Practical device-independent quantum cryptography via entropy accumulation.
TLDR
A property of entropy, termed “entropy accumulation”, is presented, which asserts that the total amount of entropy of a large system is the sum of its parts, which is used to prove the security of cryptographic protocols, including device-independent quantum key distribution, while achieving essentially optimal parameters.Abstract:
Device-independent cryptography goes beyond conventional quantum cryptography by providing security that holds independently of the quality of the underlying physical devices. Device-independent protocols are based on the quantum phenomena of non-locality and the violation of Bell inequalities. This high level of security could so far only be established under conditions which are not achievable experimentally. Here we present a property of entropy, termed “entropy accumulation”, which asserts that the total amount of entropy of a large system is the sum of its parts. We use this property to prove the security of cryptographic protocols, including device-independent quantum key distribution, while achieving essentially optimal parameters. Recent experimental progress, which enabled loophole-free Bell tests, suggests that the achieved parameters are technologically accessible. Our work hence provides the theoretical groundwork for experimental demonstrations of device-independent cryptography.read more
Citations
More filters
Journal ArticleDOI
Advances in quantum cryptography
Stefano Pirandola,Ulrik L. Andersen,Leonardo Banchi,Mario Berta,Darius Bunandar,Roger Colbeck,Dirk Englund,Tobias Gehring,Cosmo Lupo,Carlo Ottaviani,Jason Pereira,Mohsen Razavi,Jesni Shamsul Shaari,Marco Tomamichel,Vladyslav C. Usenko,Giuseppe Vallone,Paolo Villoresi,Petros Wallden +17 more
TL;DR: This review begins by reviewing protocols of quantum key distribution based on discrete variable systems, and considers aspects of device independence, satellite challenges, and high rate protocols based on continuous variable systems.
Journal ArticleDOI
Secure quantum key distribution with realistic devices
TL;DR: This review gives both sides of the story, with the current best theory of quantum security, and an extensive survey of what makes quantum cryptosystem safe in practice.
Journal ArticleDOI
Advances in Quantum Cryptography
Stefano Pirandola,Ulrik L. Andersen,Leonardo Banchi,Mario Berta,Darius Bunandar,Roger Colbeck,Dirk Englund,Tobias Gehring,Cosmo Lupo,Carlo Ottaviani,Jason Pereira,Mohsen Razavi,Jesni Shamsul Shaari,Marco Tomamichel,Vladyslav C. Usenko,Giuseppe Vallone,Paolo Villoresi,Petros Wallden +17 more
TL;DR: Quantum cryptography is arguably the fastest growing area in quantum information science as mentioned in this paper, and many quantum key distribution protocols have been proposed, both theoretically and experimentally, over the last few decades.
Journal ArticleDOI
Device-independent quantum secure direct communication against collective attacks
Lan Zhou,Yu-Bo Sheng,Gui-Lu Long +2 more
TL;DR: The first device-independent quantum secure direct communication protocol (DI-QSDC) is put forward and its security and communication efficiency against collective attacks are analyzed and noiseless linear amplification (NLA) protocol and entanglement purification protocol (EPP) are modified.
Journal ArticleDOI
Experimentally generated randomness certified by the impossibility of superluminal signals
Peter Bierhorst,Peter Bierhorst,Emanuel Knill,Emanuel Knill,Scott Glancy,Yanbao Zhang,Yanbao Zhang,Alan Mink,Stephen P. Jordan,Andrea Rommal,Yi-Kai Liu,Bradley G. Christensen,Sae Woo Nam,Martin J. Stevens,Lynden K. Shalm,Lynden K. Shalm +15 more
TL;DR: 1,024 random bits that are uniformly distributed to within 10−12 and unpredictable assuming the impossibility of superluminal communication are generated and certified using a loophole-free Bell test and a protocol is described that is optimized for devices that are characterized by a low per-trial violation of Bell inequalities.
References
More filters
Journal ArticleDOI
On the Einstein-Podolsky-Rosen paradox
TL;DR: In this article, it was shown that even without such a separability or locality requirement, no hidden variable interpretation of quantum mechanics is possible and that such an interpretation has a grossly nonlocal structure, which is characteristic of any such theory which reproduces exactly the quantum mechanical predictions.
Journal ArticleDOI
Quantum cryptography based on Bell's theorem.
TL;DR: Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported, based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment andBells theorem is used to test for eavesdropping.
Journal ArticleDOI
Proposed Experiment to Test Local Hidden Variable Theories.
TL;DR: In this paper, a theorem of Bell, proving that certain predictions of quantum mechanics are inconsistent with the entire family of local hidden-variable theories, is generalized so as to apply to realizable experiments.
Journal ArticleDOI
Quantum cryptography
TL;DR: A protocol for coin-tossing by exchange of quantum messages is presented, which is secure against traditional kinds of cheating, even by an opponent with unlimited computing power, but ironically can be subverted by use of a still subtler quantum phenomenon, the Einstein-Podolsky-Rosen paradox.
Related Papers (5)
Significant-Loophole-Free Test of Bell's Theorem with Entangled Photons
Marissa Giustina,Marissa Giustina,Marijn A. M. Versteegh,Marijn A. M. Versteegh,Soeren Wengerowsky,Soeren Wengerowsky,Johannes Handsteiner,Johannes Handsteiner,Armin Hochrainer,Armin Hochrainer,Kevin Phelan,Fabian Steinlechner,Johannes Kofler,Jan-Åke Larsson,Carlos Abellan,Waldimar Amaya,Valerio Pruneri,Valerio Pruneri,Morgan W. Mitchell,Morgan W. Mitchell,Joern Beyer,Thomas Gerrits,Adriana E. Lita,Lynden K. Shalm,Sae Woo Nam,Thomas Scheidl,Thomas Scheidl,Rupert Ursin,Bernhard Wittmann,Bernhard Wittmann,Anton Zeilinger,Anton Zeilinger +31 more