Abstract
Quantum cryptography [1, 2] exploits the fundamental properties of quantum complementarity to allow two remote parties, Alice and Bob, to generate a shared random bit sequence that is provably secret.
© 1999 Optical Society of America
PDF ArticleMore Like This
Boris A. Slutsky, R. Rao, L. Tancevski, P. C. Sun, and Y. Fainman
OWC.2 Optics in Computing (IP) 1997
D Deutsch, A Ekert, R Jozsa, C Macchiavello, and S Popescu
FK2 International Quantum Electronics Conference (IQEC) 1996
D.S. Bethune and W.P. Risk
QThJ1 Quantum Electronics and Laser Science Conference (CLEO:FS) 2000