Quantum Cryptographic Security from Contextuality

نویسنده

  • Gelo Noel M. Tabia
چکیده

Quantum mechanics is contextual, that is, the outcome of a measurement does depend on how that value is measured. This somewhat bizarre, non-classical feature is a consequence of the Kochen-Specker theorem, which asserts that there is no non-contextual hidden variable theory that reproduces quantum theory. Contextuality is a property of quantum systems with Hilbert spaces of d > 2, as it can be shown that a consistent non-contextual assignment of values is possible for qubits. Contextuality via the Kochen-Specker theorem also serves as a precondition for secure quantum key distribution in EPR-type protocols such as E91 and BBM92. In these cryptographic schemes, security is proven by violations of inequalities that also contradict assumptions in local realistic theories of the Kochen-Specker type. Device-independent security from contextuality is also demonstrated by considering a distributed box of Peres-Mermin observables for the Kochen Specker theorem. The security of the corresponding key distribution protocol is certified by checking for not-too-strong violations of Bell inequalities.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Device-independent quantum secret sharing using Mermin-type contextuality

We present a new quantum secret sharing protocol based on recent advances in Mermin-type contextuality scenarios, which is provably secure against postquantum nonsignaling attackers. It is a fundamental assumption of secret sharing protocols that not all players are trusted parties, and that some may collude amongst themselves and with eavesdroppers to break confidentiality. To this extent, qua...

متن کامل

Universal security for randomness expansion

We show that any spatially separated multi-part quantum device demonstrating nonlocality can be used in an untrusted-device protocol for randomness expansion with unconditional quantum security. A consequence is that the noise tolerance for secure randomness expansion only needs to be small enough that it rules out deterministic behavior of the device. This greatly reduces the requirement on im...

متن کامل

Non-contextual chocolate ball versus value indefinite quantum cryptography

Some quantum cryptographic protocols can be implemented with specially prepared metaphorical chocolate balls representing local hidden variables, others protected by value indefiniteness cannot. This latter feature, which follows from Belland Kochen-Specker type arguments, is only present in systems with three or more mutually exclusive outcomes. Conversely, there exist local hidden variable mo...

متن کامل

Advanced Analysis of Quantum Contextuality in a Psychophysical Double-Detection Experiment

The results of behavioral experiments typically exhibit inconsistent connectedness, i.e., they violate the condition known as “no-signaling,” “no-disturbance,” or “marginal selectivity.” This prevents one from evaluating these experiments in terms of quantum contextuality if the latter understood traditionally (as, e.g., in the Kochen-Specker theorem or Bell-type inequalities). The Contextualit...

متن کامل

Differential Power Analysis: A Serious Threat to FPGA Security

Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011