Quantum cryptography based on Bell's theorem.

@article{Ekert1991QuantumCB,
  title={Quantum cryptography based on Bell's theorem.},
  author={Ekert},
  journal={Physical review letters},
  year={1991},
  volume={67 6},
  pages={
          661-663
        }
}
  • Ekert
  • Published 5 August 1991
  • Computer Science, Medicine
  • Physical review letters
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment and Bells theorem is used to test for eavesdropping. © 1991 The American Physical Society. 
Quantum cryptography based on qutrit Bell inequalities
We present a cryptographic protocol based upon entangled qutrit pairs. We analyze the scheme under a symmetric incoherent attack and plot the region for which the protocol is secure and compare thisExpand
Quantum cryptography based on wheeler's delayed choice experiment
TLDR
A cryptographic protocol in which Wheeler's delayed choice experiment is used to generate the key distribution is described, which uses photons polarized only along one axis and is secure against general attacks. Expand
On A Fundamental Theorem of Quantum Cryptography
Abstract A fundamental theorem of quantum cryptography is proved which states the conditions under which an eavesdropper can be detected. A corollary of this theorem is that any two-alphabet quantumExpand
Bell's Inequality and Rejected-data Protocols for Quantum Cryptography
Abstract We introduce a suitably constructed Bell inequality as a test of the integrity of a single-particle quantum cryptography scheme.
Security of EPR-based quantum cryptography against incoherent symmetric attacks
We investigate a new strategy for incoherent eavesdropping in Ekert's entanglement-based quantum key distribution protocol. We show that under certain assumptions of symmetry the effectiveness ofExpand
Quantum cryptography without public announcement of bases
TLDR
A simple variation of the basic ideas of the BB84 quantum cryptographic scheme leading to a method of key expansion against incoherent attacks by Eve, using the bases sequence repeatedly is proven to be safe by quantum mechanical laws. Expand
Multidimensional Bell Inequalities and Quantum Cryptography
TLDR
The main cryptographic quantum protocols are key distribution schemes, in which two parties generate a shared random secret string and the privacy of the key can be checked using Bell inequalities. Expand
Efficient multiuser quantum cryptography network based on entanglement
TLDR
An efficient quantum key distribution protocol with a certain entangled state to solve a special cryptographic task and a proof of security of this protocol is provided by generalizing the proof of modified of Lo-Chau scheme. Expand
Quantum cryptography based on interaction-free measurement
Abstract We present a new quantum key distribution model based on interaction-free measurement. The security against two intercept/resend eavesdropping strategies in ideal channel and device isExpand
Quantum Cryptography - The Issue of Security in Selected Quantum Protocols and the Issue of Data Credibility
TLDR
The present paper presents the possibilities of using quantum mechanics in cryptography and considers whether there are any practical solutions to the important class of problems regarding the security of transmitted information. Expand
...
1
2
3
4
5
...