Abstract
Quantum cryptography [1, 2] exploits the fundamental properties of quantum complementarity to allow two remote parties, Alice and Bob, to generate a shared random bit sequence that is provably secret.
© 1999 Optical Society of America
PDF ArticleMore Like This
D Deutsch, A Ekert, R Jozsa, C Macchiavello, and S Popescu
FK2 International Quantum Electronics Conference (IQEC) 1996
D.S. Bethune and W.P. Risk
QThJ1 Quantum Electronics and Laser Science Conference (QELS) 2000
Yaron Bromberg, Brandon Redding, Sebastien M. Popoff, Nissim Ofek, and Hui Cao
FTh1C.4 Frontiers in Optics (FiO) 2014