Journal ArticleDOI
Quantum cryptography based on Bell's theorem.
TLDR
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported, based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment andBells theorem is used to test for eavesdropping.Abstract:
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment and Bells theorem is used to test for eavesdropping. © 1991 The American Physical Society.read more
Citations
More filters
Journal ArticleDOI
Pure single photons from a trapped atom source
Daniel B. Higginbottom,Daniel B. Higginbottom,L. Slodička,Gabriel Araneda,Lukáš Lachman,Radim Filip,Markus Hennrich,Rainer Blatt,Rainer Blatt +8 more
TL;DR: The work reported in this paper has been supported by the Austrian Science Fund FWF (SINFONIA, SFB FoQuS), by the European Union (CRYTERION #227959), and by the Institut fur Quanteninformation GmbH.
Journal ArticleDOI
Nonclassical Correlations from Randomly Chosen Local Measurements
TL;DR: This work provides a feasible alternative for the demonstration of Bell inequality violation without a shared reference frame and shows that correlations inconsistent with any locally causal description can be a generic feature of measurements on entangled quantum states.
Journal Article
The algebra of entanglement and the geometry of composition
TL;DR: The ZW calculus is presented, the first complete diagrammatic axiomatisation of the theory of qubits, and a notion of regular polygraph is proposed, barring cell boundaries that are not homeomorphic to a disk of the appropriate dimension, and the existence of weak units is equivalent to a representability property.
Journal ArticleDOI
Full Security of Quantum Key Distribution From No-Signaling Constraints
TL;DR: A cryptographic protocol for generating a distributed secret key from correlations that violate a Bell inequality by a sufficient amount is analyzed, and its security against eavesdroppers is proved, constrained only by the assumption that any information accessible to them must be compatible with the non-signaling principle.
Journal ArticleDOI
Limitations on Quantum Key Repeaters
TL;DR: In this article, the authors introduce and study quantum key repeaters, devices which may allow long-distance quantum key distribution with non-distillable states, but they exhibit fundamental limits on such a device in the form of bounds on the rate at which it may extract secure key.