No signaling and quantum key distribution.

@article{Barrett2004NoSA,
  title={No signaling and quantum key distribution.},
  author={Jonathan Barrett and Lucien Hardy and Adrian Kent},
  journal={Physical review letters},
  year={2004},
  volume={95 1},
  pages={
          010503
        }
}
Standard quantum key distribution protocols are provably secure against eavesdropping attacks, if quantum theory is correct. It is theoretically interesting to know if we need to assume the validity of quantum theory to prove the security of quantum key distribution, or whether its security can be based on other physical principles. The question would also be of practical interest if quantum mechanics were ever to fail in some regime, because a scientifically and technologically advanced… 

Fully device independent quantum key distribution

This work rigorously proves the device-independent security of an entanglement-based protocol building on Ekert's original proposal for quantum key distribution and builds on techniques from the classical theory of pseudo-randomness to achieve a new quantitative understanding of the non-local nature of quantum correlations.

Efficient quantum key distribution secure against no-signalling eavesdroppers

It is shown that in the absence of noise, these protocols can yield one secret bit per entanglement bit, implying that the key rates in the no-signalling post-quantum scenario are comparable to the key rate in usual quantum key distribution.

Fully device-independent quantum key distribution.

This work rigorously proves the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks, and achieves a linear key rate and tolerates a constant noise rate in the devices.

Post-quantum attacks on key distribution schemes in the presence of weakly stochastic sources

A key distribution scheme that is provably secure against general attacks by a post-quantum adversary is described and possible security consequences for such schemes under the assumption of weak randomness are discussed.

Device-independent quantum key distribution secure against collective attacks

This proof exploits the full structure of quantum theory, but only holds against collective attacks, where the eavesdropper is assumed to act on the quantum systems of the honest parties independently and identically in each round of the protocol.

Device-Independent Quantum Key Distribution

This paper presents a large-scale simulation of the response of the immune system to laser-spot assisted, 3D image analysis and shows the importance of knowing the number of cells in the nervous system and how they respond to laser treatment.

Device-Independent quantum key distribution based on non-signaling constraints

  • Yan ChangChunxiang Xu
  • Computer Science
    2016 13th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)
  • 2016
This work shows a quantum key distribution protocol from correlation that violates a Bell inequality under the condition that both the source and the measurement devices are untrusted.

Practical security of quantum cryptography

A secure detection scheme is proposed, immune to the detector control attack and compatible with those security proofs for quantum cryptography in a very general setting, and if this scheme is implemented correctly, it offers provable security.

Device-independent quantum key distribution secure against adversaries with no long-term quantum memory

A security proof of DIQKD is provided that is both more efficient and noise resistant, and also more general as it applies to protocols based on arbitrary Bell inequalities and can be adapted to cover supra-quantum eavesdroppers limited by the no-signalling principle only.

Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices

This work achieves a reduction of arbitrary adversary strategies to qubit strategies and a proof of security for qu bit strategies based on the previous proof by Pironio et al and techniques adapted from Renner.
...

References

SHOWING 1-10 OF 22 REFERENCES

Quantum nonlocality in the presence of superselection rules and data hiding protocols.

It is shown how the notion of quantum nonlocality has to be redefined in the presence of superselection rules: there exist separable states that cannot be prepared locally and exhibit some form of nonLocality.

Unconditionally Secure Bit Commitment

  • A. Kent
  • Computer Science, Mathematics
  • 1999
A new classical bit commitment protocol based on cryptographic constraints imposed by special relativity that evades the no-go results of Mayers, Lo and Chau by requiring from Alice a sequence of communications, including a post-revelation verification, each of which is guaranteed to be independent of its predecessor.

HOW TO SHARE A QUANTUM SECRET

We investigate the concept of quantum secret sharing. In a (k,thinspn) threshold scheme, a secret quantum state is divided into n shares such that any k of those shares can be used to reconstruct the

Superselection rules and quantum protocols

The results show in particular that, if no assumptions are made about the computational power of the cheater, then secure quantum bit commitment and strong quantum coin flipping with arbitrarily small bias are impossible in a world subject to superselection rules.

Cheat sensitive quantum bit commitment.

An unconditionally secure cheat sensitive nonrelativistic bit commitment protocol which uses quantum information to implement a task which is classically impossible; a simple relativistic protocol is described.

Quantum secret sharing

This work shows how GHZ states can be used to split quantum information into two parts so that both parts are necessary to reconstruct the original qubit.

Nonlocal correlations as an information-theoretic resource

It is well known that measurements performed on spatially separated entangled quantum systems can give rise to correlations that are nonlocal, in the sense that a Bell inequality is violated. They

Quantum cryptography based on Bell's theorem.

  • Ekert
  • Mathematics, Physics
    Physical review letters
  • 1991
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the

Proposed Experiment to Test Local Hidden Variable Theories.

A theorem of Bell, proving that certain predictions of quantum mechanics are inconsistent with the entire family of local hidden-variable theories, is generalized so as to apply to realizable

On the Einstein-Podolsky-Rosen paradox

THE paradox of Einstein, Podolsky and Rosen [1] was advanced as an argument that quantum mechanics could not be a complete theory but should be supplemented by additional variables. These additional