Role of Bell-CHSH violation and local filtering in quantum key distribution

نویسندگان

چکیده

In this article, we analyse the relationship between Bell violation and secure key rate of entanglement assisted quantum distribution (QKD) protocols. Specifically, address question whether is necessary or sufficient for communication. We construct a class states which do not show violation, however, can be used communication after local filtering. Similarly, identify another but generating even The existence these two classes demonstrates that as an initial resource neither nor QKD. Our work therefore forces departure from traditional thinking degree brings out role

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Maximal violation of Bell inequalities under local filtering

We investigate the behavior of the maximal violations of the CHSH inequality and Vèrtesi's inequality under the local filtering operations. An analytical method has been presented for general two-qubit systems to compute the maximal violation of the CHSH inequality and the lower bound of the maximal violation of Vértesi's inequality over the local filtering operations. We show by examples that ...

متن کامل

A qutrit Quantum Key Distribution protocol using Bell inequalities with larger violation capabilities

The Ekert quantum key distribution protocol [1] uses pairs of entangled qubits and performs checks based on a Bell inequality to detect eavesdropping. The 3DEB protocol [2] uses instead pairs of entangled qutrits to achieve better noise resistance than the Ekert protocol. It performs checks based on a Bell inequality for qutrits named CHSH-3 and found in [3, 4]. In this paper, we present a new ...

متن کامل

Quantum key distribution with prepare-and-measure Bell test

The prepare-and-measure quantum key distribution (QKD) has the merits of fast speed, high key generation rate, and easy implementation. However, the detector side channel attacks greatly undermine the security of the key bits. The eavesdropper, Eve, exploits the flaws of the detectors to obtain illegal information without violating quantum principles. It means that she can intervene in the comm...

متن کامل

A random quantum key distribution by using Bell states

We proposed a new scheme for quantum key distribution based on entanglement swapping. By this protocol Alice can securely share a random quantum key with Bob, without transporting any particle.

متن کامل

Quantum correlations in inflationary spectra and violation of Bell inequalities

In spite of the macroscopic character of the fluctuation amplitudes, we show that the standard inflationary distribution of primordial density fluctuations still exhibits inherently quantum mechanical correlations (which cannot be mimicked by any classical stochastic ensemble). To this end, we propose a Gedanken experiment for which certain Bell inequalities are violated. We also compute the ef...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Physics Letters A

سال: 2021

ISSN: ['0375-9601', '1873-2429']

DOI: https://doi.org/10.1016/j.physleta.2021.127158