Quantum cryptography based on Bell’s theorem
- 5 August 1991
- journal article
- research article
- Published by American Physical Society (APS) in Physical Review Letters
- Vol. 67 (6), 661-663
- https://doi.org/10.1103/physrevlett.67.661
Abstract
Practical application of the generalized Bell’s theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohm’s version of the Einstein-Podolsky-Rosen gedanken experiment and Bell’s theorem is used to test for eavesdropping.Keywords
This publication has 9 references indexed in Scilit:
- Experimental quantum cryptography: the dawn of a new era for quantum cryptography: the experimental prototype is working]ACM SIGACT News, 1989
- Quantum computational networksProceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences, 1989
- Quantum theory, the Church–Turing principle and the universal quantum computerProceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences, 1985
- Conjugate codingACM SIGACT News, 1983
- Experimental Test of Bell's Inequalities Using Time- Varying AnalyzersPhysical Review Letters, 1982
- Experimental Realization of Einstein-Podolsky-Rosen-BohmGedankenexperiment: A New Violation of Bell's InequalitiesPhysical Review Letters, 1982
- Proposed Experiment to Test Local Hidden-Variable TheoriesPhysical Review Letters, 1969
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949
- Can Quantum-Mechanical Description of Physical Reality Be Considered Complete?Physical Review B, 1935