Device-independent secret-key-rate analysis for quantum repeaters
نویسندگان
چکیده
منابع مشابه
Finite-key analysis for measurement-device-independent quantum key distribution.
Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect detectors to learn a large part of the secret key, even though the security proof claims otherwise. Recently, a practical approach--measuremen...
متن کاملDevice-independent quantum key distribution
Quantum key distribution allows two parties connected by a quantum channel to establish a secret key that is unknown to any unauthorized third party. The secrecy of this key is based on the laws of quantum physics. For security, however, it is crucial that the honest parties are able to control their physical devices accurately and completely. The goal of device-independent quantum key distribu...
متن کاملLimitations on Quantum Key Repeaters
A major application of quantum communication is the distribution of entangled particles for use in quantum key distribution. Owing to noise in the communication line, quantum key distribution is, in practice, limited to a distance of a few hundred kilometres, and can only be extended to longer distances by use of a quantum repeater, a device that performs entanglement distillation and quantum t...
متن کاملEfficient Device-Independent Quantum Key Distribution
An efficient protocol for quantum key distribution is proposed the security of which is entirely device-independent and not even based on the accuracy of quantum physics. A scheme of that type relies on the quantum-physical phenomenon of non-local correlations and on the assumption that no illegitimate information flows within and between Alice’s and Bob’s laboratories. The latter can be enforc...
متن کاملFully device-independent quantum key distribution.
Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorousl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review A
سال: 2018
ISSN: 2469-9926,2469-9934
DOI: 10.1103/physreva.97.012337