Quantum Cryptographic Security from Contextuality
نویسنده
چکیده
Quantum mechanics is contextual, that is, the outcome of a measurement does depend on how that value is measured. This somewhat bizarre, non-classical feature is a consequence of the Kochen-Specker theorem, which asserts that there is no non-contextual hidden variable theory that reproduces quantum theory. Contextuality is a property of quantum systems with Hilbert spaces of d > 2, as it can be shown that a consistent non-contextual assignment of values is possible for qubits. Contextuality via the Kochen-Specker theorem also serves as a precondition for secure quantum key distribution in EPR-type protocols such as E91 and BBM92. In these cryptographic schemes, security is proven by violations of inequalities that also contradict assumptions in local realistic theories of the Kochen-Specker type. Device-independent security from contextuality is also demonstrated by considering a distributed box of Peres-Mermin observables for the Kochen Specker theorem. The security of the corresponding key distribution protocol is certified by checking for not-too-strong violations of Bell inequalities.
منابع مشابه
Device-independent quantum secret sharing using Mermin-type contextuality
We present a new quantum secret sharing protocol based on recent advances in Mermin-type contextuality scenarios, which is provably secure against postquantum nonsignaling attackers. It is a fundamental assumption of secret sharing protocols that not all players are trusted parties, and that some may collude amongst themselves and with eavesdroppers to break confidentiality. To this extent, qua...
متن کاملUniversal security for randomness expansion
We show that any spatially separated multi-part quantum device demonstrating nonlocality can be used in an untrusted-device protocol for randomness expansion with unconditional quantum security. A consequence is that the noise tolerance for secure randomness expansion only needs to be small enough that it rules out deterministic behavior of the device. This greatly reduces the requirement on im...
متن کاملNon-contextual chocolate ball versus value indefinite quantum cryptography
Some quantum cryptographic protocols can be implemented with specially prepared metaphorical chocolate balls representing local hidden variables, others protected by value indefiniteness cannot. This latter feature, which follows from Belland Kochen-Specker type arguments, is only present in systems with three or more mutually exclusive outcomes. Conversely, there exist local hidden variable mo...
متن کاملAdvanced Analysis of Quantum Contextuality in a Psychophysical Double-Detection Experiment
The results of behavioral experiments typically exhibit inconsistent connectedness, i.e., they violate the condition known as “no-signaling,” “no-disturbance,” or “marginal selectivity.” This prevents one from evaluating these experiments in terms of quantum contextuality if the latter understood traditionally (as, e.g., in the Kochen-Specker theorem or Bell-type inequalities). The Contextualit...
متن کاملDifferential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کامل