scispace - formally typeset
Journal ArticleDOI

Quantum cryptography based on Bell's theorem.

Artur Ekert
- 05 Aug 1991 - 
- Vol. 67, Iss: 6, pp 661-663
TLDR
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported, based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment andBells theorem is used to test for eavesdropping.
Abstract
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment and Bells theorem is used to test for eavesdropping. © 1991 The American Physical Society.

read more

Citations
More filters
Journal ArticleDOI

Towards quantum communications in free-space seawater.

TL;DR: It is experimentally demonstrated that polarization quantum states including general qubits of single photon and entangled states can survive well after travelling through seawater, representing the first step towards underwater quantum communication.
Journal ArticleDOI

Experimental quantum key distribution without monitoring signal disturbance

TL;DR: In this article, a proof-of-principle quantum key distribution experiment based on the round-robin differential phase shift protocol is demonstrated using a coherent wave-packet containing five pulses, the quantum keys were distributed over up to 30 km of fibre.
Journal ArticleDOI

Superlinear threshold detectors in quantum cryptography

TL;DR: In this article, the authors introduced the concept of superlinear threshold detector, a detector that has a higher probability to detect multiple photons if it receives them simultaneously rather than at separate times.
Journal ArticleDOI

Efficient entanglement distribution over 200 kilometers

TL;DR: The first demonstration of entanglement distribution over a record distance of 200 km which is of sufficient fidelity to realize secure communication is reported, and the outlook is extremely promising for real worldEntanglement-based communication between distantly separated parties.
Journal ArticleDOI

Robust Protocols for Securely Expanding Randomness and Distributing Keys Using Untrusted Quantum Devices

TL;DR: The method achieves, for the first time, exponential expansion combined with cryptographic security and noise tolerance, and has the following new features: cryptographic level of security, tolerating a constant level of imprecision in devices, and requiring only unit size quantum memory in devices.