Upper Bounds on Device-Independent Quantum Key Distribution Rates and a Revised Peres Conjecture
نویسندگان
چکیده
Device-independent quantum key distribution (DIQKD) is one of the most challenging tasks in cryptography. The protocols and their security are based on existence Bell inequalities ability to violate them by measuring entangled states. We study entanglement needed for DIQKD two different ways. Our first contribution derivation upper bounds rates CHSH-based terms violation inequality; this sets an limit possible DI extraction rate from states with a given violation. bound improves previously known Kaur et al. second initiation role DIQKD. present revised Peres conjecture stating that such cannot be used as resource give piece evidence showing state found Vertesi Brunner, even though it can certify randomness, produce using analogous well-studied protocol.
منابع مشابه
Device-independent quantum key distribution
Quantum key distribution allows two parties connected by a quantum channel to establish a secret key that is unknown to any unauthorized third party. The secrecy of this key is based on the laws of quantum physics. For security, however, it is crucial that the honest parties are able to control their physical devices accurately and completely. The goal of device-independent quantum key distribu...
متن کاملExperimental measurement-device-independent quantum key distribution.
Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-dev...
متن کاملOptimal Device Independent Quantum Key Distribution
We consider an optimal quantum key distribution setup based on minimal number of measurement bases with binary yields used by parties against an eavesdropper limited only by the no-signaling principle. We note that in general, the maximal key rate can be achieved by determining the optimal tradeoff between measurements that attain the maximal Bell violation and those that maximise the bit corre...
متن کاملEfficient Device-Independent Quantum Key Distribution
An efficient protocol for quantum key distribution is proposed the security of which is entirely device-independent and not even based on the accuracy of quantum physics. A scheme of that type relies on the quantum-physical phenomenon of non-local correlations and on the assumption that no illegitimate information flows within and between Alice’s and Bob’s laboratories. The latter can be enforc...
متن کاملFully device-independent quantum key distribution.
Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorousl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Theory
سال: 2021
ISSN: ['0018-9448', '1557-9654']
DOI: https://doi.org/10.1109/tit.2021.3086505