Device-independent security of quantum cryptography against collective attacks

被引:1378
作者
Acin, Antonio
Brunner, Nicolas
Gisin, Nicolas
Massar, Serge
Pironio, Stefano
Scarani, Valerio
机构
[1] ICFO, Barcelona 08860, Spain
[2] ICREA, Barcelona 08010, Spain
[3] Univ Geneva, Appl Phys Grp, CH-1211 Geneva, Switzerland
[4] Free Univ Brussels, Lab Informat Quant, B-1050 Brussels, Belgium
关键词
D O I
10.1103/PhysRevLett.98.230501
中图分类号
O4 [物理学];
学科分类号
0702 [物理学];
摘要
We present the optimal collective attack on a quantum key distribution protocol in the "device-independent" security scenario, where no assumptions are made about the way the quantum key distribution devices work or on what quantum system they operate. Our main result is a tight bound on the Holevo information between one of the authorized parties and the eavesdropper, as a function of the amount of violation of a Bell-type inequality.
引用
收藏
页数:4
相关论文
共 23 条
[1]
Efficient quantum key distribution secure against no-signalling eavesdroppers [J].
Acin, Antonio ;
Massar, Serge ;
Pironio, Stefano .
NEW JOURNAL OF PHYSICS, 2006, 8
[2]
From Bell's theorem to secure quantum key distribution [J].
Acin, Antonio ;
Gisin, Nicolas ;
Masanes, Lluis .
PHYSICAL REVIEW LETTERS, 2006, 97 (12)
[3]
[Anonymous], ARXIVQUANTPH0512258
[4]
No signaling and quantum key distribution [J].
Barrett, J ;
Hardy, L ;
Kent, A .
PHYSICAL REVIEW LETTERS, 2005, 95 (01)
[5]
Bennett C. H., 1984, P IEEE INT C COMP SY, DOI DOI 10.1016/J.TCS.2014.05.025
[6]
QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[7]
PROPOSED EXPERIMENT TO TEST LOCAL HIDDEN-VARIABLE THEORIES [J].
CLAUSER, JF ;
HORNE, MA ;
SHIMONY, A ;
HOLT, RA .
PHYSICAL REVIEW LETTERS, 1969, 23 (15) :880-&
[8]
Distillation of secret key and entanglement from quantum states [J].
Devetak, I ;
Winter, A .
PROCEEDINGS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2005, 461 (2053) :207-235
[9]
Quantum cryptography [J].
Dusek, Miloslav ;
Luetkenhaus, Norbert ;
Hendrych, Martin .
PROGRESS IN OPTICS, VOL 49, 2006, 49 :381-454
[10]
QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J].
EKERT, AK .
PHYSICAL REVIEW LETTERS, 1991, 67 (06) :661-663