scispace - formally typeset
Journal ArticleDOI

Quantum cryptography based on Bell's theorem.

Artur Ekert
- 05 Aug 1991 - 
- Vol. 67, Iss: 6, pp 661-663
TLDR
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported, based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment andBells theorem is used to test for eavesdropping.
Abstract
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment and Bells theorem is used to test for eavesdropping. © 1991 The American Physical Society.

read more

Citations
More filters
Journal ArticleDOI

Security of device-independent quantum key distribution in the bounded-quantum-storage model

TL;DR: A new security proof for device-independent quantum key distribution tolerates realistic noise levels, uses only two devices, and broadens the security certification to the test of any Bell inequality.
Journal ArticleDOI

Environment and classical channels in categorical quantum mechanics

TL;DR: A both simple and comprehensive graphical calculus for quantum computing is presented that axiomatize the notion of an environment, which together with the earlier introduced axiomatic notion of classical structure enables to define classical channels, quantum measurements and classical control.
Book ChapterDOI

Environment and classical channels in categorical quantum mechanics

TL;DR: A both simple and comprehensive graphical calculus for quantum computing is presented, which axiomatize the notion of an environment, which together with the axiomatic notion of classical structure enables to define classical channels, quantum measurements and classical control.
Journal ArticleDOI

Secret sharing of a known arbitrary quantum state with noisy environment

TL;DR: This research connects the areas of quantum state sharing and remote state preparation with noisy environment and shows that the secret state can be shared among agents with some information lost.
Journal ArticleDOI

Multi-party quantum private comparison protocol based on $$d$$d-dimensional entangled states

TL;DR: A novel quantum private comparison protocol with l-party and d-dimensional entangled states is proposed and it is shown that the participants will not leak their private information by security analysis.