Upper Bounds on Device-Independent Quantum Key Distribution Rates in Static and Dynamic Scenarios
نویسندگان
چکیده
In this work, we develop upper bounds on key rates for device-independent quantum distribution (DI-QKD) protocols and devices. We study the reduced $\mathrm{cc}$-squashed entanglement show that it is a convex functional. As result, hull of currently known tighter bound standard Clauser-Horne-Shimony-Holt (CHSH)-based protocol. further provide DI-QKD achievable by any protocol applied to CHSH-based device. This based relative entropy optimized over decompositions into local nonlocal parts. dynamical scenario channels, obtain private capacity protocols. depolarizing erasure channels limited secret dephasing channels.
منابع مشابه
Device-independent quantum key distribution
Quantum key distribution allows two parties connected by a quantum channel to establish a secret key that is unknown to any unauthorized third party. The secrecy of this key is based on the laws of quantum physics. For security, however, it is crucial that the honest parties are able to control their physical devices accurately and completely. The goal of device-independent quantum key distribu...
متن کاملExperimental measurement-device-independent quantum key distribution.
Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-dev...
متن کاملOptimal Device Independent Quantum Key Distribution
We consider an optimal quantum key distribution setup based on minimal number of measurement bases with binary yields used by parties against an eavesdropper limited only by the no-signaling principle. We note that in general, the maximal key rate can be achieved by determining the optimal tradeoff between measurements that attain the maximal Bell violation and those that maximise the bit corre...
متن کاملEfficient Device-Independent Quantum Key Distribution
An efficient protocol for quantum key distribution is proposed the security of which is entirely device-independent and not even based on the accuracy of quantum physics. A scheme of that type relies on the quantum-physical phenomenon of non-local correlations and on the assumption that no illegitimate information flows within and between Alice’s and Bob’s laboratories. The latter can be enforc...
متن کاملFully device-independent quantum key distribution.
Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorousl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical review applied
سال: 2022
ISSN: ['2331-7043', '2331-7019']
DOI: https://doi.org/10.1103/physrevapplied.18.054033