Literature DB >> 17677888

Device-independent security of quantum cryptography against collective attacks.

Antonio Acín1, Nicolas Brunner, Nicolas Gisin, Serge Massar, Stefano Pironio, Valerio Scarani.   

Abstract

We present the optimal collective attack on a quantum key distribution protocol in the "device-independent" security scenario, where no assumptions are made about the way the quantum key distribution devices work or on what quantum system they operate. Our main result is a tight bound on the Holevo information between one of the authorized parties and the eavesdropper, as a function of the amount of violation of a Bell-type inequality.

Year:  2007        PMID: 17677888     DOI: 10.1103/PhysRevLett.98.230501

Source DB:  PubMed          Journal:  Phys Rev Lett        ISSN: 0031-9007            Impact factor:   9.161


  68 in total

1.  Information science: Guaranteed randomness.

Authors:  Valerio Scarani
Journal:  Nature       Date:  2010-04-15       Impact factor: 49.962

2.  Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres.

Authors:  B Hensen; H Bernien; A E Dréau; A Reiserer; N Kalb; M S Blok; J Ruitenberg; R F L Vermeulen; R N Schouten; C Abellán; W Amaya; V Pruneri; M W Mitchell; M Markham; D J Twitchen; D Elkouss; S Wehner; T H Taminiau; R Hanson
Journal:  Nature       Date:  2015-10-21       Impact factor: 49.962

3.  Secure device-independent quantum key distribution with causally independent measurement devices.

Authors:  Lluís Masanes; Stefano Pironio; Antonio Acín
Journal:  Nat Commun       Date:  2011       Impact factor: 14.919

4.  Quantum networks reveal quantum nonlocality.

Authors:  Daniel Cavalcanti; Mafalda L Almeida; Valerio Scarani; Antonio Acín
Journal:  Nat Commun       Date:  2011-02-08       Impact factor: 14.919

5.  Certified randomness in quantum physics.

Authors:  Antonio Acín; Lluis Masanes
Journal:  Nature       Date:  2016-12-07       Impact factor: 49.962

6.  Classical command of quantum systems.

Authors:  Ben W Reichardt; Falk Unger; Umesh Vazirani
Journal:  Nature       Date:  2013-04-25       Impact factor: 49.962

7.  The ultimate physical limits of privacy.

Authors:  Artur Ekert; Renato Renner
Journal:  Nature       Date:  2014-03-27       Impact factor: 49.962

8.  Contextuality supplies the 'magic' for quantum computation.

Authors:  Mark Howard; Joel Wallman; Victor Veitch; Joseph Emerson
Journal:  Nature       Date:  2014-06-11       Impact factor: 49.962

9.  Random numbers certified by Bell's theorem.

Authors:  S Pironio; A Acín; S Massar; A Boyer de la Giroday; D N Matsukevich; P Maunz; S Olmschenk; D Hayes; L Luo; T A Manning; C Monroe
Journal:  Nature       Date:  2010-04-15       Impact factor: 49.962

10.  Improved security bound for the round-robin-differential-phase-shift quantum key distribution.

Authors:  Zhen-Qiang Yin; Shuang Wang; Wei Chen; Yun-Guang Han; Rong Wang; Guang-Can Guo; Zheng-Fu Han
Journal:  Nat Commun       Date:  2018-01-31       Impact factor: 14.919

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.