Computing secure key rates for quantum cryptography with untrusted devices

نویسندگان

چکیده

Device-independent quantum key distribution (DIQKD) provides the strongest form of secure exchange, using only input-output statistics devices to achieve information-theoretic security. Although basic security principles DIQKD are now well-understood, it remains a technical challenge derive reliable and robust bounds for advanced protocols that go beyond previous results based on violations CHSH inequality. In this work, we present framework semi-definite programming gives lower asymptotic secret rate any QKD protocol untrusted devices. particular, our method can in principle be utilized find achievable rates protocol, full probability or choice Bell Our also extends other DI cryptographic tasks.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anonymous key quantum cryptography and unconditionally secure quantum bit commitment

A new cryptographic tool, anonymous quantum key technique, is introduced that leads to unconditionally secure key distribution and encryption schemes that can be readily implemented experimentally in a realistic environment. If quantum memory is available, the technique would have many features of public-key cryptography; an identification protocol that does not require a shared secret key is p...

متن کامل

Secure Personal Content Networking Over Untrusted Devices

Securely sharing and managing personal content is a challenging task in multidevice environments. In this paper, we design and implement a new platform called personal content networking (PCN). Our work is inspired by content-centric networking (CCN) becausewe aim to enable access to personal content using its name instead of its location. The unique challenge of PCN is to support secure file o...

متن کامل

Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts

Recent results of Kaplan et al., building on previous work by Kuwakado and Morii, have shown that a wide variety of classically-secure symmetric-key cryptosystems are completely broken when exposed to quantum CPA attacks. In such an attack, the quantum adversary has the ability to query the cryptographic functionality in superposition. The vulnerable cryptosystems include the Even-Mansour block...

متن کامل

Quantum Computing and Quantum Cryptography

Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. Entrust is a registered trademark of Entrust Limited in Canada. All other Entrust product names and service names are trademarks or registered trademarks of Entrust, Inc or Entrust Limited. All other company and product names are trademarks or registered trademarks of their respective owners.

متن کامل

Randomness expansion from untrusted quantum devices

Is it possible to obtain provable random numbers from an untrusted source? This question, if it can be answered affirmatively, is of great importance in cryptography, where random numbers are ubiquitous and it is necessary to guard against highly intelligent adversaries. Bad randomness is a problem: researchers have broken a large number of RSA keys on the internet due to insufficient randomnes...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: npj Quantum Information

سال: 2021

ISSN: ['2056-6387']

DOI: https://doi.org/10.1038/s41534-021-00494-z