Journal ArticleDOI
Quantum cryptography based on Bell's theorem.
TLDR
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported, based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment andBells theorem is used to test for eavesdropping.Abstract:
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment and Bells theorem is used to test for eavesdropping. © 1991 The American Physical Society.read more
Citations
More filters
Journal ArticleDOI
Nobel Lecture: Controlling photons in a box and exploring the quantum to classical boundary
TL;DR: The experiments performed with this ''photon box'' at Ecole Normale Superieure (ENS) belong to the domain of quantum optics called ''cavity quantum electrodynamics'' as discussed by the authors, and have led to the demonstration of basic steps in quantum information processing, including the deterministic entanglement of atoms and the realization of quantum gates using atoms and photons as quantum bits.
Journal ArticleDOI
Quantum Teleportation Between Distant Matter Qubits
TL;DR: A quantum bit stored in a single trapped ytterbium ion (Yb+) is teleported to a second Yb+ atom with an average fidelity of 90% over a replete set of states.
Journal ArticleDOI
Fully device-independent quantum key distribution.
Umesh Vazirani,Thomas Vidick +1 more
TL;DR: This work rigorously proves the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks, and achieves a linear key rate and tolerates a constant noise rate in the devices.
Journal ArticleDOI
All-photonic quantum repeaters
TL;DR: This work presents a protocol based on photonic cluster-state machine guns and a loss-tolerant measurement equipped with local high-speed active feedforwards and shows that, with such all-photonic quantum repeaters, the communication efficiency scales polynomially with the channel distance.
Journal ArticleDOI
Controlled order rearrangement encryption for quantum key distribution
Fe-Guo Deng,Gui-Lu Long +1 more
TL;DR: In this paper, the order rearrangement operation in both parties is controlled by a prior shared control key, which is used repeatedly in a quantum key distribution session, so that Eve cannot steal useful information.