Journal ArticleDOI
Quantum cryptography based on Bell's theorem.
TLDR
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported, based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment andBells theorem is used to test for eavesdropping.Abstract:
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment and Bells theorem is used to test for eavesdropping. © 1991 The American Physical Society.read more
Citations
More filters
Journal ArticleDOI
The impact of quantum computing on present cryptography
TL;DR: The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms.
Journal ArticleDOI
Decoy-state protocol for quantum cryptography with four different intensities of coherent light
TL;DR: An efficient decoy-state protocol for practical quantum key distribution using coherent states that uses four intensities of different coherent light to achieve a good final key rate.
Journal ArticleDOI
Mutually unbiased binary observable sets on N qubits
TL;DR: In this paper, it was shown that the set of Pauli operators in the Hilbert space of N qubits can be partitioned into two distinct subsets, each consisting of a different set of internally commuting observables, and each such partitioning defines a unique choice of mutually unbiased basis sets in the N-qubit Hilbert space.
Journal ArticleDOI
Coexistence of high-bit-rate quantum key distribution and data on optical fiber
K. A. Patel,K. A. Patel,James F. Dynes,Iris Choi,Andrew W. Sharpe,Alex Dixon,Zhiliang Yuan,Richard V. Penty,Andrew J. Shields +8 more
TL;DR: This work exploits a novel temporal-filtering effect for noisephoton rejection that allows high-bit-rate QKD over fibers up to 90 km in length and populated with error-free bidirectional Gb=s data communications.
Journal ArticleDOI
Security analysis and improvements of arbitrated quantum signature schemes
TL;DR: This work presents another AQS scheme without utilizing entangled states in the signing phase and the verifying phase, which has three advantages: it does not utilize entangled states and it preserves all merits in the existing schemes; the signature can avoid being disavowed by the receiver; and it provides a higher efficiency in transmission and reduces the complexity of implementation.