From Bell's theorem to secure quantum key distribution.
@article{Acn2006FromBT, title={From Bell's theorem to secure quantum key distribution.}, author={Antonio Ac{\'i}n and Nicolas Gisin and Lluis Masanes}, journal={Physical review letters}, year={2006}, volume={97 12}, pages={ 120405 } }
The first step in any quantum key distribution (QKD) protocol consists of sequences of measurements that produce correlated classical data. We show that these correlation data must violate some Bell inequality in order to contain distillable secrecy, if not they could be produced by quantum measurements performed on a separable state of larger dimension. We introduce a new QKD protocol and prove its security against any individual attack by an adversary only limited by the no-signaling…
494 Citations
Fully device independent quantum key distribution
- Computer ScienceCommun. ACM
- 2019
This work rigorously proves the device-independent security of an entanglement-based protocol building on Ekert's original proposal for quantum key distribution and builds on techniques from the classical theory of pseudo-randomness to achieve a new quantitative understanding of the non-local nature of quantum correlations.
Device-Independent Quantum Key Distribution with Commuting Measurements
- Mathematics, Computer ScienceArXiv
- 2010
It is shown how secure key distribution can be realized against the most general attacks by a quantum adversary under the condition that measurements on different subsystems by the honest parties commute.
Optimal Device Independent Quantum Key Distribution
- PhysicsScientific reports
- 2016
It is shown that higher correlation between shared raw keys at the expense of maximal Bell violation provide for better key rates for low channel disturbance.
Quantum key distribution protocol based on contextuality monogamy
- Computer Science, Physics
- 2017
This protocol provides a new framework for quantum key distribution which has conceptual and practical advantages over other quantum protocols, and explicitly calculates the key rate, error rate introduced between Alice-Bob communication due to the presence of Eve, and the information-gain by Eve.
Efficient Device-Independent Quantum Key Distribution
- PhysicsEUROCRYPT
- 2010
An efficient protocol for quantum key distribution is proposed the security of which is entirely device-independent and not even based on the accuracy of quantum physics. A scheme of that type relies…
The security of practical quantum key distribution
- Computer Science
- 2009
Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).
Security of Device-Independent Quantum Key Distribution Protocols
- Computer Science, MathematicsTQC
- 2011
A general security proof valid for a large class of device-independent quantum key distribution protocols and relies on the validity of Quantum Theory and requires that the events generating the raw key are causally disconnected.
Secure device-independent quantum key distribution with causally independent measurement devices.
- Computer Science, MathematicsNature communications
- 2011
This work shows that device-independent QKD is possible with key rates comparable to those of standard schemes, and provides a general security proof for a large class of protocols in a model in which the raw key is generated by independent measurements.
Universally-composable privacy amplification from causality constraints
- Computer SciencePhysical review letters
- 2009
This work provides the first security proof for schemes for secret key distribution according to the strongest notion of security, the so-called universally composable security, which allows for secret communication in situations where the participants distrust their quantum devices.
Deterministic Secure Quantum Communication on the BB84 System
- Computer ScienceEntropy
- 2020
A deterministic secure quantum communication (DSQC) protocol based on the BB84 system is developed to include quantum entity authentication in the DSQC procedure and the use of the multiple generation and shuffling method is proposed to prevent a loss of message in the experiment.
References
SHOWING 1-10 OF 31 REFERENCES
Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication.
- Computer Science, MathematicsPhysical review letters
- 2005
It is shown that full security can be proven by considering only collective attacks, and computable lower and upper bounds on the secret-key rate of those QKD protocols involving only entropies of two-qubit density operators are derived.
No signaling and quantum key distribution.
- PhysicsPhysical review letters
- 2005
A key distribution scheme provably secure against general attacks by a postquantum eavesdropper limited only by the impossibility of superluminal signaling is described, which stems from violation of a Bell inequality.
Quantum cryptography without Bell's theorem.
- Mathematics, Computer SciencePhysical review letters
- 1992
A related but simpler EPR scheme is described and it is proved it secure against more general attacks, including substitution of a fake EPR source and the original 1984 key distribution scheme of Bennett and Brassard, which uses single particles instead of EPR pairs.
Quantum cryptography based on Bell's theorem.
- Mathematics, PhysicsPhysical review letters
- 1991
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the…
Simulating maximal quantum entanglement without communication.
- PhysicsPhysical review letters
- 2005
It is shown that a single instance of the latter elementary nonlocal correlation suffices to simulate exactly all possible projective measurements that can be performed on a maximally entangled state of two qubits, with no communication needed at all.
Unconditionally Secure Key Agreement and the Intrinsic Conditional Information
- Computer Science, MathematicsIEEE Trans. Inf. Theory
- 1999
A new conditional mutual information measure is defined, the intrinsic conditional Mutual information between S and Y when given Z, denoted by I(X;Y/spl darr/Z), which is an upper bound on S(X, Y/spl par/Z).
Proposed Experiment to Test Local Hidden Variable Theories.
- Physics
- 1969
A theorem of Bell, proving that certain predictions of quantum mechanics are inconsistent with the entire family of local hidden-variable theories, is generalized so as to apply to realizable…
General properties of nonsignaling theories
- Philosophy
- 2006
This article identifies a series of properties common to all theories that do not allow for superluminal signaling and predict the violation of Bell inequalities. Intrinsic randomness, uncertainty…
Nonlocal correlations as an information-theoretic resource
- Physics
- 2005
It is well known that measurements performed on spatially separated entangled quantum systems can give rise to correlations that are nonlocal, in the sense that a Bell inequality is violated. They…
Secret key agreement by public discussion from common information
- Computer ScienceIEEE Trans. Inf. Theory
- 1993
It is shown that such a secret key agreement is possible for a scenario in which all three parties receive the output of a binary symmetric source over independent binary asymmetric channels, even when the enemy's channel is superior to the other two channels.