scispace - formally typeset
Journal ArticleDOI

Quantum cryptography based on Bell's theorem.

Artur Ekert
- 05 Aug 1991 - 
- Vol. 67, Iss: 6, pp 661-663
TLDR
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported, based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment andBells theorem is used to test for eavesdropping.
Abstract
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment and Bells theorem is used to test for eavesdropping. © 1991 The American Physical Society.

read more

Citations
More filters
Journal ArticleDOI

Nobel Lecture: Controlling photons in a box and exploring the quantum to classical boundary

TL;DR: The experiments performed with this ''photon box'' at Ecole Normale Superieure (ENS) belong to the domain of quantum optics called ''cavity quantum electrodynamics'' as discussed by the authors, and have led to the demonstration of basic steps in quantum information processing, including the deterministic entanglement of atoms and the realization of quantum gates using atoms and photons as quantum bits.
Journal ArticleDOI

Quantum Teleportation Between Distant Matter Qubits

TL;DR: A quantum bit stored in a single trapped ytterbium ion (Yb+) is teleported to a second Yb+ atom with an average fidelity of 90% over a replete set of states.
Journal ArticleDOI

Fully device-independent quantum key distribution.

TL;DR: This work rigorously proves the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks, and achieves a linear key rate and tolerates a constant noise rate in the devices.
Journal ArticleDOI

All-photonic quantum repeaters

TL;DR: This work presents a protocol based on photonic cluster-state machine guns and a loss-tolerant measurement equipped with local high-speed active feedforwards and shows that, with such all-photonic quantum repeaters, the communication efficiency scales polynomially with the channel distance.
Journal ArticleDOI

Controlled order rearrangement encryption for quantum key distribution

TL;DR: In this paper, the order rearrangement operation in both parties is controlled by a prior shared control key, which is used repeatedly in a quantum key distribution session, so that Eve cannot steal useful information.