Journal ArticleDOI
Quantum cryptography based on Bell's theorem.
TLDR
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported, based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment andBells theorem is used to test for eavesdropping.Abstract:
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment and Bells theorem is used to test for eavesdropping. © 1991 The American Physical Society.read more
Citations
More filters
Journal ArticleDOI
The improved Bostrom-Felbinger protocol against attacks without eavesdropping
TL;DR: In the improved protocol, when the photon travels from the message receiver's site to the message sender's site, any attack can be detected in the control mode, and it is deterministically successful to transmit the secret messages in the message mode.
Journal ArticleDOI
Recyclable amplification protocol for the single-photon entangled state
Lan Zhou,Yu-Bo Sheng +1 more
TL;DR: A highly efficient recyclable amplification protocol for protecting the single-photon entangled state that can be reused to increase the success probability and the distilled new mixed state can be further amplified in a next round to increase its fidelity.
Journal ArticleDOI
Improved Wójcik's eavesdropping attack on ping-pong protocol without eavesdropping-induced channel loss
TL;DR: The eavesdropping scheme proposed by Wojcik on the ping-pong protocol is improved by constituting a new set of attack operations and has a zero eavesdropping-induced channel loss and produces perfect anticorrelation.
Journal ArticleDOI
Fast generation of three-atom singlet state by transitionless quantum driving
TL;DR: The results reveal that the scheme is fast and robust against decoherence and operational imperfection, and how to select the experimental parameters to control the cavity dissipation and atomic spontaneous emission will have an application value in experiment is investigated.
Brief History of Quantum Cryptography: A Personal Perspective (Invited Paper)
TL;DR: Wiesner and Bennett as discussed by the authors used quantum cryptography to make banknotes that would be impossible to counterfeit according to the laws of nature, as well as a "quantum multiplexing" channel, which would allow one party to send two messages to another in a way that the receiving party could decide which message to read but only at the cost of destroying the other message irreversibly.