Skip to main content

Quantum Cryptography and Bell’s Theorem

  • Chapter
Quantum Measurements in Optics

Part of the book series: NATO ASI Series ((NSSB,volume 282))

Abstract

In this article, I would like to show you a glimpse of beauty which one can easily find in the union of cryptography and quantum theory. So this is a story about quanta and ciphers. I will show how quantum mechanics protects the so-called key distribution process in cryptography. The proposed scheme is based on the well-known Bohm’s version of the Einstein-Podolsky-Rosen gedankenexperiment 1,2; the generalized Bell’s theorem (Clauser - Horne - Shimony - Holt inequalities)3,4 is used to test for eavesdropping. However, before I proceed any further, let me start with some historical remarks followed by some basic notions of cryptography.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. A. Einstein, B. Podolsky and N. Rosen, Phys.Rev. 47: 777 (1935).

    Article  MATH  Google Scholar 

  2. D. Bohm, Quantum Theory Prentice-Hall, Englewood Cliffs, N.J.,(1951).

    Google Scholar 

  3. J.S. Bell, Physics (N.Y.) 1: 195 (1965).

    Google Scholar 

  4. J.F. Clauser, M.A. Horne, A. Shimony, and R.A. Holt, Phys.Rev.Lett. 23: 880, (1969).

    Article  Google Scholar 

  5. C.E. Shannon, Bell Syst.Tech.Journ. 28: 656 (1949).

    MathSciNet  MATH  Google Scholar 

  6. C.H. Bennett and G. Brassard, SIGACT News 20: 78 (1989).

    Article  Google Scholar 

  7. A.K.Ekert, Ph.D. Thesis Oxford University (in preparartion).

    Google Scholar 

  8. A. Aspect, P. Grangier, and G. Roger, Phys.Rev.Lett. 49: 91 (1982).

    Article  Google Scholar 

  9. A. Aspect, J. Dalibard, and G. Roger, Phys.Rev.Lett. 49: 1804 (1982).

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1992 Springer Science+Business Media New York

About this chapter

Cite this chapter

Ekert, A.K. (1992). Quantum Cryptography and Bell’s Theorem. In: Tombesi, P., Walls, D.F. (eds) Quantum Measurements in Optics. NATO ASI Series, vol 282. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-3386-3_34

Download citation

  • DOI: https://doi.org/10.1007/978-1-4615-3386-3_34

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4613-6495-5

  • Online ISBN: 978-1-4615-3386-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics