scispace - formally typeset
Journal ArticleDOI

Quantum cryptography based on Bell's theorem.

Artur Ekert
- 05 Aug 1991 - 
- Vol. 67, Iss: 6, pp 661-663
TLDR
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported, based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment andBells theorem is used to test for eavesdropping.
Abstract
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment and Bells theorem is used to test for eavesdropping. © 1991 The American Physical Society.

read more

Citations
More filters
Journal ArticleDOI

The improved Bostrom-Felbinger protocol against attacks without eavesdropping

TL;DR: In the improved protocol, when the photon travels from the message receiver's site to the message sender's site, any attack can be detected in the control mode, and it is deterministically successful to transmit the secret messages in the message mode.
Journal ArticleDOI

Recyclable amplification protocol for the single-photon entangled state

TL;DR: A highly efficient recyclable amplification protocol for protecting the single-photon entangled state that can be reused to increase the success probability and the distilled new mixed state can be further amplified in a next round to increase its fidelity.
Journal ArticleDOI

Improved Wójcik's eavesdropping attack on ping-pong protocol without eavesdropping-induced channel loss

TL;DR: The eavesdropping scheme proposed by Wojcik on the ping-pong protocol is improved by constituting a new set of attack operations and has a zero eavesdropping-induced channel loss and produces perfect anticorrelation.
Journal ArticleDOI

Fast generation of three-atom singlet state by transitionless quantum driving

TL;DR: The results reveal that the scheme is fast and robust against decoherence and operational imperfection, and how to select the experimental parameters to control the cavity dissipation and atomic spontaneous emission will have an application value in experiment is investigated.

Brief History of Quantum Cryptography: A Personal Perspective (Invited Paper)

TL;DR: Wiesner and Bennett as discussed by the authors used quantum cryptography to make banknotes that would be impossible to counterfeit according to the laws of nature, as well as a "quantum multiplexing" channel, which would allow one party to send two messages to another in a way that the receiving party could decide which message to read but only at the cost of destroying the other message irreversibly.