2013
DOI: 10.1088/1367-2630/15/10/103002
|View full text |Cite
|
Sign up to set email alerts
|

A monogamy-of-entanglement game with applications to device-independent quantum cryptography

Abstract: We consider a game in which two separate laboratories collaborate to prepare a quantum system and are then asked to guess the outcome of a measurement performed by a third party in a random basis on that system. Intuitively, by the uncertainty principle and the monogamy of entanglement, the probability that both players simultaneously succeed in guessing the outcome correctly is bounded. We are interested in the question of how the success probability scales when many such games are performed in parallel. We s… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

1
182
2

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 105 publications
(185 citation statements)
references
References 69 publications
(132 reference statements)
1
182
2
Order By: Relevance
“…Apply (31) In Sec. II we noted that this bound can be rewritten in an alternative form that may be easier to calculate.…”
Section: Now Writementioning
confidence: 99%
“…Apply (31) In Sec. II we noted that this bound can be rewritten in an alternative form that may be easier to calculate.…”
Section: Now Writementioning
confidence: 99%
“…It plays an important role in recent results on device-independent quantum key distribution [HR09,MPA11] and related cryptographic primitives [TFKW13]. The latter work considers parallel repetition of a game with quantum messages, a setting which is also the focus of [CJPP11].…”
Section: Additional Related Workmentioning
confidence: 99%
“…Assuming that the devices carry at least some memory of past interactions is an extremely realistic assumption due to technical limitations, even if Alice and Bob prepare their own trusted, but imperfect, devices, highlighting the extreme importance of such analyses for the implementation of device independent QKD. In contrast, relatively little is known about device independence outside the realm of QKD [12][13][14][15].Conference key agreement [16,17] (CKA or N-CKA) is the task of distributing a secret key among N parties. In order to achieve this goal, one could make use of N −1 individual QKD protocols to distribute N − 1 different keys between one of the parties (Alice) and the others (Bob 1 , .…”
mentioning
confidence: 99%