Journal ArticleDOI
Quantum cryptography based on Bell's theorem.
TLDR
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported, based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment andBells theorem is used to test for eavesdropping.Abstract:
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment and Bells theorem is used to test for eavesdropping. © 1991 The American Physical Society.read more
Citations
More filters
Basic Concepts in Quantum Computation (量子情報理論とその応用論文小特集)
TL;DR: Enter qubits and quantum registers: Qubits, gates and networks, chapter 1.1.1, which describes how to represent binary strings using quantum registers.
High-fidelity entanglement swapping with fully independent sources
TL;DR: In this paper, the authors demonstrate entanglement swapping with time-synchronized independent sources with a fidelity that is high enough to violate a Clauser-Horne-Shimony-Holt inequality by more than four standard deviations.
Journal ArticleDOI
Quantum Entanglement Concentration Based on Nonlinear Optics for Quantum Communications
Yu-Bo Sheng,Lan Zhou +1 more
TL;DR: Two kinds of entanglement concentration protocols are described, one is to concentrate the partially entangled Bell-state, and the other is to Concentrate the fully entangled W state.
Journal ArticleDOI
Highly efficient entanglement swapping and teleportation at telecom wavelength
TL;DR: In this article, the authors used two ultra-bright entangled photon sources and four highly efficient superconducting nanowire single photon detectors to achieve a fourfold coincidence count rate of 108 counts per second, which is three orders higher than previous experiments at telecom wavelengths.
Journal ArticleDOI
Semiquantum key distribution without invoking the classical party's measurement capability
TL;DR: It is proved that the proposed SQKD protocol is completely robust against joint attacks, and the number of the quantum states sent by Alice and Bob is decreased.