scispace - formally typeset
Journal ArticleDOI

Quantum cryptography based on Bell's theorem.

Artur Ekert
- 05 Aug 1991 - 
- Vol. 67, Iss: 6, pp 661-663
TLDR
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported, based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment andBells theorem is used to test for eavesdropping.
Abstract
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment and Bells theorem is used to test for eavesdropping. © 1991 The American Physical Society.

read more

Citations
More filters
Journal ArticleDOI

Continuous-variable entanglement and quantum-state teleportation between optical and macroscopic vibrational modes through radiation pressure

TL;DR: In this article, an isolated, perfectly reflecting, mirror illuminated by an intense laser pulse is studied and the resulting radiation pressure efficiently entangles a mirror vibrational mode with the two reflected optical sideband modes of the incident carrier beam.
Journal ArticleDOI

Composability in quantum cryptography

TL;DR: In this paper, the authors review several aspects of composability in the context of quantum cryptography and show how to generate a continuous key stream by sequentially composing rounds of a quantum key distribution protocol.
Posted Content

Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices

TL;DR: Chung et al. as mentioned in this paper showed how to expand a random seed at an exponential rate without trusting the underlying quantum devices and showed that the Renyi divergence of the outputs of the protocol (for a specific bounding operator) decreases linearly as the protocol iterates.
Proceedings ArticleDOI

A Link Layer Protocol for Quantum Networks.

TL;DR: In this paper, the authors propose a functional allocation of a quantum network stack and construct the first physical and link layer protocols that turn ad-hoc physics experiments producing heralded entanglement between quantum processors into a well-defined and robust service.
Journal ArticleDOI

Teleportation attack on the QSDC protocol with a random basis and order

TL;DR: It is shown that quantum teleportation can be employed to weaken the role of the order-rearrangement encryption at least in a certain circumstance.