scispace - formally typeset
Journal ArticleDOI

Quantum cryptography based on Bell's theorem.

Artur Ekert
- 05 Aug 1991 - 
- Vol. 67, Iss: 6, pp 661-663
TLDR
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported, based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment andBells theorem is used to test for eavesdropping.
Abstract
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment and Bells theorem is used to test for eavesdropping. © 1991 The American Physical Society.

read more

Citations
More filters
Journal ArticleDOI

The impact of quantum computing on present cryptography

TL;DR: The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms.
Journal ArticleDOI

Decoy-state protocol for quantum cryptography with four different intensities of coherent light

Xiang-Bin Wang
- 20 Jul 2005 - 
TL;DR: An efficient decoy-state protocol for practical quantum key distribution using coherent states that uses four intensities of different coherent light to achieve a good final key rate.
Journal ArticleDOI

Mutually unbiased binary observable sets on N qubits

TL;DR: In this paper, it was shown that the set of Pauli operators in the Hilbert space of N qubits can be partitioned into two distinct subsets, each consisting of a different set of internally commuting observables, and each such partitioning defines a unique choice of mutually unbiased basis sets in the N-qubit Hilbert space.
Journal ArticleDOI

Coexistence of high-bit-rate quantum key distribution and data on optical fiber

TL;DR: This work exploits a novel temporal-filtering effect for noisephoton rejection that allows high-bit-rate QKD over fibers up to 90 km in length and populated with error-free bidirectional Gb=s data communications.
Journal ArticleDOI

Security analysis and improvements of arbitrated quantum signature schemes

TL;DR: This work presents another AQS scheme without utilizing entangled states in the signing phase and the verifying phase, which has three advantages: it does not utilize entangled states and it preserves all merits in the existing schemes; the signature can avoid being disavowed by the receiver; and it provides a higher efficiency in transmission and reduces the complexity of implementation.