Journal ArticleDOI
Quantum cryptography based on Bell's theorem.
TLDR
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported, based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment andBells theorem is used to test for eavesdropping.Abstract:
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment and Bells theorem is used to test for eavesdropping. © 1991 The American Physical Society.read more
Citations
More filters
Journal ArticleDOI
Upper bounds for the security of two distributed-phase reference protocols of quantum cryptography
TL;DR: In this article, the authors presented new upper bounds for differential phase shift (DPS) and coherent-one-way (COW) protocols in the limit of large distances (d & 50 km with typical values in optical fibers) by considering a large class of collective attacks, in which the adversary attaches ancillary quantum systems to each pulse or to each pair of pulses.
Journal ArticleDOI
Family of Bell-like Inequalities as Device-Independent Witnesses for Entanglement Depth.
Yeong-Cherng Liang,Yeong-Cherng Liang,Denis Rosset,Jean-Daniel Bancal,Gilles Pütz,Tomer Jack Barnea,Nicolas Gisin +6 more
TL;DR: This work presents a simple family of Bell inequalities applicable to a scenario involving arbitrarily many parties, each of which performs two binary-outcome measurements, and shows that these inequalities are members of the complete set of full-correlation Bell inequalities discovered by Werner-Wolf-Żukowski-Brukner.
Journal ArticleDOI
Entanglement of the Antisymmetric State
TL;DR: In this article, the authors analyse the entanglement of the antisymmetric state in dimension d×d and present two main results: the amount of secrecy that can be extracted from the state is low, more precisely, the distillable key is bounded by O(1/d).
Journal ArticleDOI
Quantum Secure Direct Communication Based on Four-Qubit Cluster States
TL;DR: A novel quantum secure direct communication scheme based on four-qubit cluster states which is determinate and secure, and shows the qubits carrying the secret message do not need to be transmitted in public channel.
Journal ArticleDOI
Asymmetric encryption and signature method with DNA technology
TL;DR: The security of DNA-PKC relies on difficult biological problems instead of computational problems; thus it is immune from known attacks, especially the quantum computing based attacks.