scispace - formally typeset
Journal ArticleDOI

Quantum cryptography based on Bell's theorem.

Artur Ekert
- 05 Aug 1991 - 
- Vol. 67, Iss: 6, pp 661-663
TLDR
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported, based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment andBells theorem is used to test for eavesdropping.
Abstract
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment and Bells theorem is used to test for eavesdropping. © 1991 The American Physical Society.

read more

Citations
More filters
Book ChapterDOI

Categorical quantum mechanics

TL;DR: In this paper, the mathematical foundations of quantum mechanics from a novel point of view are revisited, with the aim of reawakening interest in the foundations of the quantum mechanics.
Journal ArticleDOI

Quantum dialogue revisited

TL;DR: Within the present version two users can securely and simultaneously exchange their secret messages within the entanglement-based quantum dialogue protocol by introducing and randomly choosing two sets of measuring basis.
Journal ArticleDOI

Feasibility of quantum key distribution through a dense wavelength division multiplexing network

TL;DR: In this article, the feasibility of conducting quantum key distribution (QKD) together with classical communication through the same optical fiber by employing dense-wavelength-division-multiplexing (DWDM) technology at telecom wavelength was investigated.
Posted Content

An invitation to Quantum Game Theory

TL;DR: A new application of the Ising chain model is proposed in quantum game theory to extend the scope of game theory for the quantum world.
Journal ArticleDOI

A Three-Stage Quantum Cryptography Protocol

TL;DR: A three-stage quantum cryptographic protocol based on public key cryptography in which each party uses its own secret key, where the communication in the proposed protocol remains quantum in each stage.