Abstract
Practical application of the generalized Bell’s theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohm’s version of the Einstein-Podolsky-Rosen gedanken experiment and Bell’s theorem is used to test for eavesdropping.
- Received 18 April 1991
DOI:https://doi.org/10.1103/PhysRevLett.67.661
©1991 American Physical Society
Collections
This article appears in the following collection:
Letters from the Past - A PRL Retrospective
2008 marked PRL’s 50th anniversary. As part of the celebrations a collection of milestone Letters was started. The collection contains Letters that have made long-lived contributions to physics, either by announcing significant discoveries, or by initiating new areas of research.