# No signaling and quantum key distribution.

@article{Barrett2004NoSA, title={No signaling and quantum key distribution.}, author={Jonathan Barrett and Lucien Hardy and Adrian Kent}, journal={Physical review letters}, year={2004}, volume={95 1}, pages={ 010503 } }

Standard quantum key distribution protocols are provably secure against eavesdropping attacks, if quantum theory is correct. It is theoretically interesting to know if we need to assume the validity of quantum theory to prove the security of quantum key distribution, or whether its security can be based on other physical principles. The question would also be of practical interest if quantum mechanics were ever to fail in some regime, because a scientifically and technologically advanced…

## 707 Citations

### Fully device independent quantum key distribution

- Computer ScienceCommun. ACM
- 2019

This work rigorously proves the device-independent security of an entanglement-based protocol building on Ekert's original proposal for quantum key distribution and builds on techniques from the classical theory of pseudo-randomness to achieve a new quantitative understanding of the non-local nature of quantum correlations.

### Efficient quantum key distribution secure against no-signalling eavesdroppers

- Computer Science, Physics
- 2006

It is shown that in the absence of noise, these protocols can yield one secret bit per entanglement bit, implying that the key rates in the no-signalling post-quantum scenario are comparable to the key rate in usual quantum key distribution.

### Fully device-independent quantum key distribution.

- Computer Science
- 2014

This work rigorously proves the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks, and achieves a linear key rate and tolerates a constant noise rate in the devices.

### Post-quantum attacks on key distribution schemes in the presence of weakly stochastic sources

- Computer Science, Mathematics
- 2015

A key distribution scheme that is provably secure against general attacks by a post-quantum adversary is described and possible security consequences for such schemes under the assumption of weak randomness are discussed.

### Device-independent quantum key distribution secure against collective attacks

- Computer Science
- 2009

This proof exploits the full structure of quantum theory, but only holds against collective attacks, where the eavesdropper is assumed to act on the quantum systems of the honest parties independently and identically in each round of the protocol.

### Device-Independent Quantum Key Distribution

- PhysicsArXiv
- 2021

This paper presents a large-scale simulation of the response of the immune system to laser-spot assisted, 3D image analysis and shows the importance of knowing the number of cells in the nervous system and how they respond to laser treatment.

### Device-Independent quantum key distribution based on non-signaling constraints

- Computer Science2016 13th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)
- 2016

This work shows a quantum key distribution protocol from correlation that violates a Bell inequality under the condition that both the source and the measurement devices are untrusted.

### Practical security of quantum cryptography

- Computer Science, Mathematics
- 2011

A secure detection scheme is proposed, immune to the detector control attack and compatible with those security proofs for quantum cryptography in a very general setting, and if this scheme is implemented correctly, it offers provable security.

### Device-independent quantum key distribution secure against adversaries with no long-term quantum memory

- Computer Science
- 2012

A security proof of DIQKD is provided that is both more efficient and noise resistant, and also more general as it applies to protocols based on arbitrary Bell inequalities and can be adapted to cover supra-quantum eavesdroppers limited by the no-signalling principle only.

### Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices

- Computer Science
- 2009

This work achieves a reduction of arbitrary adversary strategies to qubit strategies and a proof of security for qu bit strategies based on the previous proof by Pironio et al and techniques adapted from Renner.

## References

SHOWING 1-10 OF 22 REFERENCES

### Quantum nonlocality in the presence of superselection rules and data hiding protocols.

- PhysicsPhysical review letters
- 2003

It is shown how the notion of quantum nonlocality has to be redefined in the presence of superselection rules: there exist separable states that cannot be prepared locally and exhibit some form of nonLocality.

### Unconditionally Secure Bit Commitment

- Computer Science, Mathematics
- 1999

A new classical bit commitment protocol based on cryptographic constraints imposed by special relativity that evades the no-go results of Mayers, Lo and Chau by requiring from Alice a sequence of communications, including a post-revelation verification, each of which is guaranteed to be independent of its predecessor.

### HOW TO SHARE A QUANTUM SECRET

- Mathematics
- 1999

We investigate the concept of quantum secret sharing. In a (k,thinspn) threshold scheme, a secret quantum state is divided into n shares such that any k of those shares can be used to reconstruct the…

### Superselection rules and quantum protocols

- Computer Science, Mathematics
- 2004

The results show in particular that, if no assumptions are made about the computational power of the cheater, then secure quantum bit commitment and strong quantum coin flipping with arbitrarily small bias are impossible in a world subject to superselection rules.

### Cheat sensitive quantum bit commitment.

- Computer Science, MathematicsPhysical review letters
- 2004

An unconditionally secure cheat sensitive nonrelativistic bit commitment protocol which uses quantum information to implement a task which is classically impossible; a simple relativistic protocol is described.

### Quantum secret sharing

- Computer Science
- 1999

This work shows how GHZ states can be used to split quantum information into two parts so that both parts are necessary to reconstruct the original qubit.

### Nonlocal correlations as an information-theoretic resource

- Physics
- 2005

It is well known that measurements performed on spatially separated entangled quantum systems can give rise to correlations that are nonlocal, in the sense that a Bell inequality is violated. They…

### Quantum cryptography based on Bell's theorem.

- Mathematics, PhysicsPhysical review letters
- 1991

Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the…

### Proposed Experiment to Test Local Hidden Variable Theories.

- Physics
- 1969

A theorem of Bell, proving that certain predictions of quantum mechanics are inconsistent with the entire family of local hidden-variable theories, is generalized so as to apply to realizable…

### On the Einstein-Podolsky-Rosen paradox

- Physics
- 1964

THE paradox of Einstein, Podolsky and Rosen [1] was advanced as an argument that quantum mechanics could not be a complete theory but should be supplemented by additional variables. These additional…