scispace - formally typeset
Journal ArticleDOI

Quantum cryptography based on Bell's theorem.

Artur Ekert
- 05 Aug 1991 - 
- Vol. 67, Iss: 6, pp 661-663
TLDR
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported, based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment andBells theorem is used to test for eavesdropping.
Abstract
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment and Bells theorem is used to test for eavesdropping. © 1991 The American Physical Society.

read more

Citations
More filters

Basic Concepts in Quantum Computation (量子情報理論とその応用論文小特集)

Artur Ekert
TL;DR: Enter qubits and quantum registers: Qubits, gates and networks, chapter 1.1.1, which describes how to represent binary strings using quantum registers.

High-fidelity entanglement swapping with fully independent sources

TL;DR: In this paper, the authors demonstrate entanglement swapping with time-synchronized independent sources with a fidelity that is high enough to violate a Clauser-Horne-Shimony-Holt inequality by more than four standard deviations.
Journal ArticleDOI

Quantum Entanglement Concentration Based on Nonlinear Optics for Quantum Communications

TL;DR: Two kinds of entanglement concentration protocols are described, one is to concentrate the partially entangled Bell-state, and the other is to Concentrate the fully entangled W state.
Journal ArticleDOI

Highly efficient entanglement swapping and teleportation at telecom wavelength

TL;DR: In this article, the authors used two ultra-bright entangled photon sources and four highly efficient superconducting nanowire single photon detectors to achieve a fourfold coincidence count rate of 108 counts per second, which is three orders higher than previous experiments at telecom wavelengths.
Journal ArticleDOI

Semiquantum key distribution without invoking the classical party's measurement capability

TL;DR: It is proved that the proposed SQKD protocol is completely robust against joint attacks, and the number of the quantum states sent by Alice and Bob is decreased.