2020
DOI: 10.1103/physrevresearch.2.023251
|View full text |Cite
|
Sign up to set email alerts
|

Genuine multipartite Bell inequality for device-independent conference key agreement

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
34
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 27 publications
(34 citation statements)
references
References 32 publications
0
34
0
Order By: Relevance
“…In Figure 5 we demonstrate that our technique can be used to recover the tight analytical bound [18] on inf H(A|X = 0, Q E ) for devices constrained to violate the Holz inequality [56] for three parties. Where the Holz inequality is formulated as follows: let Alice, Bob and Charlie each have binary input devices that give outputs in {1, −1}.…”
Section: The Npa Hierarchymentioning
confidence: 99%
See 1 more Smart Citation
“…In Figure 5 we demonstrate that our technique can be used to recover the tight analytical bound [18] on inf H(A|X = 0, Q E ) for devices constrained to violate the Holz inequality [56] for three parties. Where the Holz inequality is formulated as follows: let Alice, Bob and Charlie each have binary input devices that give outputs in {1, −1}.…”
Section: The Npa Hierarchymentioning
confidence: 99%
“…Figure5: Recovering the tight analytical bound of[18]. Comparison of lower bounds on H(A|X = 0, Q E ) for quantum devices that constrained to achieve some minimal violation of the Holz inequality for three parties[56]. Numerical bounds were computed at a relaxation level 2 + ABC.…”
mentioning
confidence: 99%
“…It has been generalized extensively to various cases including finite size [13], [14], continuous variables [15], [16] and four users with W state [17]. Moreover, the finite-key analysis with composable security [18], device independence [19], [20] and other special cases [21]- [23] are also considered in quantum CKA. The experimental demonstration of quantum CKA has been implemented recently over 50 km fiber using the state-of-the-art four-photon GHZ entanglement source [24].…”
Section: Introductionmentioning
confidence: 99%
“…As for the MABK-Bell function (2), the maximal violation value 2 (N −1)/2 appears if and only if for N -qubit Greenberger-Horne-Zeilinger (GHZ) states [10] or their local unitary equivalent partners [11]. Thus the Bell inequalities, not only can be designed as a nolocal game beaten via some quantum states outstriping any classical players (first shown in [12], and see also [13]), but act as a notable role in some quantum information processes [14], such as multipartite device-independent quantum key distribution [15], and ultraprecise metrology [16]. Considering their intriguing efficacy, and the difficulty to search for all Bell inequalities [17], it is necessary to find out a general iterative formula for Bell inequalities.…”
Section: Introductionmentioning
confidence: 99%