Boosting device-independent cryptography with tripartite nonlocality

نویسندگان

چکیده

Device-independent (DI) protocols, such as DI conference key agreement (DICKA) and randomness expansion (DIRE), certify private by observing nonlocal correlations when two or more parties test a Bell inequality. While most protocols are restricted to bipartite tests, harnessing multipartite may lead better performance. Here, we consider tripartite DICKA DIRE based on testing inequalities, specifically: the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality, Holz Parity-CHSH inequalities introduced in context of protocols. We evaluate asymptotic performance (DIRE) terms their rate (net generation rate), deriving lower bounds conditional von Neumann entropy one party's outcome parties' outcomes. For prove tight analytical bound one-outcome conjecture two-outcome entropy. additionally re-derive for MABK inequality with much simpler method obtain numerical Our simulations show that employing can significantly outperform counterparts. Moreover, establish genuine entanglement is not precondition while its necessity remains an open question.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Revealing Hidden Genuine Tripartite Nonlocality

Nonlocal correlations arising from measurements on tripartite entangled states can be classified into two groups, one genuinely 3−way nonlocal and other local with respect to some bipartition. Still, whether a genuinely tripartite entangled quantum state can exhibit genuine 3−way nonlocality, remains a challenging problem so far as measurement context is concerned. Here we introduce a novel app...

متن کامل

Graphical Methods in Device-Independent Quantum Cryptography

We introduce a framework for graphical security proofs in device-independent quantum cryptography using the methods of categorical quantum mechanics. We are optimistic that this approach will make some of the highly complex proofs in quantum cryptography more accessible, facilitate the discovery of new proofs, and enable automated proof verification. As an example of our framework, we reprove a...

متن کامل

Implications of Superstrong Nonlocality for Cryptography

Non-local boxes are hypothetical “machines” that give rise to superstrong non-local correlations, leading to a stronger violation of Bell/CHSH inequalities than is possible within the framework of quantum mechanics. We show how non-local boxes can be used to perform any two-party secure computation. We first construct a protocol for bit commitment and then show how to achieve oblivious transfer...

متن کامل

Device-independent security of quantum cryptography against collective attacks.

We present the optimal collective attack on a quantum key distribution protocol in the "device-independent" security scenario, where no assumptions are made about the way the quantum key distribution devices work or on what quantum system they operate. Our main result is a tight bound on the Holevo information between one of the authorized parties and the eavesdropper, as a function of the amou...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Quantum

سال: 2023

ISSN: ['2521-327X']

DOI: https://doi.org/10.22331/q-2023-04-13-980