated on the two arms by the attenuator 2 before being transmitted as “key” signal. The attenuator may, for example, use the secondary flow as “sync” synchronization signal to synchronize the transmitter with the receiver. The decoder 3 then transmits or not the pulse of the other interferometer arm into a delay line of identical duration ΔT/2. If the delay gate 13 and the decoder 3 have chosen the same delay 0 or ΔT/2, then the probability of detecting a photon is 100% in one of the output channels (channel a) and zero in the other channel (channel b). If the delay gate 13 and the decoder 3 have chosen different delays, then the probability of detecting a photon is 50% in each channel. The fact that the counter 31′ detects a particle in channel b is used to determine with 100% probability the delay which was chosen by the delay gate 13. The particle counter 31′ may, for example, by replaced by the device shown on FIG. 11(b) if the pulses generated have minimum state.

[0071] An additional advantage of time ambiguity cryptography over polarization ambiguity cryptography is that the probability of the decoder 3 detecting a photon is greater when the decoder 3 uses two observation windows. 

1. Digital data encoding method intended for transmission by particle flow such that the probability of transmitting two particles per period is negligible, wherein it includes the transformation of the sequence of K bits of digital data to a train of K pulses of particle of time width ΔT and whose frequency Tb, is predetermined knowing that each of the K pulses being shifted or not in time such that the kth pulse is shifted by a duration t0 respectively t1, with respect to the initial instant of the period depending on the value “0”, respectively “1” of the k^(th) bit, where k is an integer such that 0≦k<K and the shifts t0 and t1 are such that 0≦t0,t1≦Tb−ΔT and 0<It1−t0I<ΔT.
 2. Encoding method according to the previous claim, wherein it has at least one of the following characteristics: the particle flow generated is a light flow, a photon flow, an electron flow or a positron flow; the shifts t0 and t1 satisfy one or more of the following relations: t1=t0+ΔT/2or t0=t1+ΔT/2, t0=0 or t1=0; the time width ΔT and the spectral width Δv of the pulses satisfy the following relation: Δv.ΔT=1; the digital data has at least one encryption key.
 3. Digital data encoder for use by a signal transmitter on particle flow such that the probability of transmitting two particles per period is negligible, wherein it can be used at least to convert the sequency of K bits of digital data into a train of K pulses of particle of time width ΔT and whose frequency Tb, is predetermined knowing that each of the K pulses being shifted or not in time such that the k^(th) pulse is shifted by a duration t0 respectively t1, with respect to the initial instant of the period depending on the value “0”, respectively “1” of the k^(th) bit, where k is an integer such that 0≦k<K and the shifts t0 and t1 are such that 0≦t0,t1≦Tb−ΔT and 0≦It1−t0I<ΔT.
 4. Encoder according to the previous claim, wherein it comprises at least: a device (11), called continuous source, generating a continuous particle flow, a device (12), called pulse chopper, chopping a train of pulses of time width ΔT and frequency Tb in the continuous particle flow, and a device (13), called delay gate, shifting the pulses chopped in the particle flow to match the values of the bits to be encoded.
 5. Encoder according to claim 3, wherein it comprises at least: a device (11 ⁺²), called pulse source, generating a particle flow as a train of pulses of time width ΔT and frequency Tb, and a device (13), called delay gate, shifting the pulses chopped in the particle flow to match the values of the bits to be encoded.
 6. Encoder according to claim 3, wherein it comprises at least: a device (11), called continuous source, generating a continuous particle flow, a device (12 ⁺³), called encoded pulse chopper, chopping in the continuous particle flow a train of pulses of time width ΔT and frequency Tb with the appropriate time shift depending on the values of the bits to be encoded
 7. Encoder according to claim 3, wherein it comprises at least a device (11 ⁺³), called encoded pulse chopper, generating a particle flow as a train of pulses of time width ΔT and frequency Tb with the appropriate time shift depending on the values of the bits to be encoded.
 8. Encoder according to one of claims 3 to 7, wherein it has one or more of the following characteristics: the source (11 or 11 ⁺² or 11 ⁺³) generates a photon flow. the time shifts t, t0 and t1 satisfy one or more of the following relations: t1=t0+ΔT/2 or t0=t1+ΔT/2, t0=0 or t1=0, the time width ΔT and the spectral width Δv of the pulses satisfy the following relation: Δv.ΔT=1; the digital data has at least one encryption key;
 9. Digital data transmitter including at least one digital data encoder (1) according to one of claims 3 to 8 downstream from an attenuator (2) to reduce the number of particles transmitted per period so that the probability of transmitting two particles per period Tb is negligible.
 10. Method to decode digital data encoded according to the method of claim 1 or 2, wherein, given Δt=ΔT−It1−t0I, it comprises: observation of the flow of particles received on or two time windows for each bit reception period of duration Tb, if t0<t1, the first time observation window starts at instant t0(inclusive) and ends at instant t1 (exclusive), the second observation window starts, if necessary, at instant t1+Δt (exclusive) and ends at instant t1+T (inclusive) or vice versa, if t1<t0, the first time observation window starts at instant t1 (inclusive) and ends at instant t0 (exclusive), the second observation window starts, if necessary, at instant t0+Δt (exclusive) and ends at instant t0+T (inclusive) or vice versa, detection of particles in the time observation window(s) generates: a bit of value “0”: if t0<t1, when a particle is detected in the window starting at t0 of period k, if t1<t0, when a particle is detected in the window starting at t0+Δt of period k, a bit of value “1”: if t1<t0, when a particle is detected in the window starting at t1 of period k, if t0<t1, when a particle is detected in the window starting at t1+Δt of period k, a signal indicating an ambiguity on the bit value if no particle was detected in the first, and if necessary, in the second observation window.
 11. Decoding method according to the previous claim, wherein, when the time width ΔT and the spectral width Δv of the pulses used by the encoding method satisfy the following relation: Δv.ΔT=1, it comprises one or more of the following steps: a filtering step which only allows the particles of spectral width Δv to pass, carried out upstream from observation and detection; a count of the number N_(Δ) _(f) , of particles received of spectral width equal to Δv, a count of the number N_(Δ) _(f) of particles received of different spectral width Δf (Δf≠Δv) and a comparison of these two numbers N_(Δ) _(v) and N_(Δ) _(f) such that if N_(Δ) _(v) <<N_(Δ) _(f) , the interception of particles by a third party is indicated.
 12. Decoder of digital data encoded by the encoder (1) of one of claims 3 to 8, wherein, given Δt=ΔT−It1−t0I, it is used to: observe the flow of particles received on one of the two time windows of the bit reception period of duration Tb, if t0<t1, the first time observation window starts at instant t0 (inclusive) and ends at instant t1 (exclusive), the second observation window starts, if necessary, at instant t1+Δt (exclusive) and ends at instant t1+T (inclusive) or vice versa, if t1<t0, the first time observation window starts at instant t1 (inclusive) and ends at instant t0 (exclusive), the second observation window starts, if necessary, at instant t0+Δt (exclusive) and ends at instant t0+T (inclusive) or vice versa, detect the presence or not of particles in the time observation window(s) and generate: a bit of value “0”: if t0<t1, when a particle is detected in the window starting at t0 of period k, if t1<t0, when a particle is detected in the window starting at t0+Δt of period k, a bit of value “1”: if t1<t0, when a particle is detected in the window starting at t1 of period k, if t0<t1, when a particle is detected in the window starting at t1+Δt of period k, a signal indicating an ambiguity on the bit value if no particle was detected in the first, and if necessary, in the second observation window.
 13. Decoder according to the previous claim, wherein it comprises at least a first particle counter (31′) which only counts the particles present in the observation window(s) and/or wherein, when the time width ΔT and the spectral width Δv of the pulses used by the encoder (1) satisfy the following relation: Δv.ΔT=1, it also comprises one or more of the following devices: a filter which only allows the particles of spectral width Δv to pass to the first particle counter; the first particle counter (31′) generating the number N_(Δ) _(v) , of particles it detects, a second counter (31″) generating the number N_(Δ) _(f) of particles received by the decoder (3) and of spectral width Af different from Δf≠Δv, a comparator (32) of these two numbers N_(Δ) _(v) , and N_(Δ) _(f) such that if N_(Δ) _(v) <<N_(Δ) _(f) , it generates a predetermined signal indicating either ambiguity of the bit value or interception of particles by a third party.
 14. Use of the transmitter of claim 9 to transmit an encryption key using quantum cryptography to a receiver synchronized with the transmitter due to the secondary beam transmitted by the transmitter and comprising a decoder (3) according to claim 12 or
 13. 