# Quantum cryptography based on Bell's theorem.

@article{Ekert1991QuantumCB, title={Quantum cryptography based on Bell's theorem.}, author={Ekert}, journal={Physical review letters}, year={1991}, volume={67 6}, pages={ 661-663 } }

Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment and Bells theorem is used to test for eavesdropping. © 1991 The American Physical Society.

## Topics from this paper

## 7,306 Citations

Quantum cryptography based on qutrit Bell inequalities

- Physics
- 2003

We present a cryptographic protocol based upon entangled qutrit pairs. We analyze the scheme under a symmetric incoherent attack and plot the region for which the protocol is secure and compare this…

Quantum cryptography based on wheeler's delayed choice experiment

- Physics, Computer Science
- 1995

A cryptographic protocol in which Wheeler's delayed choice experiment is used to generate the key distribution is described, which uses photons polarized only along one axis and is secure against general attacks.

On A Fundamental Theorem of Quantum Cryptography

- Physics
- 1993

Abstract A fundamental theorem of quantum cryptography is proved which states the conditions under which an eavesdropper can be detected. A corollary of this theorem is that any two-alphabet quantum…

Bell's Inequality and Rejected-data Protocols for Quantum Cryptography

- Physics
- 1993

Abstract We introduce a suitably constructed Bell inequality as a test of the integrity of a single-particle quantum cryptography scheme.

Security of EPR-based quantum cryptography against incoherent symmetric attacks

- Mathematics, Physics
- 2001

We investigate a new strategy for incoherent eavesdropping in Ekert's entanglement-based quantum key distribution protocol. We show that under certain assumptions of symmetry the effectiveness of…

Quantum cryptography without public announcement of bases

- Computer Science, Physics
- 1997

A simple variation of the basic ideas of the BB84 quantum cryptographic scheme leading to a method of key expansion against incoherent attacks by Eve, using the bases sequence repeatedly is proven to be safe by quantum mechanical laws.

Multidimensional Bell Inequalities and Quantum Cryptography

- Computer ScienceC2SI
- 2015

The main cryptographic quantum protocols are key distribution schemes, in which two parties generate a shared random secret string and the privacy of the key can be checked using Bell inequalities.

Efficient multiuser quantum cryptography network based on entanglement

- Computer Science, MedicineScientific reports
- 2017

An efficient quantum key distribution protocol with a certain entangled state to solve a special cryptographic task and a proof of security of this protocol is provided by generalizing the proof of modified of Lo-Chau scheme.

Quantum cryptography based on interaction-free measurement

- Physics
- 1999

Abstract We present a new quantum key distribution model based on interaction-free measurement. The security against two intercept/resend eavesdropping strategies in ideal channel and device is…

Quantum Cryptography - The Issue of Security in Selected Quantum Protocols and the Issue of Data Credibility

- Computer Science
- 2010

The present paper presents the possibilities of using quantum mechanics in cryptography and considers whether there are any practical solutions to the important class of problems regarding the security of transmitted information.