The Ekert Protocol. Ilic, N. July 2007.
Paper abstract bibtex A brief history of Quantum Cryptography needed in order to understand the 1991 Ekert protocol is discussed. In particular, the Einstein-Podolsky-Rosen thought experiment and its relation to the Ekert protocol is described. The violation of Bell’s theorem that results from measuring states described by Ekert is explained. Error Correction and Privacy Amplification techniques that are associated with standard protocols are briefly discussed.
@unpublished{ilic_ekert_2007,
title = {The {Ekert} {Protocol}},
url = {http://www.ux1.eiu.edu/~nilic/Nina's-article.pdf},
abstract = {A brief history of Quantum Cryptography needed in order to understand the 1991 Ekert protocol
is discussed. In particular, the Einstein-Podolsky-Rosen thought experiment and its relation to the
Ekert protocol is described. The violation of Bell’s theorem that results from measuring states
described by Ekert is explained. Error Correction and Privacy Amplification techniques that are
associated with standard protocols are briefly discussed.},
author = {Ilic, Nikolina},
month = jul,
year = {2007}
}
Downloads: 0
{"_id":"jQHfsq24rqcfLvQDD","bibbaseid":"ilic-theekertprotocol-2007","authorIDs":[],"author_short":["Ilic, N."],"bibdata":{"bibtype":"unpublished","type":"unpublished","title":"The Ekert Protocol","url":"http://www.ux1.eiu.edu/~nilic/Nina's-article.pdf","abstract":"A brief history of Quantum Cryptography needed in order to understand the 1991 Ekert protocol is discussed. In particular, the Einstein-Podolsky-Rosen thought experiment and its relation to the Ekert protocol is described. The violation of Bell’s theorem that results from measuring states described by Ekert is explained. Error Correction and Privacy Amplification techniques that are associated with standard protocols are briefly discussed.","author":[{"propositions":[],"lastnames":["Ilic"],"firstnames":["Nikolina"],"suffixes":[]}],"month":"July","year":"2007","bibtex":"@unpublished{ilic_ekert_2007,\n\ttitle = {The {Ekert} {Protocol}},\n\turl = {http://www.ux1.eiu.edu/~nilic/Nina's-article.pdf},\n\tabstract = {A brief history of Quantum Cryptography needed in order to understand the 1991 Ekert protocol\nis discussed. In particular, the Einstein-Podolsky-Rosen thought experiment and its relation to the\nEkert protocol is described. The violation of Bell’s theorem that results from measuring states\ndescribed by Ekert is explained. Error Correction and Privacy Amplification techniques that are\nassociated with standard protocols are briefly discussed.},\n\tauthor = {Ilic, Nikolina},\n\tmonth = jul,\n\tyear = {2007}\n}\n\n","author_short":["Ilic, N."],"key":"ilic_ekert_2007","id":"ilic_ekert_2007","bibbaseid":"ilic-theekertprotocol-2007","role":"author","urls":{"Paper":"http://www.ux1.eiu.edu/~nilic/Nina's-article.pdf"},"downloads":0},"bibtype":"unpublished","biburl":"https://bibbase.org/zotero/k4rtik","creationDate":"2020-05-31T17:07:22.547Z","downloads":0,"keywords":[],"search_terms":["ekert","protocol","ilic"],"title":"The Ekert Protocol","year":2007,"dataSources":["Z5Dp3qAJiMzxtvKMq"]}