From Bell's theorem to secure quantum key distribution.

@article{Acn2006FromBT,
  title={From Bell's theorem to secure quantum key distribution.},
  author={Antonio Ac{\'i}n and Nicolas Gisin and Lluis Masanes},
  journal={Physical review letters},
  year={2006},
  volume={97 12},
  pages={
          120405
        }
}
The first step in any quantum key distribution (QKD) protocol consists of sequences of measurements that produce correlated classical data. We show that these correlation data must violate some Bell inequality in order to contain distillable secrecy, if not they could be produced by quantum measurements performed on a separable state of larger dimension. We introduce a new QKD protocol and prove its security against any individual attack by an adversary only limited by the no-signaling… 

Figures and Tables from this paper

Fully device independent quantum key distribution
TLDR
This work rigorously proves the device-independent security of an entanglement-based protocol building on Ekert's original proposal for quantum key distribution and builds on techniques from the classical theory of pseudo-randomness to achieve a new quantitative understanding of the non-local nature of quantum correlations.
Device-Independent Quantum Key Distribution with Commuting Measurements
TLDR
It is shown how secure key distribution can be realized against the most general attacks by a quantum adversary under the condition that measurements on different subsystems by the honest parties commute.
Optimal Device Independent Quantum Key Distribution
TLDR
It is shown that higher correlation between shared raw keys at the expense of maximal Bell violation provide for better key rates for low channel disturbance.
Quantum key distribution protocol based on contextuality monogamy
TLDR
This protocol provides a new framework for quantum key distribution which has conceptual and practical advantages over other quantum protocols, and explicitly calculates the key rate, error rate introduced between Alice-Bob communication due to the presence of Eve, and the information-gain by Eve.
Efficient Device-Independent Quantum Key Distribution
An efficient protocol for quantum key distribution is proposed the security of which is entirely device-independent and not even based on the accuracy of quantum physics. A scheme of that type relies
The security of practical quantum key distribution
TLDR
Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).
Security of Device-Independent Quantum Key Distribution Protocols
TLDR
A general security proof valid for a large class of device-independent quantum key distribution protocols and relies on the validity of Quantum Theory and requires that the events generating the raw key are causally disconnected.
Secure device-independent quantum key distribution with causally independent measurement devices.
TLDR
This work shows that device-independent QKD is possible with key rates comparable to those of standard schemes, and provides a general security proof for a large class of protocols in a model in which the raw key is generated by independent measurements.
Universally-composable privacy amplification from causality constraints
  • L. Masanes
  • Computer Science
    Physical review letters
  • 2009
TLDR
This work provides the first security proof for schemes for secret key distribution according to the strongest notion of security, the so-called universally composable security, which allows for secret communication in situations where the participants distrust their quantum devices.
Deterministic Secure Quantum Communication on the BB84 System
TLDR
A deterministic secure quantum communication (DSQC) protocol based on the BB84 system is developed to include quantum entity authentication in the DSQC procedure and the use of the multiple generation and shuffling method is proposed to prevent a loss of message in the experiment.
...
...

References

SHOWING 1-10 OF 31 REFERENCES
Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication.
TLDR
It is shown that full security can be proven by considering only collective attacks, and computable lower and upper bounds on the secret-key rate of those QKD protocols involving only entropies of two-qubit density operators are derived.
No signaling and quantum key distribution.
TLDR
A key distribution scheme provably secure against general attacks by a postquantum eavesdropper limited only by the impossibility of superluminal signaling is described, which stems from violation of a Bell inequality.
Quantum cryptography without Bell's theorem.
TLDR
A related but simpler EPR scheme is described and it is proved it secure against more general attacks, including substitution of a fake EPR source and the original 1984 key distribution scheme of Bennett and Brassard, which uses single particles instead of EPR pairs.
Quantum cryptography based on Bell's theorem.
  • Ekert
  • Mathematics, Physics
    Physical review letters
  • 1991
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the
Simulating maximal quantum entanglement without communication.
TLDR
It is shown that a single instance of the latter elementary nonlocal correlation suffices to simulate exactly all possible projective measurements that can be performed on a maximally entangled state of two qubits, with no communication needed at all.
Unconditionally Secure Key Agreement and the Intrinsic Conditional Information
TLDR
A new conditional mutual information measure is defined, the intrinsic conditional Mutual information between S and Y when given Z, denoted by I(X;Y/spl darr/Z), which is an upper bound on S(X, Y/spl par/Z).
Proposed Experiment to Test Local Hidden Variable Theories.
A theorem of Bell, proving that certain predictions of quantum mechanics are inconsistent with the entire family of local hidden-variable theories, is generalized so as to apply to realizable
General properties of nonsignaling theories
This article identifies a series of properties common to all theories that do not allow for superluminal signaling and predict the violation of Bell inequalities. Intrinsic randomness, uncertainty
Nonlocal correlations as an information-theoretic resource
It is well known that measurements performed on spatially separated entangled quantum systems can give rise to correlations that are nonlocal, in the sense that a Bell inequality is violated. They
Secret key agreement by public discussion from common information
  • U. Maurer
  • Computer Science
    IEEE Trans. Inf. Theory
  • 1993
TLDR
It is shown that such a secret key agreement is possible for a scenario in which all three parties receive the output of a binary symmetric source over independent binary asymmetric channels, even when the enemy's channel is superior to the other two channels.
...
...