Publication | Closed Access
Quantum cryptography without Bell’s theorem
2.4K
Citations
9
References
1992
Year
Cryptographic PrimitiveEngineeringInformation SecurityCryptographic TechnologyQuantum ComputingQuantum EntanglementCryptanalysisQuantum Key DistributionQuantum ScienceQuantum CryptographyQuantum SecurityQuantum InformationData PrivacyProbability TheorySingle ParticlesData SecurityCryptographyCryptographic SchemeQuantum DevicesFake Epr Source
Ekert has described a cryptographic scheme in which Einstein-Podolsky-Rosen (EPR) pairs of particles are used to generate identical random numbers in remote places, while Bell's theorem certifies that the particles have not been measured in transit by an eavesdropper. We describe a related but simpler EPR scheme and, without invoking Bell's theorem, prove it secure against more general attacks, including substitution of a fake EPR source. Finally we show our scheme is equivalent to the original 1984 key distribution scheme of Bennett and Brassard, which uses single particles instead of EPR pairs.
| Year | Citations | |
|---|---|---|
Page 1
Page 1