Literature DB >> 21407204

Secure device-independent quantum key distribution with causally independent measurement devices.

Lluís Masanes1, Stefano Pironio, Antonio Acín.   

Abstract

Device-independent quantum key distribution (QKD) aims to provide key distribution schemes, the security of which is based on the laws of quantum physics, but which does not require any assumptions about the internal working of the devices used in the protocol. This strong form of security is possible only when using correlations that violate a Bell inequality. Here, we provide a general security proof for a large class of protocols in a model in which the raw key is generated by independent measurements. This independence condition may be justifiable in several implementations and is necessarily satisfied when the raw key is generated by N separate pairs of devices. Our work shows that device-independent QKD is possible with key rates comparable to those of standard schemes.

Mesh:

Year:  2011        PMID: 21407204     DOI: 10.1038/ncomms1244

Source DB:  PubMed          Journal:  Nat Commun        ISSN: 2041-1723            Impact factor:   14.919


  10 in total

1.  Bell inequalities for arbitrarily high-dimensional systems.

Authors:  Daniel Collins; Nicolas Gisin; Noah Linden; Serge Massar; Sandu Popescu
Journal:  Phys Rev Lett       Date:  2002-01-10       Impact factor: 9.161

2.  Quantum cryptography based on Bell's theorem.

Authors: 
Journal:  Phys Rev Lett       Date:  1991-08-05       Impact factor: 9.161

3.  Closing the detection loophole in Bell experiments using qudits.

Authors:  Tamás Vértesi; Stefano Pironio; Nicolas Brunner
Journal:  Phys Rev Lett       Date:  2010-02-11       Impact factor: 9.161

4.  Proposal for implementing device-independent quantum key distribution based on a heralded qubit amplifier.

Authors:  Nicolas Gisin; Stefano Pironio; Nicolas Sangouard
Journal:  Phys Rev Lett       Date:  2010-08-12       Impact factor: 9.161

5.  No signaling and quantum key distribution.

Authors:  Jonathan Barrett; Lucien Hardy; Adrian Kent
Journal:  Phys Rev Lett       Date:  2005-06-27       Impact factor: 9.161

6.  From Bell's theorem to secure quantum key distribution.

Authors:  Antonio Acín; Nicolas Gisin; Lluis Masanes
Journal:  Phys Rev Lett       Date:  2006-09-20       Impact factor: 9.161

7.  Bounding the set of quantum correlations.

Authors:  Miguel Navascués; Stefano Pironio; Antonio Acín
Journal:  Phys Rev Lett       Date:  2007-01-04       Impact factor: 9.161

8.  Device-independent security of quantum cryptography against collective attacks.

Authors:  Antonio Acín; Nicolas Brunner; Nicolas Gisin; Serge Massar; Stefano Pironio; Valerio Scarani
Journal:  Phys Rev Lett       Date:  2007-06-04       Impact factor: 9.161

9.  Universally composable privacy amplification from causality constraints.

Authors:  Lluís Masanes
Journal:  Phys Rev Lett       Date:  2009-04-10       Impact factor: 9.161

10.  Random numbers certified by Bell's theorem.

Authors:  S Pironio; A Acín; S Massar; A Boyer de la Giroday; D N Matsukevich; P Maunz; S Olmschenk; D Hayes; L Luo; T A Manning; C Monroe
Journal:  Nature       Date:  2010-04-15       Impact factor: 49.962

  10 in total
  13 in total

1.  Certified randomness in quantum physics.

Authors:  Antonio Acín; Lluis Masanes
Journal:  Nature       Date:  2016-12-07       Impact factor: 49.962

2.  Classical command of quantum systems.

Authors:  Ben W Reichardt; Falk Unger; Umesh Vazirani
Journal:  Nature       Date:  2013-04-25       Impact factor: 49.962

3.  The ultimate physical limits of privacy.

Authors:  Artur Ekert; Renato Renner
Journal:  Nature       Date:  2014-03-27       Impact factor: 49.962

4.  Tight finite-key analysis for quantum cryptography.

Authors:  Marco Tomamichel; Charles Ci Wen Lim; Nicolas Gisin; Renato Renner
Journal:  Nat Commun       Date:  2012-01-17       Impact factor: 14.919

5.  Secure and robust transmission and verification of unknown quantum states in Minkowski space.

Authors:  Adrian Kent; Serge Massar; Jonathan Silman
Journal:  Sci Rep       Date:  2014-01-28       Impact factor: 4.379

6.  Experimental realization of an entanglement access network and secure multi-party computation.

Authors:  X-Y Chang; D-L Deng; X-X Yuan; P-Y Hou; Y-Y Huang; L-M Duan
Journal:  Sci Rep       Date:  2016-07-11       Impact factor: 4.379

7.  Quantum steering of Gaussian states via non-Gaussian measurements.

Authors:  Se-Wan Ji; Jaehak Lee; Jiyong Park; Hyunchul Nha
Journal:  Sci Rep       Date:  2016-07-14       Impact factor: 4.379

8.  Experimental violation of n-locality in a star quantum network.

Authors:  Davide Poderini; Iris Agresti; Guglielmo Marchese; Emanuele Polino; Taira Giordani; Alessia Suprano; Mauro Valeri; Giorgio Milani; Nicolò Spagnolo; Gonzalo Carvacho; Rafael Chaves; Fabio Sciarrino
Journal:  Nat Commun       Date:  2020-05-18       Impact factor: 14.919

9.  Security of Semi-Device-Independent Random Number Expansion Protocols.

Authors:  Dan-Dan Li; Qiao-Yan Wen; Yu-Kun Wang; Yu-Qian Zhou; Fei Gao
Journal:  Sci Rep       Date:  2015-10-27       Impact factor: 4.379

10.  Quantum cryptography beyond quantum key distribution.

Authors:  Anne Broadbent; Christian Schaffner
Journal:  Des Codes Cryptogr       Date:  2015-12-21       Impact factor: 1.492

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.