Research Output | Dar Al-hikmah Library | IIUM Only
We consider the counterfactual protocol proposed in Phys. Rev. Lett., 103, 230501 (2009) within a device independent framework and show how its security can easily be compromised. Capitalising on the fact that the protocol is based on the use of a single photon entanglement phenomenon, we propose an equivalent protocol. It can be made secure within