Abstract
In this article, I would like to show you a glimpse of beauty which one can easily find in the union of cryptography and quantum theory. So this is a story about quanta and ciphers. I will show how quantum mechanics protects the so-called key distribution process in cryptography. The proposed scheme is based on the well-known Bohm’s version of the Einstein-Podolsky-Rosen gedankenexperiment 1,2; the generalized Bell’s theorem (Clauser - Horne - Shimony - Holt inequalities)3,4 is used to test for eavesdropping. However, before I proceed any further, let me start with some historical remarks followed by some basic notions of cryptography.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
A. Einstein, B. Podolsky and N. Rosen, Phys.Rev. 47: 777 (1935).
D. Bohm, Quantum Theory Prentice-Hall, Englewood Cliffs, N.J.,(1951).
J.S. Bell, Physics (N.Y.) 1: 195 (1965).
J.F. Clauser, M.A. Horne, A. Shimony, and R.A. Holt, Phys.Rev.Lett. 23: 880, (1969).
C.E. Shannon, Bell Syst.Tech.Journ. 28: 656 (1949).
C.H. Bennett and G. Brassard, SIGACT News 20: 78 (1989).
A.K.Ekert, Ph.D. Thesis Oxford University (in preparartion).
A. Aspect, P. Grangier, and G. Roger, Phys.Rev.Lett. 49: 91 (1982).
A. Aspect, J. Dalibard, and G. Roger, Phys.Rev.Lett. 49: 1804 (1982).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1992 Springer Science+Business Media New York
About this chapter
Cite this chapter
Ekert, A.K. (1992). Quantum Cryptography and Bell’s Theorem. In: Tombesi, P., Walls, D.F. (eds) Quantum Measurements in Optics. NATO ASI Series, vol 282. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-3386-3_34
Download citation
DOI: https://doi.org/10.1007/978-1-4615-3386-3_34
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4613-6495-5
Online ISBN: 978-1-4615-3386-3
eBook Packages: Springer Book Archive