One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy Games
نویسندگان
چکیده
A serious concern with quantum key distribution (QKD) schemes is that, when under attack, the quantum devices in a real-life implementation may behave differently than modeled in the security proof. This can lead to real-life attacks against provably secure QKD schemes. In this work, we show that the standard BB84 QKD scheme is one-sided device-independent. This means that security holds even if Bob’s quantum device is arbitrarily malicious, as long as Alice’s device behaves as it should. Thus, we can completely remove the trust into Bob’s quantum device for free, without the need for changing the scheme, and without the need for hard-to-implement loophole-free violations of Bell inequality, as is required for fully (meaning two-sided) device-independent QKD. For our analysis, we introduce a new quantum game, called a monogamyof-entanglement game, and we show a strong parallel repetition theorem for this game. This new notion is likely to be of independent interest and to find additional applications. Indeed, besides the application to QKD, we also show a direct application to position-based quantum cryptography: we give the first security proof for a one-round position-verification scheme that requires only single-qubit operations.
منابع مشابه
A Monogamy-of-Entanglement Game With Applications to Device-Independent Quantum Cryptography
We consider a game in which two separate laboratories collaborate to prepare a quantum system and are then asked to guess the outcome of a measurement performed by a third party in a random basis on that system. Intuitively, by the uncertainty principle and the monogamy of entanglement, the probability that both players simultaneously succeed in guessing the outcome correctly is bounded. We are...
متن کاملOne - Sided Devi e - Independent QKD and Position - based
Abstra t. A serious on ern with quantum key distribution (QKD) s hemes is that, when under atta k, the quantum devi es in a real-life implementation may behave di erently than modeled in the se urity proof. This an lead to real-life atta ks against provably se ure QKD s hemes. In this work, we show that the standard BB84 QKD s heme is one-sided devi e-independent. This means that se urity holds...
متن کاملQuantum cryptography: from theory to practice
Quantum cryptography: from theory to practice Xiongfeng Ma Doctor of Philosophy Thesis Graduate Department of Department of Physics University of Toronto 2008 Quantum cryptography or quantum key distribution (QKD) applies fundamental laws of quantum physics to guarantee secure communication. The security of quantum cryptography was proven in the last decade. Many security analyses are based on ...
متن کاملToward feasible long-distance quantum communications systems
Memory-assisted measurement-device-independent quantum key distribution (MA-MDI-QKD) aims to improve the rateversus-distance behavior of QKD systems by using the existing technologies [1]. While quantum repeater systems, as the ultimate solution to long-distance quantum communications, are still too challenging to be implemented, MA-MDIQKD presents a feasible middle step toward the realization ...
متن کاملPractical Issues in Quantum Cryptography
Practical Issues in Quantum Cryptography Feihu Xu Master of Applied Science Graduate Department of Electrical & Computer Engineering University of Toronto 2012 Cryptography plays a key role in our life ranging from computer passwords to electronic commerce to national military security. The most widely used modern encryption algorithm is the public-key algorithm. However, the security of all pu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2015 شماره
صفحات -
تاریخ انتشار 2013