2018
DOI: 10.1038/s41467-017-02307-4
|View full text |Cite
|
Sign up to set email alerts
|

Practical device-independent quantum cryptography via entropy accumulation

Abstract: Device-independent cryptography goes beyond conventional quantum cryptography by providing security that holds independently of the quality of the underlying physical devices. Device-independent protocols are based on the quantum phenomena of non-locality and the violation of Bell inequalities. This high level of security could so far only be established under conditions which are not achievable experimentally. Here we present a property of entropy, termed “entropy accumulation”, which asserts that the total a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

5
361
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 206 publications
(366 citation statements)
references
References 42 publications
5
361
0
Order By: Relevance
“…This fact could be easily implemented in our N-BB84 protocol, thanks to the properties of the uncertainty relation [14]. A more drastic approach is represented by deviceindependent QKD (DIQKD) [15,16], where no assumption is made on the devices except for spatial separation. In this context it is worth mentioning the recent security proof of a multipartite DIQKD protocol [6].…”
Section: Discussionmentioning
confidence: 99%
“…This fact could be easily implemented in our N-BB84 protocol, thanks to the properties of the uncertainty relation [14]. A more drastic approach is represented by deviceindependent QKD (DIQKD) [15,16], where no assumption is made on the devices except for spatial separation. In this context it is worth mentioning the recent security proof of a multipartite DIQKD protocol [6].…”
Section: Discussionmentioning
confidence: 99%
“…+ Now, let us consider a class of device-independent protocols in which the eavesdropper is restricted by quantum mechanics. These models have previously been studied in [ABG+07,AFDF+18]. The general form of a device-independent protocol with a quantum eavesdropper remains the same except that we now consider a quantum extension (27) of the state in (217).…”
Section: Faithfulness Of Intrinsic Non-localitymentioning
confidence: 99%
“…It is plausible that the proposed scheme inherits the security of the underlying, in our case, the original semidevice-independent quantum key distribution protocol. Given the full proof of security of the SDI QKD against a forward signaling adversary, as it is the case for the DI QKD [65] (see [66] for the latest breakthrough), it may follow that our suitably modified scheme is fully unforgeable. Sufficient modification concerns the communication in the verification procedure.…”
Section: Discussionmentioning
confidence: 99%