QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM

被引:8215
|
作者
EKERT, AK [1 ]
机构
[1] UNIV OXFORD, DEPT PHYS, OXFORD OX1 3PU, ENGLAND
关键词
D O I
10.1103/PhysRevLett.67.661
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Practical application of the generalized Bell's theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohm's version of the Einstein-Podolsky-Rosen gedanken experiment and Bell's theorem is used to test for eavesdropping.
引用
收藏
页码:661 / 663
页数:3
相关论文
共 50 条
  • [1] QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM
    BENNETT, CH
    BRASSARD, G
    MERMIN, ND
    PHYSICAL REVIEW LETTERS, 1992, 68 (05) : 557 - 559
  • [2] Deterministic and efficient quantum cryptography based on Bell's theorem
    Chen, Zeng-Bing
    Zhang, Qiang
    Bao, Xiao-Hui
    Schmiedmayer, Joerg
    Pan, Jian-Wei
    PHYSICAL REVIEW A, 2006, 73 (05):
  • [3] Experimenter's freedom in Bell's theorem and quantum cryptography
    Kofler, J
    Paterek, T
    Brukner, C
    PHYSICAL REVIEW A, 2006, 73 (02):
  • [4] Quantum cryptography based on qutrit Bell inequalities
    Kaszlikowski, D
    Oi, DKL
    Christandl, M
    Chang, K
    Ekert, A
    Kwek, LC
    Oh, CH
    PHYSICAL REVIEW A, 2003, 67 (01):
  • [5] Quantum cryptography based on qutrit Bell inequalities
    Kaszlikowski, Dagomir
    Oi, D.K.L.
    Christandl, Matthias
    Chang, Kelken
    Ekert, Artur
    Kwek, L.C.
    Oh, C.H.
    Physical Review A - Atomic, Molecular, and Optical Physics, 2003, 67 (01): : 1 - 012310
  • [6] Multidimensional Bell Inequalities and Quantum Cryptography
    Arnault, Francois
    CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 3 - 13
  • [7] ON A FUNDAMENTAL THEOREM OF QUANTUM CRYPTOGRAPHY
    BLOW, KJ
    PHOENIX, SJD
    JOURNAL OF MODERN OPTICS, 1993, 40 (01) : 33 - 36
  • [8] Arithmetic Loophole in Bell's Theorem: Overlooked Threat to Entangled-State Quantum Cryptography
    Czachor, M.
    ACTA PHYSICA POLONICA A, 2021, 139 (01) : 70 - 83
  • [9] A practical trojan horse for bell-inequality-based quantum cryptography
    Larsson, JÅ
    QUANTUM INFORMATION & COMPUTATION, 2002, 2 (06) : 434 - 442
  • [10] A practical trojan horse for bell-inequality-based quantum cryptography
    Larsson, Jan-Åke
    Quantum Information and Computation, 2002, 2 (06): : 434 - 442