scispace - formally typeset
Journal ArticleDOI

Quantum cryptography based on Bell's theorem.

Artur Ekert
- 05 Aug 1991 - 
- Vol. 67, Iss: 6, pp 661-663
TLDR
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported, based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment andBells theorem is used to test for eavesdropping.
Abstract
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment and Bells theorem is used to test for eavesdropping. © 1991 The American Physical Society.

read more

Citations
More filters
Journal ArticleDOI

Pure single photons from a trapped atom source

TL;DR: The work reported in this paper has been supported by the Austrian Science Fund FWF (SINFONIA, SFB FoQuS), by the European Union (CRYTERION #227959), and by the Institut fur Quanteninformation GmbH.
Journal ArticleDOI

Nonclassical Correlations from Randomly Chosen Local Measurements

TL;DR: This work provides a feasible alternative for the demonstration of Bell inequality violation without a shared reference frame and shows that correlations inconsistent with any locally causal description can be a generic feature of measurements on entangled quantum states.
Journal Article

The algebra of entanglement and the geometry of composition

TL;DR: The ZW calculus is presented, the first complete diagrammatic axiomatisation of the theory of qubits, and a notion of regular polygraph is proposed, barring cell boundaries that are not homeomorphic to a disk of the appropriate dimension, and the existence of weak units is equivalent to a representability property.
Journal ArticleDOI

Full Security of Quantum Key Distribution From No-Signaling Constraints

TL;DR: A cryptographic protocol for generating a distributed secret key from correlations that violate a Bell inequality by a sufficient amount is analyzed, and its security against eavesdroppers is proved, constrained only by the assumption that any information accessible to them must be compatible with the non-signaling principle.
Journal ArticleDOI

Limitations on Quantum Key Repeaters

TL;DR: In this article, the authors introduce and study quantum key repeaters, devices which may allow long-distance quantum key distribution with non-distillable states, but they exhibit fundamental limits on such a device in the form of bounds on the rate at which it may extract secure key.