scispace - formally typeset
Journal ArticleDOI

Quantum cryptography based on Bell's theorem.

Artur Ekert
- 05 Aug 1991 - 
- Vol. 67, Iss: 6, pp 661-663
TLDR
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported, based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment andBells theorem is used to test for eavesdropping.
Abstract
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment and Bells theorem is used to test for eavesdropping. © 1991 The American Physical Society.

read more

Citations
More filters
Journal ArticleDOI

Single-photon sources

TL;DR: In this article, the authors survey the state-of-the-art in the design, development and application of devices for deterministically generating single photons on demand, both the defined function and the requisite form of such sources are explained in detail.
Journal ArticleDOI

Quantum cryptography with twisted photons through an outdoor underwater channel.

TL;DR: The effect of turbulence on an underwater quantum channel using twisted photons in outdoor conditions is investigated, and different quantum cryptographic protocols in an underwaterquantum channel are compared, showing the feasibility of high-dimensional encoding schemes.
Journal ArticleDOI

Communication channels secured from eavesdropping via transmission of photonic Bell states

TL;DR: A quantum communication scheme for sending a definite binary sequence while confirming the security of the transmission and a pair of entangled photon twins is employed as a bit carrier which is encoded in a two-term superposition of four Bell states.
Journal ArticleDOI

Trusted Noise in Continuous-Variable Quantum Key Distribution: A Threat and a Defense

Vladyslav C. Usenko, +1 more
- 05 Jan 2016 - 
TL;DR: In this paper, the role of phase-insensitive trusted preparation and detection noise in the security of a continuous-variable quantum key distribution is discussed. But the authors do not consider the effect of such a noise on the security properties of Gaussian quantum cryptography, due to a strongly nonlinear behavior of the quantum entropies involved in security analysis.
Journal ArticleDOI

Quantum vernam cipher

TL;DR: Parts of secure quantum communication are discussed by proposing and analyzing a quantum analog of the Vernam cipher (one-time-pad), which shows that key recycling is intrinsic to the quantum cipher-text, rather than using entanglement as the key.