Computing secure key rates for quantum cryptography with untrusted devices
نویسندگان
چکیده
Device-independent quantum key distribution (DIQKD) provides the strongest form of secure exchange, using only input-output statistics devices to achieve information-theoretic security. Although basic security principles DIQKD are now well-understood, it remains a technical challenge derive reliable and robust bounds for advanced protocols that go beyond previous results based on violations CHSH inequality. In this work, we present framework semi-definite programming gives lower asymptotic secret rate any QKD protocol untrusted devices. particular, our method can in principle be utilized find achievable rates protocol, full probability or choice Bell Our also extends other DI cryptographic tasks.
منابع مشابه
Anonymous key quantum cryptography and unconditionally secure quantum bit commitment
A new cryptographic tool, anonymous quantum key technique, is introduced that leads to unconditionally secure key distribution and encryption schemes that can be readily implemented experimentally in a realistic environment. If quantum memory is available, the technique would have many features of public-key cryptography; an identification protocol that does not require a shared secret key is p...
متن کاملSecure Personal Content Networking Over Untrusted Devices
Securely sharing and managing personal content is a challenging task in multidevice environments. In this paper, we design and implement a new platform called personal content networking (PCN). Our work is inspired by content-centric networking (CCN) becausewe aim to enable access to personal content using its name instead of its location. The unique challenge of PCN is to support secure file o...
متن کاملQuantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts
Recent results of Kaplan et al., building on previous work by Kuwakado and Morii, have shown that a wide variety of classically-secure symmetric-key cryptosystems are completely broken when exposed to quantum CPA attacks. In such an attack, the quantum adversary has the ability to query the cryptographic functionality in superposition. The vulnerable cryptosystems include the Even-Mansour block...
متن کاملQuantum Computing and Quantum Cryptography
Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. Entrust is a registered trademark of Entrust Limited in Canada. All other Entrust product names and service names are trademarks or registered trademarks of Entrust, Inc or Entrust Limited. All other company and product names are trademarks or registered trademarks of their respective owners.
متن کاملRandomness expansion from untrusted quantum devices
Is it possible to obtain provable random numbers from an untrusted source? This question, if it can be answered affirmatively, is of great importance in cryptography, where random numbers are ubiquitous and it is necessary to guard against highly intelligent adversaries. Bad randomness is a problem: researchers have broken a large number of RSA keys on the internet due to insufficient randomnes...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: npj Quantum Information
سال: 2021
ISSN: ['2056-6387']
DOI: https://doi.org/10.1038/s41534-021-00494-z