Please use this identifier to cite or link to this item:
https://doi.org/10.1098/rsta.2011.0324
DC Field | Value | |
---|---|---|
dc.title | Turing, ciphers and quanta | |
dc.contributor.author | Ekert, A. | |
dc.contributor.author | Kay, A. | |
dc.contributor.author | Pope, J. | |
dc.date.accessioned | 2014-11-28T05:02:34Z | |
dc.date.available | 2014-11-28T05:02:34Z | |
dc.date.issued | 2012-07-28 | |
dc.identifier.citation | Ekert, A., Kay, A., Pope, J. (2012-07-28). Turing, ciphers and quanta. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 370 (1971) : 3418-3431. ScholarBank@NUS Repository. https://doi.org/10.1098/rsta.2011.0324 | |
dc.identifier.issn | 1364503X | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/112538 | |
dc.description.abstract | Alan Turing has certainly contributed to a widespread belief that the quest for a perfect, unbreakable, cipher is a futile pursuit. The ancient art of concealing information has, in the past, been matched by the ingenuity of code-breakers, but no longer! With the advent of quantum cryptography, the hopes of would-be eavesdroppers have been dashed, perhaps for good. Moreover, recent research, building on schemes that were invented decades ago to perform quantum cryptography, shows that secure communication certified by a sufficient violation of a Bell inequality makes a seemingly insane scenario possible-devices of unknown or dubious provenance, even those that are manufactured by our enemies, can be safely used for secure communication, including key distribution. All that is needed to implement this bizarre and powerful form of cryptography is a loophole-free test of a Bell inequality, which is on the cusp of technological feasibility. We provide a brief overview of the intriguing connections between Bell inequalities and cryptography and describe how studies of quantum entanglement and the foundations of quantum theory influence the way we may protect information in the future. This journal is © 2012 The Royal Society. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1098/rsta.2011.0324 | |
dc.source | Scopus | |
dc.subject | Key distribution | |
dc.subject | Non-locality | |
dc.subject | Quantum cryptography | |
dc.type | Article | |
dc.contributor.department | CENTRE FOR QUANTUM TECHNOLOGIES | |
dc.contributor.department | PHYSICS | |
dc.description.doi | 10.1098/rsta.2011.0324 | |
dc.description.sourcetitle | Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences | |
dc.description.volume | 370 | |
dc.description.issue | 1971 | |
dc.description.page | 3418-3431 | |
dc.identifier.isiut | 000306172800009 | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.