Literature DB >> 25325625

Fully device-independent quantum key distribution.

Umesh Vazirani1, Thomas Vidick2.   

Abstract

Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorously proving the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks. The resulting protocol is robust: While assuming only that the devices can be modeled by the laws of quantum mechanics and are spatially isolated from each other and from any adversary's laboratory, it achieves a linear key rate and tolerates a constant noise rate in the devices. In particular, the devices may have quantum memory and share arbitrary quantum correlations with the eavesdropper. The proof of security is based on a new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol.

Year:  2014        PMID: 25325625     DOI: 10.1103/PhysRevLett.113.140501

Source DB:  PubMed          Journal:  Phys Rev Lett        ISSN: 0031-9007            Impact factor:   9.161


  16 in total

1.  Certified randomness in quantum physics.

Authors:  Antonio Acín; Lluis Masanes
Journal:  Nature       Date:  2016-12-07       Impact factor: 49.962

Review 2.  Analysing causal structures with entropy.

Authors:  Mirjam Weilenmann; Roger Colbeck
Journal:  Proc Math Phys Eng Sci       Date:  2017-11-01       Impact factor: 2.704

3.  Necessary and sufficient conditions on measurements of quantum channels.

Authors:  John Burniston; Michael Grabowecky; Carlo Maria Scandolo; Giulio Chiribella; Gilad Gour
Journal:  Proc Math Phys Eng Sci       Date:  2020-04-29       Impact factor: 2.704

4.  Experimental quantum key distribution certified by Bell's theorem.

Authors:  D P Nadlinger; P Drmota; B C Nichol; G Araneda; D Main; R Srinivas; D M Lucas; C J Ballance; K Ivanov; E Y-Z Tan; P Sekatski; R L Urbanke; R Renner; N Sangouard; J-D Bancal
Journal:  Nature       Date:  2022-07-27       Impact factor: 69.504

5.  Randomness in nonlocal games between mistrustful players.

Authors:  Carl A Miller; Yaoyun Shi
Journal:  Quantum Inf Comput       Date:  2017-06       Impact factor: 0.976

6.  General immunity and superadditivity of two-way Gaussian quantum cryptography.

Authors:  Carlo Ottaviani; Stefano Pirandola
Journal:  Sci Rep       Date:  2016-03-01       Impact factor: 4.379

7.  Experimental realization of an entanglement access network and secure multi-party computation.

Authors:  X-Y Chang; D-L Deng; X-X Yuan; P-Y Hou; Y-Y Huang; L-M Duan
Journal:  Sci Rep       Date:  2016-07-11       Impact factor: 4.379

8.  Security of quantum key distribution with multiphoton components.

Authors:  Hua-Lei Yin; Yao Fu; Yingqiu Mao; Zeng-Bing Chen
Journal:  Sci Rep       Date:  2016-07-07       Impact factor: 4.379

9.  Experimental violation of local causality in a quantum network.

Authors:  Gonzalo Carvacho; Francesco Andreoli; Luca Santodonato; Marco Bentivegna; Rafael Chaves; Fabio Sciarrino
Journal:  Nat Commun       Date:  2017-03-16       Impact factor: 14.919

10.  Practical device-independent quantum cryptography via entropy accumulation.

Authors:  Rotem Arnon-Friedman; Frédéric Dupuis; Omar Fawzi; Renato Renner; Thomas Vidick
Journal:  Nat Commun       Date:  2018-01-31       Impact factor: 14.919

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.