Fully device-independent quantum key distribution.

@article{Vazirani2014FullyDQ,
  title={Fully device-independent quantum key distribution.},
  author={Umesh V. Vazirani and Thomas Vidick},
  journal={Physical Review Letters},
  year={2014},
  volume={113},
  pages={140501}
}
Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorously proving the device-independent security of a slight variant of Ekert's original entanglement-based… 
Fully device independent quantum key distribution
TLDR
This work rigorously proves the device-independent security of an entanglement-based protocol building on Ekert's original proposal for quantum key distribution and builds on techniques from the classical theory of pseudo-randomness to achieve a new quantitative understanding of the non-local nature of quantum correlations.
Simple and tight device-independent security proofs
TLDR
A flexible protocol is provided and a security proof is given that provides quantitative bounds that are asymptotically tight, even in the presence of general quantum adversaries, which is likely that these protocols can be practically implemented in the near future.
Full Security of Quantum Key Distribution From No-Signaling Constraints
We analyze a cryptographic protocol for generating a distributed secret key from correlations that violate a Bell inequality by a sufficient amount, and prove its security against eavesdroppers,
Practical device-independent quantum cryptography via entropy accumulation
TLDR
A property of entropy, termed “entropy accumulation”, is presented, which asserts that the total amount of entropy of a large system is the sum of its parts, which is used to prove the security of cryptographic protocols, including device-independent quantum key distribution, while achieving essentially optimal parameters.
qu an tph ] 2 6 M ar 2 01 9 Simple and tight device-independent security proofs
Device-independent security is the gold standard for quantum cryptography: not only is security based entirely on the laws of quantum mechanics, but it holds irrespective of any a priori assumptions
Indian Statistical Institute Master ’ s Thesis Device Independent Quantum Cryptography For Finite Samples
Quantum cryptography promises levels of security that are impossible to replicate in classical world. In all the initial quantum cryptographic protocols, the involving parties trust the measurement
Simple proof of confidentiality for private quantum channels in noisy environments
TLDR
A simple proof of confidentiality for parallel quantum channels established via entanglement distillation based on hashing, in the presence of noise, and a malicious eavesdropper who is restricted only by the laws of quantum mechanics is provided.
The Statistics and Security of Quantum Key Distribution
TLDR
The Trojan Horse Attack is investigated, a form of side-channel attack that could threaten the security of existing key distribution protocols, and a framework based on Markov chains and probability generating functions is developed to show how one may easily calculate an analytic expression for the completion time of a probabilistic process.
Experimental demonstration of Gaussian protocols for one-sided device-independent quantum key distribution
TLDR
All protocols that can be 1sDI and their maximum loss tolerance are identified, and a direct link between the relevant EPR steering inequality and the secret key rate is established, further strengthening the relationship between these asymmetric notions of nonlocality and device independence.
Entangled protocols and non-local games for testing quantum systems
TLDR
This thesis investigates multi-prover interactive proofs for verifying quantum behavior, and focuses on the stringent testing scenario in which the verifier in the interactive proof is completely classical as described above.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 38 REFERENCES
Device-independent quantum key distribution secure against collective attacks
Device-independent quantum key distribution (DIQKD) represents a relaxation of the security assumptions made in usual quantum key distribution (QKD). As in usual QKD, the security of DIQKD follows
Full Security of Quantum Key Distribution From No-Signaling Constraints
We analyze a cryptographic protocol for generating a distributed secret key from correlations that violate a Bell inequality by a sufficient amount, and prove its security against eavesdroppers,
No signaling and quantum key distribution.
TLDR
A key distribution scheme provably secure against general attacks by a postquantum eavesdropper limited only by the impossibility of superluminal signaling is described, which stems from violation of a Bell inequality.
Memory attacks on device-independent quantum cryptography.
TLDR
This work identifies a critical weakness of device-independent protocols that rely on public communication between secure laboratories that aims to achieve composable security in the case of two parties using a small number of devices to repeatedly share keys with each other (and no other party).
Secure device-independent quantum key distribution with causally independent measurement devices.
TLDR
This work shows that device-independent QKD is possible with key rates comparable to those of standard schemes, and provides a general security proof for a large class of protocols in a model in which the raw key is generated by independent measurements.
Security of practical private randomness generation
Measurements on entangled quantum systems necessarily yield outcomes that are intrinsically unpredictable if they violate a Bell inequality. This property can be used to generate certified randomness
Quantum cryptography with imperfect apparatus
  • D. Mayers, A. Yao
  • Computer Science, Physics
    Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280)
  • 1998
TLDR
This paper proposes and gives a concrete design for a new concept, self-checking source, which requires the manufacturer of the photon source to provide certain tests; these tests are designed such that, if passed, the source is guaranteed to be adequate for the security of the quantum key distribution protocol, even though the testing devices may not be built to the original specification.
Quantum cryptography: Public key distribution and coin tossing
TLDR
A protocol for coin-tossing by exchange of quantum messages is presented, which is secure against traditional kinds of cheating, even by an opponent with unlimited computing power, but ironically can be subverted by use of a still subtler quantum phenomenon, the Einstein-Podolsky-Rosen paradox.
Experimental Quantum Cryptography
TLDR
Initial results from an apparatus and protocol designed to implement quantum public key distribution are described, by which two users exchange a random quantum transmission, consisting of very faint flashes of polarized light, which remains secure against an adversary with unlimited computing power.
Secrecy extraction from no-signaling correlations
Quantum cryptography shows that one can guarantee the secrecy of correlation on the sole basis of the laws of physics, that is, without limiting the computational power of the eavesdropper. The usual
...
1
2
3
4
...