Journal ArticleDOI
Quantum cryptography based on Bell's theorem.
TLDR
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported, based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment andBells theorem is used to test for eavesdropping.Abstract:
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment and Bells theorem is used to test for eavesdropping. © 1991 The American Physical Society.read more
Citations
More filters
Journal ArticleDOI
Continuous-variable entanglement and quantum-state teleportation between optical and macroscopic vibrational modes through radiation pressure
TL;DR: In this article, an isolated, perfectly reflecting, mirror illuminated by an intense laser pulse is studied and the resulting radiation pressure efficiently entangles a mirror vibrational mode with the two reflected optical sideband modes of the incident carrier beam.
Journal ArticleDOI
Composability in quantum cryptography
TL;DR: In this paper, the authors review several aspects of composability in the context of quantum cryptography and show how to generate a continuous key stream by sequentially composing rounds of a quantum key distribution protocol.
Posted Content
Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices
Carl A. Miller,Yaoyun Shi +1 more
TL;DR: Chung et al. as mentioned in this paper showed how to expand a random seed at an exponential rate without trusting the underlying quantum devices and showed that the Renyi divergence of the outputs of the protocol (for a specific bounding operator) decreases linearly as the protocol iterates.
Proceedings ArticleDOI
A Link Layer Protocol for Quantum Networks.
Axel Dahlberg,Matthew Skrzypczyk,Tim Coopmans,Leon Wubben,Filip Rozpędek,Matteo Pompili,Arian Stolk,Przemyslaw Pawelczak,Robert Knegjens,Julio de Oliveira Filho,Ronald Hanson,Stephanie Wehner +11 more
TL;DR: In this paper, the authors propose a functional allocation of a quantum network stack and construct the first physical and link layer protocols that turn ad-hoc physics experiments producing heralded entanglement between quantum processors into a well-defined and robust service.
Journal ArticleDOI
Teleportation attack on the QSDC protocol with a random basis and order
TL;DR: It is shown that quantum teleportation can be employed to weaken the role of the order-rearrangement encryption at least in a certain circumstance.