Quantum cryptography without Bell’s theorem
- 3 February 1992
- journal article
- research article
- Published by American Physical Society (APS) in Physical Review Letters
- Vol. 68 (5) , 557-559
- https://doi.org/10.1103/physrevlett.68.557
Abstract
Ekert has described a cryptographic scheme in which Einstein-Podolsky-Rosen (EPR) pairs of particles are used to generate identical random numbers in remote places, while Bell’s theorem certifies that the particles have not been measured in transit by an eavesdropper. We describe a related but simpler EPR scheme and, without invoking Bell’s theorem, prove it secure against more general attacks, including substitution of a fake EPR source. Finally we show our scheme is equivalent to the original 1984 key distribution scheme of Bennett and Brassard, which uses single particles instead of EPR pairs.Keywords
This publication has 10 references indexed in Scilit:
- Experimental quantum cryptographyJournal of Cryptology, 1992
- Quantum cryptography based on Bell’s theoremPhysical Review Letters, 1991
- Quantum theory, the Church–Turing principle and the universal quantum computerProceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences, 1985
- Conjugate codingACM SIGACT News, 1983
- Procedures in Quantum Mechanics without Von Neumann's Projection AxiomJournal of Mathematical Physics, 1972
- Decision Procedures in Quantum MechanicsJournal of Mathematical Physics, 1972
- Operator Valued Measures in Quantum Mechanics: Finite and Infinite ProcessesJournal of Mathematical Physics, 1972
- An operational approach to quantum probabilityCommunications in Mathematical Physics, 1970
- Proposed Experiment to Test Local Hidden-Variable TheoriesPhysical Review Letters, 1969
- Can Quantum-Mechanical Description of Physical Reality Be Considered Complete?Physical Review B, 1935