scispace - formally typeset
Journal ArticleDOI

Quantum cryptography based on Bell's theorem.

Artur Ekert
- 05 Aug 1991 - 
- Vol. 67, Iss: 6, pp 661-663
TLDR
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported, based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment andBells theorem is used to test for eavesdropping.
Abstract
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment and Bells theorem is used to test for eavesdropping. © 1991 The American Physical Society.

read more

Citations
More filters
Journal ArticleDOI

Upper bounds for the security of two distributed-phase reference protocols of quantum cryptography

TL;DR: In this article, the authors presented new upper bounds for differential phase shift (DPS) and coherent-one-way (COW) protocols in the limit of large distances (d & 50 km with typical values in optical fibers) by considering a large class of collective attacks, in which the adversary attaches ancillary quantum systems to each pulse or to each pair of pulses.
Journal ArticleDOI

Family of Bell-like Inequalities as Device-Independent Witnesses for Entanglement Depth.

TL;DR: This work presents a simple family of Bell inequalities applicable to a scenario involving arbitrarily many parties, each of which performs two binary-outcome measurements, and shows that these inequalities are members of the complete set of full-correlation Bell inequalities discovered by Werner-Wolf-Żukowski-Brukner.
Journal ArticleDOI

Entanglement of the Antisymmetric State

TL;DR: In this article, the authors analyse the entanglement of the antisymmetric state in dimension d×d and present two main results: the amount of secrecy that can be extracted from the state is low, more precisely, the distillable key is bounded by O(1/d).
Journal ArticleDOI

Quantum Secure Direct Communication Based on Four-Qubit Cluster States

TL;DR: A novel quantum secure direct communication scheme based on four-qubit cluster states which is determinate and secure, and shows the qubits carrying the secret message do not need to be transmitted in public channel.
Journal ArticleDOI

Asymmetric encryption and signature method with DNA technology

TL;DR: The security of DNA-PKC relies on difficult biological problems instead of computational problems; thus it is immune from known attacks, especially the quantum computing based attacks.