Device-Independent Quantum Key Distribution with Commuting Measurements
نویسندگان
چکیده
We consider quantum key distribution in the device-independent scenario, i.e., where the legitimate parties do not know (or trust) the exact specification of their apparatus. We show how secure key distribution can be realized against the most general attacks by a quantum adversary under the condition that measurements on different subsystems by the honest parties commute.
منابع مشابه
Device-independent uncertainty for binary observables
We investigate entropic uncertainty relations for two or more binary measurements. We show that the effective anti-commutator is a useful measure of incompatibility and gives rise to strong uncertainty relations. Since the effective anti-commutator can be certified device-independently it leads us to device-independent uncertainty. Our relations, expressed in terms of conditional Rényi entropie...
متن کاملA Necessary Condition for the Security of Coherent- One-Way Quantum Key Distribution Protocol
The coherent-one-way and the differential-phase-shift protocols are two of the most recent practical quantum key distribution protocols for quantum cryptography. These protocols belong to a class of so-called distributed-phase-reference quantum key distribution protocols. While security proofs for some limited attacks exist, the unconditional security proofs this class of protocol remain unreal...
متن کاملQuantum key distribution using polarized coherent states
We discuss a continuous variables method of quantum key distribution employing strongly polarized coherent states of light. The key encoding is performed using the variables known as Stokes parameters, rather than the field quadratures. Their quantum counterpart, the Stokes operatorsˆSi (i=1,2,3), constitute a set of non-commuting operators, being the precision of simultaneous measurements of a...
متن کاملDevice-independent quantum key distribution
Quantum key distribution allows two parties connected by a quantum channel to establish a secret key that is unknown to any unauthorized third party. The secrecy of this key is based on the laws of quantum physics. For security, however, it is crucial that the honest parties are able to control their physical devices accurately and completely. The goal of device-independent quantum key distribu...
متن کاملSecurity of Device-Independent Quantum Key Distribution Protocols
Device-independent cryptography represent the strongest form of physical security: it is based on general physical laws and does not require any detailed knowledge or control of the physical devices used in the protocol. We discuss a general security proof valid for a large class of device-independent quantum key distribution protocols. The proof relies on the validity of Quantum Theory and req...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1009.1833 شماره
صفحات -
تاریخ انتشار 2010