17
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      Fully device-independent conference key agreement

      , ,
      Physical Review A
      American Physical Society (APS)

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references29

          • Record: found
          • Abstract: not found
          • Article: not found

          Extreme quantum entanglement in a superposition of macroscopically distinct states.

          Mermin (1990)
            Bookmark
            • Record: found
            • Abstract: found
            • Article: found
            Is Open Access

            No Signalling and Quantum Key Distribution

            , , (2005)
            Standard quantum key distribution protocols are provably secure against eavesdropping attacks, if quantum theory is correct. It is theoretically interesting to know if we need to assume the validity of quantum theory to prove the security of quantum key distribution, or whether its security can be based on other physical principles. The question would also be of practical interest if quantum mechanics were ever to fail in some regime, because a scientifically and technologically advanced eavesdropper could perhaps use post-quantum physics to extract information from quantum communications without necessarily causing the quantum state disturbances on which existing security proofs rely. Here we describe a key distribution scheme provably secure against general attacks by a post-quantum eavesdropper who is limited only by the impossibility of superluminal signalling. The security of the scheme stems from violation of a Bell inequality.
              Bookmark
              • Record: found
              • Abstract: found
              • Article: found
              Is Open Access

              Device-independent security of quantum cryptography against collective attacks

              We present the optimal collective attack on a Quantum Key Distribution (QKD) protocol in the "device-independent" security scenario, where no assumptions are made about the way the QKD devices work or on what quantum system they operate. Our main result is a tight bound on the Holevo information between one of the authorized parties and the eavesdropper, as a function of the amount of violation of a Bell-type inequality.
                Bookmark

                Author and article information

                Journal
                PLRAAN
                Physical Review A
                Phys. Rev. A
                American Physical Society (APS)
                2469-9926
                2469-9934
                February 2018
                February 6 2018
                : 97
                : 2
                Article
                10.1103/PhysRevA.97.022307
                33f99cff-46d0-4ed9-98c9-be5b5cffaad7
                © 2018

                https://link.aps.org/licenses/aps-default-license

                History

                Comments

                Comment on this article