{"doi":"10.1103/physrevlett.67.661","title":"Quantum cryptography based on Bell’s theorem","abstract":"Practical application of the generalized Bell's theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohm's version of the Einstein-Podolsky-Rosen gedanken experiment and Bell's theorem is used to test for eavesdropping.","journal":"Physical Review Letters","year":1991,"id":9589,"datarank":36.683034900230886,"base_score":9.272281773516365,"endowment":9.272281773516365,"self_citation_contribution":1.390842266027455,"citation_network_contribution":35.29219263420343,"self_endowment_contribution":1.390842266027455,"citer_contribution":35.29219263420343,"corpus_percentile":99.6,"corpus_rank":905,"citation_count":10638,"citer_count":198,"citers_with_citation_signal":198,"citers_with_endowment":198,"datacite_reuse_total":0,"is_dataset":false,"is_oa":false,"file_count":0,"downloads":0,"has_version_chain":false,"published_date":"1991-08-05","authors":[{"id":80207,"name":"Artur Ekert","orcid":"0000-0002-1504-5039","position":1,"is_corresponding":false},{"id":80206,"name":"Artur K. Ekert","orcid":null,"position":0,"is_corresponding":true}],"reference_count":11,"raw_metadata":{"citation_network_status":"fetched"},"created_at":"2026-03-01T18:20:47.508186Z","pmid":null,"pmcid":null,"fwci":null,"citation_percentile":null,"influential_citations":0,"oa_status":null,"license":null,"views":0,"total_file_size_bytes":0,"version_count":0,"clinical_trials":[],"software_tools":[],"db_accessions":[],"linked_datasets":[],"topics":[]}